Trusted Infrastructure

MULTI-LAYERED SECURITY

Our cloud infrastructure doesn’t rely on any single technology to make it secure. Our stack builds security through progressive layers that deliver true defense in depth.

Operational and Device Security

We develop and deploy infrastructure software using rigorous security practices. Our operations teams detect and respond to threats to the infrastructure from both insiders and external actors, 24/7/365.

Internet Communication

Communications over the Internet to our public cloud services are encrypted in transit. Our network and infrastructure have multiple layers of protection to defend our customers against Denial of Service attacks.

Identity

Identities, users, and services are strongly authenticated with multiple factors. Access to sensitive data is protected by advanced tools like phishing-resistant Security Keys.

Storage Services

Data stored on our infrastructure is automatically encrypted at rest and distributed for availability and reliability. This helps guard against unauthorized access and service interruptions.

Service Deployment

Any application that runs on our infrastructure is deployed with security in mind. We don’t assume any trust between services, and we use multiple mechanisms to establish and maintain trust. Our infrastructure was designed to be multi-tenant from the start.

Hardware Infrastructure

From the physical premises to the purpose-built servers, networking equipment, and custom security chips to the low-level software stack running on every machine, our entire hardware infrastructure is Google-controlled, -secured, -built, and -hardened.

OUR NETWORK

Google owns and operates one of the largest backbone networks in the world connecting our data centers with hundreds of thousands of miles of fiber optic cable. We use advanced software-defined networking and edge caching services to deliver fast, scalable, and consistent performance. When your traffic is on our network, it no longer transits the public Internet, making it less likely to be attacked, intercepted, or manipulated.

  • Regions

    Current regions & number of zones* Future regions & number of zones*
    Oregon (3) Los Angeles (3)
    Iowa (4) Montreal (3)
    N Virginia (3) Netherlands (2)
    S Carolina (3) Finland (3)
    São Paulo (3) Mumbai (3)
    London (3)
    Belgium (3)
    Frankfurt (3)
    Tokyo (3)
    Taiwan (3)
    Singapore (2)
    Sydney (3)
    * While some regions may launch with 2 zones, all regions are planned for a minimum of 3 zones.
    Netherlands Mumbai Singapore Finland London N Virginia Montreal Los Angeles São Paulo Frankfurt Sydney Taiwan Hong Kong Tokyo Belgium S Carolina Iowa Oregon Oregon 3 3 3 2 3 3 2 3 3 3 3 3 4 3 3 3 3 3 3
  • Network