Stay organized with collections
Save and categorize content based on your preferences.
Learn optimization tips from IT
leaders from Uber, Air Asia, Deloitte, ADT and more at our free IT
Heroes Summit.
Watch now.
Trusted infrastructure
Our cloud infrastructure doesn't rely on any single
technology to make it secure. Our stack builds security
through progressive layers that deliver true defense in
depth.
Operational and device security
We develop and deploy infrastructure software using
rigorous
security practices.
Our operations teams detect and respond to threats
to the infrastructure from both insiders and
external actors, 24/7/365.
Internet communication
Communications over the internet to our public
cloud services are
encrypted in transit.
Our network and infrastructure have multiple layers
of protection to defend our customers against
denial-of-service attacks.
Identity
Identities, users, and services are strongly
authenticated. Access to sensitive data is protected
by advanced tools like phishing-resistant
security keys.
Storage services
Data stored on our infrastructure is automatically
encrypted at rest
and distributed for availability and reliability.
This helps guard against unauthorized access and
service interruptions.
Service deployment
Any application that runs on our infrastructure is
deployed with security in mind. We don't assume any
trust between services, and we use
multiple mechanisms to establish and maintain trust.
Our infrastructure was designed to be multi-tenant
from the start.
Hardware infrastructure
From the physical premises to the purpose-built
servers, networking equipment, and custom security
chips to the low-level software stack running on
every machine, our entire
hardware infrastructure
is Google-controlled, -secured, and -hardened.
Data centers
Google data centers
feature
layered security with
custom-designed electronic access cards, alarms,
vehicle access barriers, perimeter fencing, metal
detectors, biometrics, and laser beam intrusion
detection. They are monitored 24/7 by
high-resolution cameras that can detect and track
intruders. Only approved employees with specific
roles may enter.
Continuous availability
Infrastructure underpins how Google Cloud delivers
services that meet our high standards for
performance, resilience, availability, correctness,
and security. Design, operation, and delivery all
play a role in making services continuously
available.
Read the whitepaper
Google owns and operates one of the
largest backbone networks
in the world to connect our data centers. When your
traffic is on our network, it no longer transits the
public internet, making it less likely to be attacked,
intercepted, or manipulated.
Learn more about trust and security
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],[],[],[],null,["# Trusted Cloud Infrastructure (IaaS)\n\nLearn optimization tips from IT leaders from Uber, Air Asia, Deloitte, ADT and more at our free IT Heroes Summit. [Watch now](https://cloudonair.withgoogle.com/events/summit-it-heroes-2026?utm_source=cgc-site&utm_medium=et&utm_campaign=FY23-Q2-global-EXP23-onlineevent-er-it-heroes-summit-2023-mc&utm_content=web-banner-security-pages&utm_term=-). \n\nTrusted infrastructure\n======================\n\nOur cloud infrastructure doesn't rely on any single\ntechnology to make it secure. Our stack builds security\nthrough progressive layers that deliver true defense in\ndepth. \n[Get started for free](https://console.cloud.google.com/freetrial) [Read our detailed whitepaper](https://cloud.google.com/security/infrastructure/design/resources/google_infrastructure_whitepaper_fa.pdf) \n[Contact sales](https://cloud.google.com/contact) [Read our detailed whitepaper](https://cloud.google.com/security/infrastructure/design/resources/google_infrastructure_whitepaper_fa.pdf) \n\n### Operational and device security\n\nWe develop and deploy infrastructure software using\nrigorous\n[security practices](https://cloud.google.com/security/overview/whitepaper#operational_security).\nOur operations teams detect and respond to threats\nto the infrastructure from both insiders and\nexternal actors, 24/7/365. \n\n### Internet communication\n\nCommunications over the internet to our public\ncloud services are\n[encrypted in transit](https://cloud.google.com/security/encryption-in-transit/resources/encryption-in-transit-whitepaper.pdf).\nOur network and infrastructure have multiple layers\nof protection to defend our customers against\n[denial-of-service attacks](https://cloud.google.com/blog/products/identity-security/identifying-and-protecting-against-the-largest-ddos-attacks). \n\n### Identity\n\nIdentities, users, and services are strongly\nauthenticated. Access to sensitive data is protected\nby advanced tools like phishing-resistant\n[security keys](https://cloud.google.com/titan-security-key). \n\n### Storage services\n\nData stored on our infrastructure is automatically\n[encrypted at rest](/static/security/encryption/default-encryption/resources/encryption-whitepaper.pdf)\nand distributed for availability and reliability.\nThis helps guard against unauthorized access and\nservice interruptions. \n\n### Service deployment\n\nAny application that runs on our infrastructure is\ndeployed with security in mind. We don't assume any\ntrust between services, and we use\n[multiple mechanisms to establish and maintain trust](https://cloud.google.com/security/infrastructure/design#secure_service_deployment).\nOur infrastructure was designed to be multi-tenant\nfrom the start. \n\n### Hardware infrastructure\n\nFrom the physical premises to the purpose-built\nservers, networking equipment, and custom security\nchips to the low-level software stack running on\nevery machine, our entire\n[hardware infrastructure](https://cloud.google.com/security/overview/whitepaper#technology_with_security_at_its_core)\nis Google-controlled, -secured, and -hardened. \n[8:29](https://youtube.com/watch?v=zDAYZU4A3w0)\n\nTake a\nvirtual tour of a Google data center \n\n### Data centers\n\n\n[Google data centers](https://www.google.com/about/datacenters/)\nfeature\n[layered security](https://youtu.be/kd33UVZhnAA)with\ncustom-designed electronic access cards, alarms,\nvehicle access barriers, perimeter fencing, metal\ndetectors, biometrics, and laser beam intrusion\ndetection. They are monitored 24/7 by\nhigh-resolution cameras that can detect and track\nintruders. Only approved employees with specific\nroles may enter. \n\n### Continuous availability\n\nInfrastructure underpins how Google Cloud delivers\nservices that meet our high standards for\nperformance, resilience, availability, correctness,\nand security. Design, operation, and delivery all\nplay a role in making services continuously\navailable.\n[Read the whitepaper](https://services.google.com/fh/files/misc/infrastructure_design_for_availability_and_resilience_wp.pdf)\n\n### Our network\n\nGoogle owns and operates one of the\n[largest backbone networks](https://cloud.google.com/about/locations#network-tab)\nin the world to connect our data centers. When your\ntraffic is on our network, it no longer transits the\npublic internet, making it less likely to be attacked,\nintercepted, or manipulated. \n\nLearn more about trust and security\n-----------------------------------\n\n[Get an overview of Google Cloud's security model and capabilities\nLearn more](/security) \n[Resources, certifications, and documentation to help support your compliance needs\nLearn more](/security/compliance) \n[Security products to help you meet policy, regulatory, and business objectives\nLearn more](/products/security-and-identity) \n\n### Take the next step\n\nTell us\nwhat you're solving for. A Google Cloud expert will help you\nfind the best solution. \n[Contact sales](https://cloud.google.com/contact/) \n\n### Take the next step\n\nTell us\nwhat you're solving for. A Google Cloud expert will help you\nfind the best solution. \n[Contact sales](https://cloud.google.com/contact/) \n- Learn security best practices\n [See our best practices](/security/best-practices)\n- Solve common problems\n [Watch security use-case videos](/security/showcase)\n- Work with a partner\n[See our security partners](/security/partners) \n- Learn security best practices\n [See our best practices](/security/best-practices)\n- Solve common problems\n [Watch security use-case videos](/security/showcase)\n- Work with a partner\n [See our security partners](/security/partners)"]]