Google has introduced a new set of services to provide cloud customers with improved protection from unsafe websites, distributed denial of service (DDoS) attacks, and other threats.
With the newly introduced Web Risk API, currently in beta, client applications can check URLs against Google’s lists of unsafe web resources, such as phishing and deceptive sites, and sites hosting malware or unwanted software.
The new Google Cloud service allows organizations to quickly identify known bad sites and warn users that clicking on specific links may lead to risky pages. It can also be used to prevent users from posting links to known malicious pages, Google says.
Powered by the same technology as Safe Browsing, Web Risk API leverages data on over a million unsafe URLs that Google maintains by examining billions of links each day, and allows enterprises to leverage the technology to keep their users safe.
Google also announced the general availability of Cloud Armor, a DDoS defense and Web Application Firewall (WAF) service for the Google Cloud Platform (GCP).
Based on the same technology used to protect services such as Search, Gmail and YouTube, Cloud Armor delivers L3/L4 DDoS defense, along with IP Allow/Deny capabilities for applications or services behind the Cloud HTTP/S Load Balancer.
The release is accompanied by a new Cloud Armor dashboard in Stackdriver Monitoring to monitor and analyze traffic subject to Cloud Armor protection, while also making it easy for users to evaluate the potential impact of proposed rules on their whole project.
Google also announced the general availability of Cloud HSM, its managed cloud-hosted hardware security module service on GCP, which can protect encryption keys and perform cryptographic operations in FIPS 140-2 Level 3 certified HSMs.
Meant to protect sensitive workloads while eliminating the hassle of managing an HSM cluster, the service has been available in several locations across the US and is now available for GCP customers in multiple locations in Europe as well.
“Any type of new services offered by the cloud vendors are useful, but there isn’t anything new being offered that was not already on offer by an existing vendor. There are entire markets built around web gateways, DDOS protection, and encryption key management. An evaluation would need to be performed to understand what benefits Google provides already well-established security vendors,” Chris Morales, head of security analytics at Vectra, told SecurityWeek in an emailed comment.
“I think the biggest problem facing the cloud is ensuring only the right people have access to data stored in cloud workloads. Inside the confines of the enterprise network, misconfigured systems and applications aren’t as susceptible to compromise because there are already other internal controls limiting external access, but even then, these systems are easily compromised by attackers who infiltrate the network. In the cloud, a simple misconfiguration or exposure of system access means there are no defenses in place to stop someone from just taking everything. The potential for misconfiguration of access to cloud workloads is real,” Morales said.