![]() ![]() ![]() For instance, you can choose to use the blueprint’s existing network and logging modules. The blueprint allows for flexibility – you can start a new initiative or configure it to deploy into your existing environment. IaC techniques can also help you simplify the regulatory and compliance reviews that your enterprise performs. This blueprint provides infrastructure as code (IaC) techniques such as codifying your infrastructure and declaring your environment that allow your teams to analyze the controls and compare them against your enterprise requirements for creating, deploying, and operating your data warehouse. The blueprint helps address this need in different ways by providing you with code techniques, best practices on data governance, and example patterns to achieve your security goals. Limited security experience or knowledge of best practices can inhibit your data warehouse transformation plans. Let’s explore some benefits this blueprint can provide for your organization: accelerate business analysis securely and provide strong baseline security controls for your data warehouse. You can then adapt and customize the blueprint to your enterprise’s requirements for your most sensitive data. To get started, you can discuss recommended security controls with your team by using the blueprint as a framework. Make sure the tools used, such as Looker, have appropriate access to the data warehouse. For the data presentation component, which is outside of the scope of the blueprint, use your team’s chosen business intelligence tools. The blueprint can create these components for you by showing you how to deploy and configure the appropriate cloud services in your environment. The security posture component aids in detection, monitoring, and response. The classification and data governance component manages your encryption keys, de-identification template, and data classification taxonomy. The data warehouse component handles storage and de-identification of data, which can later be re-identified through a separate process. The landing area ingests batch or streaming data. The blueprint consists of multiple components: The blueprint’s architecture can help you not only cover your data’s life cycle, but also incorporate a governance and security posture as seen in the following diagram. The secure data warehouse blueprint provides security best practices to help protect your data and accelerate your adoption of Google Cloud's data, machine learning (ML), and artificial intelligence (AI) solutions. ![]() What is the secure data warehouse blueprint? To help accelerate your data warehouse deployment and enable security controls, we've designed the secure data warehouse blueprint. However, customers have told us that their teams invest a great deal of time in protecting the sensitive data in cloud-based data warehouses. Many enterprises take advantage of cloud capabilities to analyze their sensitive business data. Today, we’re excited to share a new addition to our portfolio of blueprints with the publication of our Secure Data Warehouse Blueprint guide and deployable Terraform. ![]() With our belief in shared fate driving us to make it easier to build strong security into deployments, we provide security best practices and opinionated guidance for customers in the form of security blueprints. As Google Cloud continues our efforts to be the industry’s most trusted cloud, we’re taking an active stake to help customers achieve better security for their cloud data warehouses. ![]()
0 Comments
Leave a Reply. |