Google Cloud Firewall is a totally distributed, cloud-first, stateful firewall service that scales mechanically to guard your cloud workloads. Google Cloud Firewall affords a singular and easy method for customers to use a dependable Zero Belief community safety management of their cloud atmosphere with none routing modifications.
Earlier this yr, we launched the Cloud Firewall Customary tier that added Totally Certified Area Identify (FQDN) objects, geo-location objects and threat-intelligence capabilities. And at Subsequent 23, we introduced the Cloud Firewall Plus tier in preview, which provides an intrusion prevention service (IPS). Together with transport layer safety (TLS) inspection for encrypted visitors visibility, Cloud Firewall Plus supplies community safety in opposition to malware, spy ware, and command-and-control assaults.
Our evolution to Cloud Subsequent Era Firewall (NGFW) with Cloud Firewall Plus
Cloud Firewall Plus integrates Palo Alto Networks risk prevention know-how with Google Cloud’s distributed Firewall cloth to offer our customers superior safety with NGFW capabilities. This distinctive method permits our customers to use best-in-class safety protections with simplicity and scale to their dynamic cloud atmosphere. Cloud Firewall Plus embeds Palo Alto Networks powered risk prevention applied sciences and inspects north-south, east-west, TLS and non-TLS visitors offering clear inline safety in your Google Cloud workloads.
Cloud Firewall Plus affords IPS capabilities as a totally built-in Layer 7 module supported by hierarchical firewall insurance policies and tag-based firewall guidelines. This method makes it attainable for Google Cloud customers to deploy risk prevention companies with out community or topology modifications and can assist cut back general infrastructure administration and operational prices.
Cloud Firewall’s distinctive hierarchical firewall coverage permits you to implement granular firewall guidelines on the group and folder ranges within the Google Cloud useful resource hierarchy. The hierarchical insurance policies can assist you construct layered controls that may be simply delegated and independently audited for drift.
IAM-governed tags are tags managed by IAM permissions. These tags enable customers to outline their community firewall insurance policies when it comes to logical groupings and delegate the administration of these teams inside their group with fine-grained authorization controls. When safety occasions happen, the usage of IAM-governed tags may hasten the response to the incident. For instance, you possibly can apply a tag to an contaminated system to set off a remediation response resembling isolating the contaminated system from the remainder of the community to forestall lateral motion.
Simplicity, scale, and efficiency with Cloud Firewall Plus
Cloud Firewall’s intrusion prevention service works by redirecting visitors for inspection by Google Cloud-managed zonal firewall endpoints via packet interception know-how. By way of this mechanism, risk prevention capabilities may be inserted between any two related community interfaces in Google Cloud, between two peered digital non-public clouds (VPCs) networks, throughout the similar VPC or throughout the similar subnet, with none routing or community topology modifications.
You’ll be able to allow the intrusion prevention service in Cloud Firewall Plus with the next steps:
- Create Firewall Endpoints in zones the place you want the service and affiliate the VPC networks with these endpoints. These endpoints may be shared between completely different VPCs in your group.
- Construct safety profiles and outline risk response actions.
- Configure Cloud Firewall Coverage guidelines with an outlined motion for L7 inspection utilizing the safety profile you created.
Cloud Firewall Plus is a cloud-first service with Google overseeing the infrastructure, load balancing, autoscaling, software program model updates, and risk signature updates for the firewall endpoints. The totally distributed firewall knowledge aircraft mechanically scales with the dynamic workload to keep away from creating choke factors, and the zonal firewall endpoints present firewall inspection near the workload minimizing latency.