Allow policy
A type of access a principal has, and sets conditions on this access
Application programming interface (API)
A library function or system access point with well-dened syntax and code that communicates with other applications and third-parties
Defense in depth
A layered approach to vulnerability management that reduces risk
Deny policy
A constraint that sets rules to prevent principals from carrying out certain actions
Detective control
A measure used to identify suspicious activity if it occurs
Identity control
A measure that helps authenticate a user before they access resources, like networks or storage
Lift and shift
A migration model where workloads are moved to the cloud with little to no modifications
Landing zone
A modular and scalable configuration that enables organizations to adopt Google Cloud for their business needs
Network control
A measure that helps protect access through network path
Principals
Represent either end users, or applications
Protective control
A measure that protects access to resources and shields against malicious attacks
Recovery control
A measure that restores access and functionality in the event of failures
Responsive control
An application or tool that uses automation to respond to security events
Roles
A collection of permissions that can be applied to principals
Router
A network device that connects multiple networks together
Service level agreement (SLA)
Quantifies the availability of services