Certification Summary | Google Apps

Google Security Audits and Certifications At Google, ensuring the security of our users is a top priority, and we are constantly assessing how we can make our services even more secure. Google regularly undergoes independent verification of security, privacy and compliance controls. This means an independent auditor examines the controls present in our data centers, infrastructure and operations. These audits and certifications by accredited third-party auditors help verify the data protection technologies and processes Google is using, and show our commitment to protecting user data.

International Standards Organization (ISO) 27001 Certification ISO 27001 is a widely recognized, internationally accepted independent security standard. Google’s ISO 27001 certification covers the systems, applications, people, technology, processes, and data centers supporting Google Apps for Business and Google Apps for Education. Our compliance with the ISO 27001 standard was certified by Ernst & Young CertifyPoint, an ISO certification body accredited by the Dutch Accreditation Council, a member of the International Accreditation Forum (IAF). Certificates issued by Ernst & Young CertifyPoint are recognized as valid certificates in all countries with an IAF membership1. The ISO 27001 certification is composed of 114 controls. Highlights of Google’s certification include certifying: • Information security policies

• Physical and environmental security

• Organization of information security • Operations security • Asset management

• Logical security

• Access control

• Incident management

• Cryptography Auditors: Ernst & Young CertifyPoint

1

IAF Member Countries - http://www.iaf.nu//articles/IAF_MEMBERS_SIGNATORIES/4

SSAE 16/ISAE 3402 and SOC 2 Type II Audit A Service Organization Control (SOC) 2 report has a predefined set of principles and related criteria that are defined by American Institute of Certified Public Accountants (AICPA) and must be met to achieve an unqualified report. The criteria and report are widely recognized, and easily aligned with or compared to ISO 27001, National Institute for Standards & Technology (NIST) 800-53 and/or Control Objectives for Information and Related Technology (COBIT) information security frameworks. The Principles covered in the report include: • Security: The system is protected against unauthorized access (physical and logical). • Confidentiality: The system has controls so data that is stored in the cloud is shared with only the people you wish to share it with. • Processing Integrity: The system performs as you expect it to. Data is preserved to be the way you left it the last time you logged on. • Availability: The system has mechanisms to prevent or quickly correct any service outages, including redundant sites that are in place for business continuity and backup and recovery of customer data. Ernst & Young LLP completed its procedures for the SOC 2 Type II audit and noted no deviations from the specified criteria during the period of the report. Major control objectives and control activities covered by the audit include the following: • Logical security controls provide reasonable assurance that logical access to production systems is restricted to authorized individuals. • Data center physical security controls provide reasonable assurance that Google data centers and corporate offices are protected. • Incident management controls provide reasonable assurance that system

Auditors: Ernst & Young LLP

• Change management controls provide reasonable assurance that application and configuration changes are tracked, approved, tested and validated. • Organization and administration controls provide reasonable assurance that management provides the infrastructure and mechanisms to track and communicate initiatives, monitor compliance within the company and provide security training for the risks that impact Google. • System availability controls provide reasonable assurance that redundant sites are in place for services and recovery of customer data is possible. Overall conclusion: Ernst & Young issued an unqualified opinion with zero exceptions on any control objectives or control activities during the period for of the report. Time period covered: May 1, 2013 to April 30, 20142 Report types: Service Organization Control (SOC) 2 Type II reports are attestation reports issued by independent auditors under standards provided by the Auditing Standards Board (ASB) of the AICPA. Google’s SOC 2 report covers the Security, Confidentiality, Processing Integrity, and Availability principles set forth in the AICPA’s Trust Services Principles and Criteria. Updated: August 2014

2

Due to the nature of SSAE 16 / ISAE 3402 SOC 2 these audits will always reflect a time-frame that has passed. Audit reports. only measure controls at a point in time. The audit date may be in the past, but it is our current audit and has not expired.

Google Apps for Business and Google Apps for Education security audits and certification summary.

Products and Services Covered Google Drive Google Hangouts Gmail Google Calendar Google Docs Google Sheets Google Slides Google Apps Vault Google Sites Google Admin console3 Google Contacts Google Apps Script Google+ Google Now Google Groups Google Talk Directory API 4 Reports API5 SAML Based SSO API Google Cloud Platform security audits and certification summary.

