Trust and security

Google Cloud's security model, world-scale infrastructure, and unique capability to innovate will help keep your organization secure and compliant.

Google Data Center Security: 6 Layers Deep

Trusted cloud infrastructure

Take advantage of the same secure-by-design infrastructure, built-in protection, and global network that Google uses to protect your information, identities, applications, and devices. Our stack builds security through progressive layers that deliver true defense in depth at scale.

Encryption by default, at rest and in transit

We encrypt data in transit between our facilities and at rest, ensuring that it can only be accessed by authorized roles and services with audited access to the encryption keys. Learn more about how we encrypt data at rest and how we encrypt data in transit.

Learn about the mechanisms used by Google to encrypt data at rest

Leverage the best of Google Cloud security

See how Google Cloud can help you solve your toughest security challenges with our advanced security products and solutions.

“We chose Google because there are a number of security services that you can't get elsewhere, like Identity-Aware Proxy and encryption at rest by default.”

Leonard Austin, CTO, Ravelin
Read the case study

Cloud compliance

We undergo independent verification of our security, privacy, and compliance controls to help you meet your regulatory and policy objectives. Find details on our full set of compliance offerings, like ISO/IEC 27001/27017/27018/27701, SOC 1/2/3, PCI DSS, and FedRAMP certifications, and alignment with HIPAA, GDPR, and CCPA, among others, in our compliance resource center.

compliance badges
protection security shields

Data privacy

Protecting the privacy of Google Cloud Platform and Google Workspace customers is a priority and codified in our Enterprise Privacy Commitments, which guide our security and privacy practices. Learn more about how we protect privacy and keep you in control in our privacy resource center.

Transparency

We work to earn your trust through transparency. We state and adhere to a concrete set of trust principles that govern our approach to security. We only process data in accordance with our terms and data protection agreements and clearly outline our policies on responding to government requests.

clipboard with pencil and checkmark