pre-loading
backtotop
Cloud Storage
Cloud Storage

Achieve Data Security and Scalability with Google Cloud Storage: A Business Guide

April 7, 2022

In today's business world, data security and scalability are essential for success. Companies must protect sensitive information from cyber threats while also being able to quickly and easily access and process large amounts of data.  

This is where Google Cloud Storage comes in. This powerful platform offers businesses a secure and scalable solution for storing and managing data in the cloud

In this step-by-step guide, we will show you how to set up Google Cloud Storage and start using it to store and access your data in the cloud.

Whether you're new to cloud storage or an experienced user, this guide will walk you through the process of creating a new storage bucket, uploading files, and managing your data in the cloud. So, let's get started and explore the world of cloud storage with Google Cloud Storage!

Cloud storage Use case

In this blog we are going to configure GCS (Google Cloud Storage) in Google Cloud console,

Pre – requisites:

  1. Google cloud project  
  2. Billing account mapped to the project
  3. Owner permission for the project  
  4. Cloud Storage and Cloud Storage API enabled.

Configuration Steps:

Go to Google cloud console page and search for cloud storage in the list of services

After clicking Buckets, the dashboard will be shown here where you can see the list of buckets that are created in your projects, click CREATE.

You will be asked to fill the details for your bucket,

1. Name your bucket: Give a globally unique name

2. Choose where to store your data: Choose the region where your data should be residing,

3. Choose a storage class for your data: Choose your storage which suits your business requirement

a) Autoclass: Autoclass will transit each object to hotter or colder based on object-level activity, it will be used for optimization and to reduce latency

b) Standard: frequently accessed data, data retrieve is free

c) Nearline:  data that are accessed once in a month

d) Coldline: data that are accessed once in 3 months

e) Archive:  data that are accessed once a year

4. Choose how to control access to objects: Choose the access control methods for your objects in the buckets

A) Check public prevention for the bucket if you are not using the bucket for public

B) Uniform: It’s a bucket level permission applies to all objects

C) Fine-Grained: It’s a object level permission applies to individual objects

5. Choose how to protect object data: Choose how to protect your data

A) Versioning: Create a version for all objects

B) Retention: used for accidental deletion, it can be in days/months/years

6. Click CREATE, your bucket will be created in the specified region

After creating the bucket, you will be able to see the bucket related details in the dashboard.

In the objects folder you can be able to do the following:

UPLOAD FILES: Directly upload your files from your local machine.

UPLOAD FOLDER: Directly upload folders from your local machine.

CREATE FOLDER: Create a folder directly in cloud storage.

TRANSFER DATA: To transfer data in or out.

DELETE: Delete the selected file or folder

In the configuration folder, you will be able to see the bucket details.

In the permissions tab, you can grant access to the users you want, or you can make your bucket publicly accessible.

In the protection tab, if you have configured versioning or retention for your bucket’s, you can be able to see those details,

In the Lifecycle tab, you can be able to set policies for your data whether to delete the data after a certain period or change the storage class type after certain days or based on version type.

In the observability tab, you can see the dashboard of your required data for the buckets

Conclusions:

We were able to create a bucket with required permission for the data that are residing in it, we have also configured security policies and monitoring for our bucket.

Additional info: One pager with 360-degree coverage on Google Cloud Storage

More Blogs

Building a VPN from on-premises/hybrid to GCP
Building a VPN from on-premises/hybrid to GCP
Tue, May 25th 2021 8:04 AM

As more and more businesses move to the cloud, it is important to have secure and reliable connections between on-premises and cloud resources. This is where a VPN (Virtual Private Network) comes in.

Read more 
External link
Take control of Security and Risk Management with Google Cloud
Take control of Security and Risk Management with Google Cloud
Tue, May 25th 2021 8:04 AM

Security Command Center is a comprehensive security management platform designed to help organizations detect and respond to threats in real-time. It provides a centralized view of an organization's security posture, enabling security teams to quickly identify and mitigate security risks.

Read more 
External link
Enable secure access to applications and resources with BeyondCorp Enterprise
Enable secure access to applications and resources with BeyondCorp Enterprise
Tue, May 25th 2021 8:04 AM

The rise of digital technology has revolutionized the way we work, but it has also introduced new security risks. As companies rely more heavily on digital technology and data, they must also ensure that their data is protected from malicious actors.

Read more 
External link
Go back