Products and Services Covered Google Apps Engine Google Cloud Storage Google Compute Engine Google Cloud Datastore Google Big Query Google Cloud SQL

Formerly Control Panel Formerly Directory Sync, and Provisioning API 5 Formerly reporting API, and Audit API, and Audit API 3 4

© 2014 Google Inc. All rights reserved. Google and the Google logo are trademarks of Google Inc. All other company and product names may be trademarks of the respective companies with which they are associated. DS2030-1210

Google Security Audits and Certifications - Services

Google's certification include certifying: • Information security policies. • Organization of information security. • Asset management. • Access control. • Cryptography. 1 IAF Member Countries - http://www.iaf.nu//articles/IAF_MEMBERS_SIGNATORIES/4. Google Security Audits and Certifications. Certification Summary | Google ...

2MB Sizes 1 Downloads 182 Views

Recommend Documents

Google Security Audits and Certifications Services
Public Accountants (AICPA) and must be met to achieve an unqualified report. The criteria and report are widely recognized, and easily aligned with or compared to ISO 27001, National Institute for Standards & Technology (NIST). 800-53 and/or Control

Google Security Audits and Certifications - G Suite
(Google Apps Unlimited) and Google Apps for Education have achieved are ISO 27001, ISO 27018, SOC 2 and SOC 3. In this paper we will provide additional ...

Listing of Security of Security and Intelligence Services (India ... - NSE
Aug 8, 2017 - Members of the Exchange are hereby informed about the forthcoming listing of security (ies) on the. Exchange as follows: Name of the ...

Cloud Discover: Security Services
Cloud Discover: Security helps customers understand security controls and considerations in Google Cloud. Platform (GCP) and identify key business ...

Microsoft Exchange Information Services and Security Policies
This document describes the Microsoft Exchange information services and security policies that are supported by Android(TM) mobile technology platform release 2.2. .... kind of policy; in other words, no account policy can relax the degree of ...

Google Cloud Security Whitepapers Services
This document gives an overview of how security is designed into. Google's technical infrastructure. This global scale infrastructure is designed to provide security through the entire information processing lifecycle at Google. This infrastructure p

Cloud Security with Forseti - Services
Cloud Security with Forseti helps customers understand Google Cloud Platform security concerns and considerations and how to leverage ... Security Requirements Assessment. Assess customer's security requirements for Google Cloud Platform (GCP) throug

RH253 - Red Hat Enterprise Linux Network Services and Security ...
RH253 - Red Hat Enterprise Linux Network Services and Security Administration.pdf. RH253 - Red Hat Enterprise Linux Network Services and Security ...

Cloud Security with Forseti Services
... Ordering Document and any incorporated terms and conditions. The activities and deliverables described in this datasheet are subject to change. © 2017 Google Inc. All rights reserved. Google and the Google logo are trademarks of Google Inc. All

SECURITY SERVICES 2014.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. SECURITY ...

Security Services of Three Campuses.pdf
Bids will be opened in the presence of the. Bidder's representatives who choose to attend at the address below. Late bids shall not be accepted. 7.) The Guimaras State College reserves the right to accept or reject any or all bids, to annul the biddi

Google Cloud Security Whitepapers Services
Such code reviews require inspection and approval from at least one engineer other than the author, ... These techniques include normal Linux user separation, language .... and other major web services also have followed us in implementing.

Google Cloud Security Whitepapers Services
calls to and from low-level management services on the machine. Google has ..... and other security issues in all the open source software we use and upstreaming these issues ...... Data used in App Engine is stored in Cloud Datastore, Cloud SQL or C

Security Services of Three Campuses.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Security ...

Security Aspects in MCSoN Services - ijeecs.org
Index Terms— Anonymization, Mobile Social Network Services, Privacy, Social Network. 1 INTRODUCTION. S the ability to collect and store informa- tion about ...

Security Aspects in MCSoN Services - ijeecs.org
S. K. Jha is a Research Scholar in the Department of Computer Science,. Magadh University ... tinct and broad aspects to possess its services in coming years [3, 15]:. 1. Activity-based ..... This flexibility allows for a higher degree of optimizatio

Making Sense of GreenHome Certifications Hand Out April 15.pdf ...
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Making Sense of ...

Enhance Security and Usability Security and Usability Security and ...
Even though graphical passwords are difficult to guess and break, if someone direct observe during the password enter sessions, he/she probably figure out the password by guessing it randomly. Nevertheless, the issue of how to design the authenticati