email as a service

Addressing the UK NCSC’s Cloud Security Principles

As your organization adopts more cloud services, it's essential to get a clear picture of how sensitive data will be protected. Many authorities, from government regulators, to industry standards bodies and consortia, have provided guidance on how to evaluate cloud security. Notably, the UK National Cyber Security Centre offers a framework built around 14 Cloud Security Principles, and we recently updated our response detailing how we address these principles for both Google Cloud Platform (GCP) and G Suite. Google Cloud customers in the UK public sector can use the response to assess the suitability of these Google Cloud products to host their data with sensitivity levels up to “OFFICIAL,” including “OFFICIAL SENSITIVE.”

The UK National Cyber Security Centre was set up to improve the underlying security of the UK internet and to protect critical services from cyber attacks. Its 14 Cloud Security Principles are expansive and thorough, and include such important considerations as data in-transit protectionsupply chain securityidentity and authentication and secure use of the service.

The 14 NCSC Cloud Security Principles allow service providers like Google Cloud to highlight the security benefits of our products and services in an easily consumable format. Our response provides details about how GCP and G Suite satisfy the recommendations built into each of the principles, and describes the specific best practices, services and certifications that help us address the goals of each recommendation.

The NCSC also provides detailed ChromeOS deployment guidance to help organizations follow its 12 End User Device Security Principles. With an end-to-end solution encompassing GCP, applications and connected devices, Google Cloud provides the appropriate tools and functionality to allow you to adhere to the NCSC’s stringent security guidelines in letter and spirit.

Our response comes on the heels of GCP opening a new region in London, which allows GCP customers in the UK to improve the latency of their applications.

We look forward to working with all manner of UK customers, regulated and otherwise, as we build out a more secure, intelligent, collaborative and open cloud.

Source: David Fitton, Google Blog

CloudBuzz

The latest in curated technology related news collected from many of the leading news distribution, industry research and technology vendor firms on the planet.

Here you will find recent news sources from companies such as Reuters, Marketwired, IDC, Gartner or directly from cloud vendors such as Google, Microsoft or Amazon.

CONTRIBUTORS

Why ‘Data Hoarding’ Increases Cybersecurity Risk

Why ‘Data Hoarding’ Increases Cybersecurity Risk

Data Hoarding The proliferation of data and constant growth of content saved on premise, in cloud storage, or a non-integrated ...
Chris Gerva

Why Containers Can’t Solve All Your Problems In The Cloud

Containers and the cloud Docker and other container services are appealing for a good reason - they are lightweight and ...
Bryan Doerr

Cyber-Threats and the Need for Secure Industrial Control Systems

Secure Industrial Control Systems (ICS) Industrial Control Systems (ICS) tend to be “out of sight, out of mind.” These systems ...
As Enterprises Execute Their Digital Strategies, New Multi-cloud Landscape Emerge

As Enterprises Execute Their Digital Strategies, New Multi-cloud Landscape Emerge

The Multi-cloud Landscape The digital universe is expanding rapidly, and cloud computing is building the foundation for almost infinite use ...
The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the ...
Cloud Services Are Vulnerable Without End-To-End Encryption

Cloud Services Are Vulnerable Without End-To-End Encryption

End-To-End Encryption The growth of cloud services has been one of the most disruptive phenomena of the Internet era.  However, ...
What is shadow IT?

How to Make the Move to the Cloud Securely

Move to the Cloud Securely The 2016 Enterprise Cloud Computing Survey from IDG offers multiple interesting insights concerning the state ...
Cyber Security Tips For Digital Collaboration

Cyber Security Tips For Digital Collaboration

Cyber Security Tips October is National Cyber Security Awareness Month – a joint effort by the Department of Homeland Security ...
10 Ways The Enterprise Can Prevent Data Leaks In The Cloud

10 Ways The Enterprise Can Prevent Data Leaks In The Cloud

Prevent Data Leaks In The Cloud More companies are turning to the cloud for storage. In fact, over 60 percent ...
Safeguarding Data Before Disaster Strikes

Safeguarding Data Before Disaster Strikes

Safeguarding Data  Online data backup is one of the best methods for businesses of all sizes to replicate their data ...

NEWS

Deloitte TMT Predictions: Machine Learning Deployments, On-Demand Content and Live Events Will Continue to Drive Growth

Deloitte TMT Predictions: Machine Learning Deployments, On-Demand Content and Live Events Will Continue to Drive Growth

NEW YORK, Dec. 12, 2017 /PRNewswire/ -- Deloitte forecasts double digital growth in machine learning deployments for the enterprise, an increasing worldwide ...
email as a service

Google Data Analysis, Artificial Intelligence and Predicting Vaccine Scares

Social media trends can predict tipping points in vaccine scares Analyzing trends on Twitter and Google can help predict vaccine ...
Hackers shut down infrastructure safety system in attack: FireEye

Hackers shut down infrastructure safety system in attack: FireEye

Hackers shut down infrastructure safety system (Reuters) - Hackers likely working for a nation-state recently penetrated the safety system of ...