Example: air traffic controller
Google Infrastructure Security Design Overview

Google Infrastructure Security Design Overview

Back to document page

one identity is used for calls that the VMM makes on behalf of the customer’s VM. This allows us to further segment the trust placed in calls coming from the VMM. GCE persistent disks are encrypted at-rest using keys protected by the central infrastructure key management system. This allows for automated rotation and

  Infrastructures, Customer

Download Google Infrastructure Security Design Overview

15
Please wait..

Information

Domain:

Source:

Link to this page:

Please notify us if you found a problem with this document:

Other abuse

Related search queries