DiscoverGoogle Cloud Platform PodcastAssured Workloads with Key Access Justifications with Bryce Buffaloe and Seth Denney
Assured Workloads with Key Access Justifications with Bryce Buffaloe and Seth Denney

Assured Workloads with Key Access Justifications with Bryce Buffaloe and Seth Denney

Update: 2022-11-02
Share

Description

Hosts Max Saltonstall and Daryl Ducharme are joined by Bryce Buffaloe and Seth Denney to chat about Assured Workloads and the sovereignty control Key Access Justifications so customers can see how their data is used and control who can see what.

Assured Workloads with Google is a security and compliance engine that allows users to control their data with the help of Google. With the expansion of data use around the globe, data sovereignty has become more important as well, and Google Cloud products offer myriad tools to maintain control, privacy, and compliance no matter the location. Seth talks more about sovereignty and how it’s changing data storage and management. Our guests talk about how Google has tackled the sovereignty issues, difficult decisions that had to be made, and the process of working with clients to optimize tools for different security and sovereignty scenarios.

With Key Access Justifications, Google has bolstered its offerings to provide clients with trustworthy controls to keep data secure and sovereign, from Compute Engine VMs to BigQuery. We learn what Key Access Justifications look like for users and how the encryption keys work in different Google Cloud services. Customer managed key material is stored outside of Google and the key manager must give permission for access for an added layer of trust and security. Seth and Bryce explain why this is important and describe how KAJ are used with some examples. These features may also be used to improve security in the future by preventing data from being decrypted and stolen should someone ever get access to your system. We hear more about the future of data security and sovereignty, including simplifying the process with managed services and easier onboarding. Strategic European partnerships are helping Google tackle these important issues overseas so clients can focus on their businesses and worry less about data security.

The catalyst for KAJ was a large German bank that recognized the sovereignty changes coming, and we hear more about the origins of KAJ and the path to where it is today. When paired with Assured Workloads, clients get maximum sovereignty coverage. Seth talks a little about the Sovereignty Access Controls done internally as well. Bryce walks us through using these Google services with a European example.

Bryce Buffaloe

Bryce is Product manager for Google Cloud Security managing the portfolio of the Assured Workload’s solution suite.

Seth Denney

Seth is KAJ Tech Lead, responsible for ensuring the integrity and usefulness of KAJs to support customer data sovereignty

Cool things of the week
  • DevFests site
  • Best Kept Security Secrets: Tap into the power of Organization Policy Service podcast
Interview
  • Assured Workloads site
  • Assured Workloads Playlist videos
  • Key Access Justifications docs
  • Compute Engine site
  • BigQuery site
  • GCP Podcast Episode 325: Digital Sovereignty with Archana Ramamoorthy and Julien Blanchez podcast
  • T Systems site
What’s something cool you’re working on?

Daryl just released a video about using Workflows’ new parallel step.

Max is working on crossover episodes across our various podcast streams, so we can have SRE guests on to the GCP podcast to talk reliability, for example, or bring some of the Kubernetes hosts to the Cloud Security podcast to discuss securing Kubernetes workloads.

Hosts

Max Saltonstall and Daryl Ducharme

Comments 
In Channel
2022 Year End Wrap Up

2022 Year End Wrap Up

2022-12-2139:20

loading
00:00
00:00
1.0x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

Assured Workloads with Key Access Justifications with Bryce Buffaloe and Seth Denney

Assured Workloads with Key Access Justifications with Bryce Buffaloe and Seth Denney