Landing Zone
Google Cloud landing zone platform to run scalable, production-ready enterprise workloads.
Last updated
Was this helpful?
Google Cloud landing zone platform to run scalable, production-ready enterprise workloads.
Last updated
Was this helpful?
A modular and scalable configuration that enables organizations to adopt Google Cloud for their business needs. A is a prerequisite to deploying enterprise workloads in a cloud environment.
Response time for incidents: 60 minutes
Response time for other incidents: 120 minutes
Response time for support: 60 minutes
Response time for feedback: 30 minutes
Contact exclusively via:
Phone number:
Responsible team:
Link to the roadmap:
Discord:
Discord:
Email address:
This repository manages centralized audit logging resources. Google Cloud services write audit logs that record administrative activities and access within your Google Cloud resources. help you answer "who did what, where, and when?" within your Google Cloud organization.
This repository manages a resource hierarchy and IAM. Metaphorically speaking, the resembles the file system found in traditional operating systems to organize and manage entities hierarchically. lets administrators authorize who can take action on specific resources, giving you complete control and visibility to manage Google Cloud resources centrally.
This repository manages the Terraform backend for management. Terraform uses persisted state data to keep track of the resources it manages. Most non-trivial Terraform configurations use a backend to store state remotely. This lets multiple people access the state data and work together on that collection of infrastructure resources. Terraform uses persisted state data to keep track of the resources it manages. Most non-trivial Terraform configurations use a backend to store state remotely. This lets multiple people access the state data and work together on that collection of infrastructure resources.
This repository configures . With , you can use Identity and Access Management (IAM) to grant external identities IAM roles, including the ability to impersonate service accounts. This lets you access resources directly using a and eliminates the maintenance and security burden associated with service account keys.