Google Cloud Armor
Enterprise-grade DDoS defense
Cloud Armor benefits from our experience of protecting key internet properties such as Google Search, Gmail, and YouTube. It provides built-in defenses against L3 and L4 DDoS attacks.
Mitigate OWASP Top 10 risks
Cloud Armor provides predefined rules to help defend against attacks such as cross-site scripting (XSS) and SQL injection (SQLi) attacks.
Cloud Armor overview
Learn how Cloud Armor works and see an overview of Cloud Armor features and capabilities.
Hands-on lab: Application load balancer with Cloud Armor
Learn how to configure an HTTP load balancer with global back ends, stress test the load balancer, and denylist the stress test IP.
Cloud Armor security policy overview
Use Google Cloud Armor security policies to help protect your load-balanced applications from distributed denial of service (DDoS) and other web-based attacks.
Managed protection is an application protection service that helps protect your web applications and services from DDoS attacks and other threats from the internet.
Provides effective management of automated clients' requests towards your back ends through native integration with reCAPTCHA Enterprise.
Rate-based rules help you protect your applications from a large volume of requests that flood your instances and block access for legitimate users.
Configuring Google Cloud Armor security policies
Use these instructions to filter incoming traffic to application load balancer by creating Google Cloud Armor security policies.
Configuring Google Cloud Armor through GKE Ingress
Learn how to use a BackendConfig custom resource to configure Google Cloud Armor in Google Kubernetes Engine (GKE).
Tuning Google Cloud Armor WAF rules
Preconfigured web application firewall (WAF) rules with dozens of signatures that are compiled from open source industry standards.
|Pre-defined WAF rules to mitigate OWASP Top 10 risks||Out-of-the-box rules based on industry standards to mitigate against common web-application vulnerabilities and help provide protection from the OWASP Top 10.|
|Rich rules language for web application firewall||Create custom rules using any combination of L3–L7 parameters and geolocation to help protect your deployment with a flexible rules language.|
|Visibility and monitoring||Easily monitor all of the metrics associated with your security policies in the Cloud Monitoring dashboard. You can also view suspicious application traffic patterns from Cloud Armor directly in the Security Command Center dashboard.|
|Logging||Get visibility into Cloud Armor decisions as well as the implicated policies and rules on a per-request basis via Cloud Logging.|
|Preview mode||Deploy Cloud Armor rules in preview mode to understand rule efficacy and impact on production traffic before enabling active enforcement.|
|Policy framework with rules||Configure one or more security policies with a hierarchy of rules. Apply a policy at varying levels of granularity to one or many workloads.|
|IP-based and geo-based access control||Filter your incoming traffic based on IPv4 and IPv6 addresses or CIDRs. Identify and enforce access control based on geographic location of incoming traffic.|
|Support for hybrid and multicloud deployments||Help defend applications from DDoS or web attacks and enforce Layer 7 security policies whether your application is deployed on Google Cloud or in a hybrid or multicloud architecture.|
|Named IP Lists||Allow or deny traffic through a Cloud Armor security policy based on a curated Named IP List.|
|Cloud Armor||Standard||Managed Protection Plus||Notes|
|Billing||Pay as you go||Starting at $3,000/month||-|
|Protected resources||None||Includes first 100 ($30/month for additional protected resources)||Eligible protected resources depend on the type of external endpoint being protected (details)|
|Rules||$1 / month||Included in subscription||-|
|Policy||$5 / month||Included in subscription||-|
|Requests||$0.75 / million queries||Included in subscription||-|
|Data processing fee||None||Additional (details)||-|