GCP Comics #8 Security with reverse proxy

A reverse proxy stands in front of your data, services, or virtual machines, catching requests from anywhere in the world and carefully checking each one to see if it is allowed.

  • Who are you (the individual making the request)? Do you have access permission (authorization)?
  • What are you using to make the request? How healthy is your device right now? What location are you at? At what time are you making the request?

This issue of GCP Comics presents an example of accessing some rather…


Summary of #BuildonGCP architecture series

👋 Hi Cloud Devs!!
Last year I created #13DaysOfGCP mini series on Twitter which you all loved. So, here I compiled 13 more common Google Cloud reference architectures. If you were not able to catch it, or if you missed a few days, here I bring to you the summary!

0: Build on GCP series intro

#BuildonGCP

1: Build a streaming video analytics pipeline using Google Cloud


GCP Comics #7 Device security

In a zero trust environment, every device has to earn trust in order to be granted access. When determining whether access should be granted, the security system relies on device metadata, such as what software is running or when the OS was last updated, and checks to see if the device meets that organization’s minimum bar for health.

Think of it like your temperature: under 100 degrees and you are safe, but go over and you are now medically in fever territory, and you may not be allowed into certain venues.


How important are security key in zero trust?

GCP Comics #6 Security keys in Cybersecurity

A security key is a physical device that works alongside your username and password to verify your identity to a site or app. They provide stronger login protection than an authenticator app or SMS codes, and the same device can be used for many services, so you don’t need to carry around a necklace of dongles and fobs.

In this issue of GCP Comics we are covering exactly that. Think of a Security Key as a way to protect yourself–and your company–from bad passwords and tricked users, as…


Data Science project for sustainable energy

Google Cloud and Makani behind-the-scenes story to fight climate change.

How do you approach the monumental challenge of innovating renewable energy?

During a 13-year project that concluded in 2020, the Makani team took on this challenge using technology inspired by kite surfing. I was intrigued and wanted to learn more about the project and how Google Cloud played a part in the search for a new kind of wind powered energy.

Here is the behind-the-scenes video of what I learned

How did the Makani’s wind energy kite actually work?

Makani’s energy kite was an aerodynamic wing tethered to a ground station. To begin flight, the kite used rotors to hover vertically in the air. Once at full tether length…


Best cheatsheet to answer “What is Dataproc?”

Managed Hadoop & Spark #GCPSketchnote

If you are using Hadoop ecosystem and want to make it easier to manage then Dataproc is the tool to checkout.

Dataproc automation helps you create clusters quickly, manage them easily, and save money by turning clusters off when you don’t need them. With less time and money spent on administration, you can focus on what matters the most — your DATA!

In this video I summarize the what Dataproc offers in 2 mins.


What is Zero Trust Identity security?

GCP Comics #5 Identity and Zero Trust Model

Autors: Priyanka Vergadia & Max Salonstall

A zero trust network is one in which no person, device, or network enjoys inherent trust. All trust, which allows access to information, must be earned, and the first step of that is demonstrating valid identity. A system needs to know who you are, confidently, before it can determine what you should have access to. Add to that the understanding of what you can access — authorization — and you’ve got the core foundation of zero trust security.


HOW IS DATA ENCRYPTED IN CLOUD?

GCP Comics #4: Encryption to secure your data in cloud

Encryption is a process that takes plaintext as input, and transforms it into an output (ciphertext) that reveals little or no information about the plaintext. A public encryption algorithm is used, but execution depends on a key, which is kept secret. To decrypt the ciphertext back to its original form, the key needs to be used.

  • Encryption at rest — used to protect data that is stored on a disk (including solid-state drives) or backup media.
  • Encryption in transit — used to…


What is Defense in depth?

Security is one of the great challenges of our time. Imagine being Google as part of serving and protecting eight apps with more than a billion users each. Google filters millions of spam messages a minute, spots thousands of suspicious web pages a day, and delivers almost unimaginable amounts of encrypted traffic, over what may be the world’s largest proprietary network. With Google Cloud, you get to use this sophisticated security in your businesses and apps.

In this issue of GCP Comics we are covering exactly…


Best cheatsheet to learn GKE

#GCPSketchnote

I will be honest GKE have always sounded cool to me but I have not fully grasped its power until a few weeks ago when I used it for a project. I thought it might be useful to create notes for others to take advantage of my research.

Here are my notes from all the research I did to understand GKE

GCP Sketchnote on Google Kubernetes Engine

You can also checkout the explainer video where I walk through these concepts in detail

Explainer video on the topic — “What is Google Kubernetes Engine?”

Next steps

If you like this #GCPSketchnote then subscribe to my YouTube channel 👇 where I post a sketchnote on one topic every week!

Follow my website for…

Priyanka Vergadia

Developer Advocate @Google, Artist & Traveler! Twitter @pvergadia

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store