SECURITY CONSULTANCY

Asset 15
Asset 15

Cloud Ace

Will conduct a review of applications and systems built on Google Cloud Platform (GCP) and identify potential risks on Customer's applications and systems. Based on that, Cloud Ace will propose solutions to outstanding security issues as well as system optimization solutions for customers.

Asset 7@2x
Asset 15

Appropriate security consulting service for Customers

Asset 15
Asset 6

Customers who are new to GCP and do not have much experience in system security
Asset 7-1

Customers want to optimize system security on GCP but don't know where to start.
Asset 3-1

Want to check the security level of the system built on GCP
Asset 4-1

There is no application security solution on the Web server.
Asset 5-1

There is no application security solution on the Web server.

Service Overview

The infrastructure of GCP fully meets the strictest security standards in the world, is managed and operated by Google itself. Customers only need to focus on building security policies for their applications and data when building systems on GCP.

Asset 7
Asset 8

Cloud Ace's security consulting service is performed by experts and engineers with many years of experience working on GCP. Accordingly, Cloud Ace will conduct a review of the customer's system built on GCP to identify outstanding security issues of the system. Based on that, Cloud Ace will propose the most optimal solutions to solve security problems and risks on the Customer's system.

Asset 15

Common security problems

Incident 1

Incident

Company A is developing an application on the public cloud. Suddenly the monthly payment amount spiked for no apparent reason. After checking the invoice, it was discovered that many servers are initialized, but the origin is unknown.

Incident 2

Incident

Company B provides an electronic payment application, which is linked to the user's bank account.

Due to the wrong setting, the personal information of users registered on the application is made public on public Cloud storage services. From there, they discovered that the personal data on the application was not encrypted when uploaded to the Cloud.

Cause

  • Experiencing test servers or test environment.
  • Running environmental non-emergency response.
  • Experiencing a demo of GCE.

Cause

  • Experiencing test servers or test environment.
  • Running environmental non-emergency response.
  • Experiencing a demo of GCE.

Incident 1

Incident

Company A is developing an application on the public cloud. Suddenly the monthly payment amount spiked for no apparent reason. After checking the invoice, it was discovered that many servers are initialized, but the origin is unknown.

Cause

  • Experiencing test servers or test environment.
  • Running environmental non-emergency response.
  • Experiencing a demo of GCE.

Incident 2

Incident

Company B provides an electronic payment application, which is linked to the user's bank account.

Due to the wrong setting, the personal information of users registered on the application is made public on public Cloud storage services. From there, they discovered that the personal data on the application was not encrypted when uploaded to the Cloud.

Cause

  • Experiencing test servers or test environment.
  • Running environmental non-emergency response.
  • Experiencing a demo of GCE.

Security
on Public Cloud

Customers who want to use a disaster response environment are not high Customers can refer to security-related content on GCP and public Cloud at articles

About the security and trustworthiness of Google Cloud
Cybersecurity Insiders “Cloud Security Report 2019”
Asset 15

CONTACT US TO FIND OUT MORE

Asset 7