Jump to Content

Protecting the world’s data
with industry-leading security

We’re dedicated to keeping everyone’s data safe with the most advanced technology, operated by skilled, trusted professionals.

Racks of servers in a data center

Safer with Google

Every Google product is designed for safety. It’s our responsibility to keep your personal information private, safe, and secure.

Safeguarding your data 24/7

Stay connected, reliably

With robust business continuity and disaster recovery measures in place, our data centers will shift access automatically to another data center in the event of a disruption. And our emergency backup generators continue to work even during power failures.

security-controlroom.jpg

To ensure our data centers run reliably 24/7, our employees at our data center control stations (as shown in our Mayes County, Oklahoma, data center above) monitor the building and its power structure with the ability to take calls from the field, validate repair tickets, and authorize repairs.

Google secures data through distributed, replicated servers

Google secures data through distributed, replicated servers.

Progressive layers of security across locations

We distribute all data across many computers in different locations, chunking and replicating it over multiple systems to avoid a single point of failure. We name these data chunks randomly to make them unreadable to the human eye.

Our six layers of physical security

See how our data centers are designed and operated with security in mind.

  • Layer One

    Property boundaries

    Signage and fencing surrounds the facility.

  • Layer Two

    Secure perimeter

    An anti-climb fence, vehicle crash barrier, overlapping thermal cameras, and 24/7 guard patrols protect the exterior.

  • Layer Three

    Building access

    Authorized access is required of everyone who enters the building, including multiple security checkpoints, ID badges, and iris scans to validate identity.

play pause

“We use thermal cameras and standard cameras, so we’re able to see video footage at night just as clearly as we can during the day.”

Tarik Billingsley
Google Data Centers Area Security Manager

  • Layer Four

    Security operations center

    This is the hive of the data center, where security teams monitor the facility 24 hours a day, 365 days a year.

  • Layer Five

    Data center floor

    Access to the actual server floor is highly restricted and involves multiple authentication factors.

  • Layer Six

    Crusher room

    This is where data storage devices are physically destroyed to prevent data recovery. Only authorized personnel have access to enter this secure storage unit.

Security doesn’t stop
at the physical data centers

cloud-promo.png

Keeping safety in mind with the Cloud

Google Cloud’s multifaceted protection is built upon six progressive layers to deliver defense-in-depth. From the hardware that is Google-built and hardened to our custom-made infrastructure, any application within our system deploys securely, using multiple mechanisms to establish and maintain trust. We encrypt everything from communications over the internet to every piece of data at rest within our network, enabling distribution for availability and reliability.

Learn more about Google Cloud infrastructure
  • Operational and device security

    We do not assume any trust between services, and use multiple mechanisms to establish and maintain trust — we designed our infrastructure to be multi-tenant from the start.

  • Internet communication

    We encrypt communications over the internet to our cloud services.

  • Identity

    We strongly authenticate all identities, users, and services.

  • Storage services

    Data stored on our infrastructure is automatically encrypted at rest and distributed for availability and reliability.

  • Service deployment

    This service ensures that only the individual or service with the right identity, accessing the right machine, authorized by the right code is accessing the right data, at the right time and context.

  • Hardware infrastructure

    By designing the components ourselves, we ensure they’re intentionally constructed to not include unnecessary components that could introduce vulnerabilities. Our custom built chip, Titan, establishes a hardware root of trust into our servers, reducing the risk of access gained through phished credentials.

Ongoing commitment to business continuity

To ensure continuous operations and services at our data centers, we have robust, ISO 22301:2019 certified business continuity and disaster recovery measures in place.