Bucket Protector

Bucket Protector reduces the surface area for cybersecurity attacks, reducing the risk to the organization using this utility function while ensuring FIPS, PCI DSS, and HIPPA compliance when migrating workloads from other Cloud Service Providers onto Google Cloud.

This Cloud Utility Function allows users to import data to Google Cloud Storage either from

  • Google Cloud Platform project
  • Cloud Service Provider
  • User's local computer
Bucket Protector

The sensitive data uploaded to the storage bucket is then protected via data protection methods such as FPE, Masking, replacement, or redaction.

Using Bucket Protector allows users to choose which methods of data protection they wish to utilize to ensure PII and sensitive data are in a protected format throughout the entire lifecycle of data.

  • Migrate data to the Cloud and have it automatically deidentified or encrypted.
  • Developed in Java for Google Cloud Platform.
  • Deidentifies or encrypts data to ensure PII data security.
Features Open Source Enterprise Features
Redaction
Replacement
Masking
Format Preserving Encryption
Software-based Key generation
Key Management in Google Cloud Platform
Logging
Enhanced Key Protection using nCipher, Thales , Utimaco and Futurex HSM
24*7 Customer Support
FIPS 140-2 Level 3 Compliant

How does it work?

The user transfers files from another Google Cloud Platform project, or another Cloud Service Provider, to Google Cloud Storage. This triggers the Google Cloud Function, which ensures the user has access to the DLP and KMS APIs. The data is then deidentified or encrypted based on user input and returned to Google Cloud Storage.

Bucket Protector Working

Explore the full range of services offered by Encryption Consulting.

Feel free to schedule a demo to gain a comprehensive understanding of all the services Encryption Consulting provides.

Request a demo