Please enable JavaScript.
Coggle requires JavaScript to display documents.
Data Protection - Coggle Diagram
Data Protection
Distributed Denial of Service Attacks (DDoS) Mitigation
Protecting Shared Infrastructure
Reduce the Attack Surface
Isolate Internal Traffic from the External World
Enable Proxy-Based Load Balancing
Scale to Absorb the Attack
Protection with CDN Offloading
Deploy Third-Party DDos Protection Solutions
App Engine Deployment
Cloud Security Command Center
Asset Discovery and Inventory
Sensitive Data Identification
Application Vulnerability Detection
Access Control Monitoring
Anomaly Detection from Google
Third-Party Security Tool Inputs
Real-Time Notifications
Cloud Data Loss Prevention (DLP)
InfoTypes and infoType Detector
Kinds of infoType Detectors
Inspection Rules
Likelihood Value
De-Identification
Forseti
Inventory
Scanner
Enforcer
Explain
Notifier
Security Partner Products
Infrastructure Protection
Data Protection
Logging and Monitoring
Configuration, Vulnerability, Risk and Compliance
Cloud Armor
IP Address Deny and Allow List at the Network Edge
Block Unauthorized Traffic
Allow Traffic to the HTTPS Load Balancer
Cloud Security Scanner
Identity-Aware Proxy (IAP)
How IAP Works
Securing IAP
IAP TCP Forwarding