プロジェクト内の Google Cloud サービスを保護し、データの漏洩のリスクを軽減するために、組織、フォルダ、プロジェクト レベルで VPC Service Controls サービス境界を指定できます。サービス境界を適用すると、上り(内向き)ポリシーと、保護するサービスとリソースをきめ細かく制御できます。
[[["わかりやすい","easyToUnderstand","thumb-up"],["問題の解決に役立った","solvedMyProblem","thumb-up"],["その他","otherUp","thumb-up"]],[["わかりにくい","hardToUnderstand","thumb-down"],["情報またはサンプルコードが不正確","incorrectInformationOrSampleCode","thumb-down"],["必要な情報 / サンプルがない","missingTheInformationSamplesINeed","thumb-down"],["翻訳に関する問題","translationIssue","thumb-down"],["その他","otherDown","thumb-down"]],["最終更新日 2025-04-02 UTC。"],[[["VPC Service Controls service perimeters can be implemented at the organization, folder, or project level to enhance Google Cloud service protection and prevent data exfiltration."],["Service perimeters enable detailed control over ingress policies, allowing you to specify the services and resources that require protection."],["By applying CBA access levels to service perimeters, you can ensure that only trusted devices have access to resources protected by the perimeter."],["You can associate a CBA access level with a service perimeter to restrict access to sensitive data, such as Cloud Storage, from unauthorized devices."],["Modifying a service perimeter and specifying a CBA access level can be done through the VPC Service Controls page in the Google Cloud console."]]],[]]