GKE shared responsibility


This page explains the shared security responsibilities for both Google and Google Cloud customers. Running a business-critical application on Google Kubernetes Engine (GKE) requires multiple parties to have different responsibilities. Although this page is not an exhaustive list, this document can help you understand your responsibilities.

This document is for Security specialists who define, govern and implement policies and procedures to protect an organization's data from unauthorized access. To learn more about common roles and example tasks that we reference in Google Cloud content, see Common GKE Enterprise user roles and tasks.

GKE

Google's responsibilities

Customer's responsibilities

  • Maintain your workloads, including your application code, build files, container images, data, Role-based access control (RBAC)/IAM policy, and containers and pods that you are running.
  • Rotate your clusters credentials.
  • Enroll clusters in auto-upgrade (default) or upgrade clusters to supported versions.
  • Monitor the cluster and applications and respond to any alerts and incidents using technologies such as the security posture dashboard and Google Cloud Observability.
  • Provide Google with environmental details when requested for troubleshooting purposes.
  • Ensure Logging and Monitoring are enabled on clusters. Without logs, support is available on a best-effort basis.

What's next