Skip to content

Google Cloud Security Quick Start

GCP Security Posture Assessment

GCP Security Quickstart is a service designed to remediate high and critical flaws in Google Cloud Platform, reducing the attack surface and risk exposure. Remediation is sometimes a prerequisite before the integration of DevSecOps work is performed.

Mekas will follow the best practices and recommendations published as part of Google Cloud Security Frame Work.

Mekas certified professionals follow best practices tailored to your needs, safeguarding cloud computing environments, applications, and data. No matter what stage your company is now, we are here to provide complete impactful support.

Our Approach

Assess -> Recommand -> Review -> Implement

Improve the security posture of your Google Cloud Platform (GCP) environment, with the help of Mekas experts. We review your current configurations and platform controls, provide detailed recommendations, and present best practices to reduce risk and mitigate common threats to your environment.

  • Mekas team will review and evaluate the current architecture and security configurations of your GCP environment, as compared to GCP security best practices
  • Mekas will capture findings and develop a report with recommendations on how to improve the security posture of your GCP environment
  • Mekas team will review high level recommendations with a list of security action items and implementation next steps


Security Operations

  • Audit Logging
  • Data access logs
  • Firewall Logs
  • Log sinks
  • Log exports to SIEM
  • Cloud Command Center
  • Web Scanner setup

Network Security

  • VPC/Shared VPC network configuration
  • Disable default network creation
  • Create custom network
  • Firewall rules
  • VPC Service Controls
  • Cloud Load Balancing
  • Cloud Armor (DDOS & WAF)

Identity & Access Management

  • Secure Super admin accounts  
  • MFA authentication
  • Integrate with on premises Active Directory 
  • Audit IAM access and role based access
  • Service accounts and keys
  • IAM bindings

Data Security

  • Encryption key management
  • Cloud Storage security
  • BigQuery security
  • Cloud SQL security
  • Data Loss Prevention