Logo
  • About
  • Sources
  • Models
  • Tools
Contact Us
GCP - Mapping

GCP - Mapping

GCP:

1 – Endpoint (North / South)
2 – Endpoint (East / West)
3 – DDoS / WAF
Firewalls: Google - Cloud FirewallGoogle - Cloud Firewall Google - Cloud Cloud Security FoundationsGoogle - Cloud Cloud Security Foundations Google - Cloud IDSGoogle - Cloud IDS
Firewalls: Google - Cloud FirewallGoogle - Cloud Firewall Google - Cloud IDSGoogle - Cloud IDS
Google - Cloud CDNGoogle - Cloud CDN Google - Cloud ArmorGoogle - Cloud Armor Google - Web RiskGoogle - Web Risk
AV:
CASB: Google - Cloud Cloud Security FoundationsGoogle - Cloud Cloud Security Foundations
Google - Apigee API ManagementGoogle - Apigee API Management
Email Security:
Google - Sensitive Data Protection (DLP)Google - Sensitive Data Protection (DLP)
Google - reCAPTCHA EnterpriseGoogle - reCAPTCHA Enterprise
4 – Cloud SIEM / SOAR
5 – Vul Mgmt. / TI
6 – IAM / MFA / PAM
Google - Chronicle SIEMGoogle - Chronicle SIEM
Vuln Mgmt: Google - Security Command CenterGoogle - Security Command Center Google - Binary AuthorizationGoogle - Binary Authorization Google - AnthosGoogle - Anthos
Google - Cloud IdentityGoogle - Cloud Identity
Threat Intel: Google - Mandiant Threat IntelligenceGoogle - Mandiant Threat Intelligence
Google - Access Transparency and Access ApprovalGoogle - Access Transparency and Access Approval
7 – Endpoint (XDR AI/UBA)
8 – Workload Protection
9 – ZTNA
Google - Mandiant XDR PlatformGoogle - Mandiant XDR Platform
Google - Assured WorkloadsGoogle - Assured Workloads Google - VPS Service ControlsGoogle - VPS Service Controls
Google - Cloud VPNGoogle - Cloud VPN Google - BeyondCorp EnterpriseGoogle - BeyondCorp Enterprise
0 – Cross Framework
Backup & Recovery: Google - Backup and DR ServiceGoogle - Backup and DR Service
Encryption: Google - Cloud Key ManagementGoogle - Cloud Key Management Google - Confidential ComputingGoogle - Confidential Computing
Logo