Security is our priority.

Google Cloud combines a robust, world-scale infrastructure with a unique capability to innovate and stay ahead of the curve in security. Join the millions of businesses that already trust Google to keep their data safe every day.

Google Security

Raising the bar in security and privacy.

By designing and operating our entire computing stack, we control our production environments and can respond to issues, globally, at light speed. No other cloud provider offers this kind of comprehensive security, reliability, and operational autonomy. With over 650 of the world’s best security engineers behind Google’s cloud, we bring more resources and advanced expertise to bear than any on-premise solution can offer.

Over 650

The number of Google engineers dedicated to your security.

Compliance

Certifications, audits, and compliance.

To ensure our users’ security, we regularly undergo independent verification of security, privacy, and compliance controls.

Third-party Audits

Our certifications from third-party auditors may include SOC 1, SOC 2, SOC 3, ISO 27001, ISO 27017, ISO 27018, and PCI DSS v3.1.

Cloud Platform badges

HIPAA

Google Cloud Platform supports customers covered by the U.S. Health Insurance Portability and Accountability Act (HIPAA) by entering into a Business Associate Agreement.

Europe

For our customers subject to European Data Protection Regulations, we offer compliance with EU model contract clauses as an additional means of meeting the adequacy and security requirements of the European Parliament.

We are also committed to meeting the new standards of the Privacy Shield across our products and services, and will work with Europe’s Data Protection Authorities on EU-US Privacy Shield inquiries.

Learn more about Cloud compliance

Third-party Audits

Our certifications from third-party auditors may include SOC 1, SOC 2, SOC 3, ISO 27001, ISO 27017, ISO 27018, and FedRAMP.

G Suite badges

HIPAA

Many G Suite products support our customers’ compliance with the U.S. Health Insurance Portability and Accountability Act (HIPAA), which governs the safeguarding, use, and disclosure of protected health information.

Europe

For our customers in Europe, we provide capabilities and contractual commitments designed specifically to help address EU data protection requirements and the guidance provided by the Article 29 Working Party. G Suite offers EU Model Contract Clauses and a Data Processing Amendment. Additionally, G Suite has been assessed as appropriate for use with the UK government’s Security Principles for information classified as OFFICIAL (including OFFICIAL-SENSITIVE).

We are also committed to meeting the new standards of the Privacy Shield across our products and services, and will work with Europe’s Data Protection Authorities on EU-US Privacy Shield inquiries.

Learn more about G Suite compliance
image for 'See Google security in action.''
Take a tour

See Google security in action.

Take a virtual tour of a Google Data Center
Security Principles

Why choose Google?

We’ve always been driven to solve big problems, and we tackle security with the same spirit. We provide advanced, transparent, user-centric security to help you keep your data safe online. Here’s how we do it:

Protection built into every step.

We control our entire technology stack. This span allows us to detect threats quickly, react effectively, and even anticipate incidents. Through data sharing, advanced encryption, routine key rotation, and machine-learned anomaly detection across our global operations, Google has exceptional insights and scaled protections in place to ensure your data remains secure. And when it comes to deploying software updates at scale, Google’s culture of rigorous code review, coupled with our company-wide continuous testing infrastructure, helps protect your data and optimizes for uptime whenever new software is deployed.

Learn more about our data centers

Your data, in your control.

Google only uses your data to provide the service you’ve purchased from us. We don’t use your data for advertising or any other business. We give you the tools you need to manage your company’s information at all times — like our Admin console or our reports, logs, and APIs — so you can always see how we handle your data. And our Transparency Reports clearly outline our policies on sharing data with government agencies.

Streamlined security management.

Google mitigates security threats so you don’t have to worry about critical, but time-consuming, tasks like system monitoring, patching, and upgrading. And our technology helps keep your users safe too. Google offers administrators extensive control over system configuration and application settings — all integrated in a single dashboard with easy-to-use security features including:

  • Data Loss Prevention (DLP)
  • Vault and e-Discovery
  • Security Keys
  • Information Rights Management (IRM)
  • Mobile Device Management (MDM)
  • Spam & Malware Detection
  • Identity Services (IDaaS)
  • Forward Secrecy
  • Two Factor Authentication
  • Anomalous Behavior Detection
Learn more about data protection features

The management and operational capabilities give us full control. We wouldn’t be able to reproduce this level of data protection with a competitor’s product.”

Ed Obuchowski

Senior Vice President, Advisor Technology Solutions, Charles Schwab

Summits & Workshops

Join the conversation.

We have several programs designed to help us communicate our latest security updates and work closely with our customers and partners to solve specific issues.

Summits

Our security leadership is committed to participating in discussion with the global security community by way of regular appearances at summits worldwide, including our own NEXT events.

Workshops

Google Cloud security workshops are designed to help our partners and customers rethink their security and strengthen their configuration for the future. These workshops include:

  • Updates on the latest security developments from Google
  • Security reviews: deep dives into security settings and controls
  • Advice on how to plan and monitor for incidents
  • Guidance for developing a quick and effective response to any incident

Future-proof your enterprise.

Let us know what you're looking for and we’ll follow up to discuss your needs.

Contact us