Cloud Security Podcast by Google cover image

EP81 Demystify Data Sovereignty and Sovereign Cloud Secrets at Google Cloud

Cloud Security Podcast by Google

00:00

The Cpillar of Sovereignty

The key access justification is used to prevent cloud providers from accessing or turning over the data. But this has to be married with e paper control, because as a pure technical control, that wouldn't cut it,. So in that sense, you probably need some paper controls, not just code. We stand behind them with audits and technical controls as well as contract terms. That's how you actually do this really, for all our security controls and even our performance controls."

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app