pre-loading
backtotop
Cloud Storage
Cloud Storage

Achieve Data Security and Scalability with Google Cloud Storage: A Business Guide

April 7, 2022

In today's business world, data security and scalability are essential for success. Companies must protect sensitive information from cyber threats while also being able to quickly and easily access and process large amounts of data.  

This is where Google Cloud Storage comes in. This powerful platform offers businesses a secure and scalable solution for storing and managing data in the cloud

In this step-by-step guide, we will show you how to set up Google Cloud Storage and start using it to store and access your data in the cloud.

Whether you're new to cloud storage or an experienced user, this guide will walk you through the process of creating a new storage bucket, uploading files, and managing your data in the cloud. So, let's get started and explore the world of cloud storage with Google Cloud Storage!

Cloud storage Use case

In this blog we are going to configure GCS (Google Cloud Storage) in Google Cloud console,

Pre – requisites:

  1. Google cloud project  
  2. Billing account mapped to the project
  3. Owner permission for the project  
  4. Cloud Storage and Cloud Storage API enabled.

Configuration Steps:

Go to Google cloud console page and search for cloud storage in the list of services

After clicking Buckets, the dashboard will be shown here where you can see the list of buckets that are created in your projects, click CREATE.

You will be asked to fill the details for your bucket,

1. Name your bucket: Give a globally unique name

2. Choose where to store your data: Choose the region where your data should be residing,

3. Choose a storage class for your data: Choose your storage which suits your business requirement

a) Autoclass: Autoclass will transit each object to hotter or colder based on object-level activity, it will be used for optimization and to reduce latency

b) Standard: frequently accessed data, data retrieve is free

c) Nearline:  data that are accessed once in a month

d) Coldline: data that are accessed once in 3 months

e) Archive:  data that are accessed once a year

4. Choose how to control access to objects: Choose the access control methods for your objects in the buckets

A) Check public prevention for the bucket if you are not using the bucket for public

B) Uniform: It’s a bucket level permission applies to all objects

C) Fine-Grained: It’s a object level permission applies to individual objects

5. Choose how to protect object data: Choose how to protect your data

A) Versioning: Create a version for all objects

B) Retention: used for accidental deletion, it can be in days/months/years

6. Click CREATE, your bucket will be created in the specified region

After creating the bucket, you will be able to see the bucket related details in the dashboard.

In the objects folder you can be able to do the following:

UPLOAD FILES: Directly upload your files from your local machine.

UPLOAD FOLDER: Directly upload folders from your local machine.

CREATE FOLDER: Create a folder directly in cloud storage.

TRANSFER DATA: To transfer data in or out.

DELETE: Delete the selected file or folder

In the configuration folder, you will be able to see the bucket details.

In the permissions tab, you can grant access to the users you want, or you can make your bucket publicly accessible.

In the protection tab, if you have configured versioning or retention for your bucket’s, you can be able to see those details,

In the Lifecycle tab, you can be able to set policies for your data whether to delete the data after a certain period or change the storage class type after certain days or based on version type.

In the observability tab, you can see the dashboard of your required data for the buckets

Conclusions:

We were able to create a bucket with required permission for the data that are residing in it, we have also configured security policies and monitoring for our bucket.

Additional info: One pager with 360-degree coverage on Google Cloud Storage

More Blogs

Why use traditional desktops when you have Citrix DaaS?
Why use traditional desktops when you have Citrix DaaS?
Tue, May 25th 2021 8:04 AM

It is a flexible and cost-effective alternative to traditional desktop infrastructure, as it eliminates the need for expensive hardware and maintenance costs. Here’s an overview of the key benefits of Citrix DaaS...

Read more 
External link
Citrix Secure Private Access: An Essential Tool for Protecting Your Business Data
Citrix Secure Private Access: An Essential Tool for Protecting Your Business Data
Tue, May 25th 2021 8:04 AM

Organizations today are faced with increasingly complex network security challenges. To help address these challenges, many organizations are turning to...

Read more 
External link
Essential resources to secure your AWS infrastructure
Essential resources to secure your AWS infrastructure
Tue, May 25th 2021 8:04 AM

As a business or organization, it is important to ensure that your data and resources are secure on AWS. One way to do this is by obtaining...

Read more 
External link
Go back