confidential computing with gke
let’s see how easy it is to enable confidential computing on a gke cluster
cloud adoption framework with gcp
let’s go through resources such as the google cloud adoption framework, cloud center of excellence, the google cloud setup checklist and best practices for enterprise organizations and eventually the google cloud security foundations guide
gke’s service account
let’s discuss about how to deal with gke’s service account and few tips to improve your security posture, especially with fine-grained identity and authorization for applications with workload identity
zero trust security model with google’s beyondcorp
let’s see how google shared best practices and technologies about its own zero trust security model, beyondcorp