Landing Zone
Google Cloud landing zone platform to run scalable, production-ready enterprise workloads.
Last updated
Google Cloud landing zone platform to run scalable, production-ready enterprise workloads.
Last updated
A modular and scalable configuration that enables organizations to adopt Google Cloud for their business needs. A landing zone is a prerequisite to deploying enterprise workloads in a cloud environment.
Responsible team: Platform - Google Cloud Landing Zone
Response time for incidents: 60 minutes
Response time for other incidents: 120 minutes
Response time for support: 60 minutes
Response time for feedback: 30 minutes
Link to the roadmap: GitHub Project
Contact exclusively via:
Discord: Platform - Google Cloud Landing Zone
Phone number:
This repository manages centralized audit logging resources. Google Cloud services write audit logs that record administrative activities and access within your Google Cloud resources. help you answer "who did what, where, and when?" within your Google Cloud organization.
This repository manages a resource hierarchy and IAM. Metaphorically speaking, the resembles the file system found in traditional operating systems to organize and manage entities hierarchically. lets administrators authorize who can take action on specific resources, giving you complete control and visibility to manage Google Cloud resources centrally.
This repository manages the Terraform backend for management. Terraform uses persisted state data to keep track of the resources it manages. Most non-trivial Terraform configurations use a backend to store state remotely. This lets multiple people access the state data and work together on that collection of infrastructure resources. Terraform uses persisted state data to keep track of the resources it manages. Most non-trivial Terraform configurations use a backend to store state remotely. This lets multiple people access the state data and work together on that collection of infrastructure resources.
This repository configures . With , you can use Identity and Access Management (IAM) to grant external identities IAM roles, including the ability to impersonate service accounts. This lets you access resources directly using a and eliminates the maintenance and security burden associated with service account keys.