Beberapa atau semua informasi di halaman ini mungkin tidak berlaku untuk Trusted Cloud oleh S3NS.
Dokumentasi Google Cloud Armor
Google Cloud Armor membantu melindungi infrastruktur dan aplikasi Anda dari
serangan distributed denial of service (DDoS) volumetrik berbasis jaringan atau protokol Lapisan 3/Lapisan 4,
serangan volumetrik Lapisan 7, dan serangan aplikasi bertarget lainnya. Cloud Armor memanfaatkan jaringan global dan infrastruktur terdistribusi Google untuk mendeteksi dan menyerap serangan serta memfilter traffic melalui kebijakan keamanan yang dapat dikonfigurasi pengguna di edge jaringan Google, jauh di hulu workload Anda.
Pelajari lebih lanjut
Kecuali dinyatakan lain, konten di halaman ini dilisensikan berdasarkan Lisensi Creative Commons Attribution 4.0, sedangkan contoh kode dilisensikan berdasarkan Lisensi Apache 2.0. Untuk mengetahui informasi selengkapnya, lihat Kebijakan Situs Google Developers. Java adalah merek dagang terdaftar dari Oracle dan/atau afiliasinya.
Terakhir diperbarui pada 2025-05-29 UTC.
[[["Mudah dipahami","easyToUnderstand","thumb-up"],["Memecahkan masalah saya","solvedMyProblem","thumb-up"],["Lainnya","otherUp","thumb-up"]],[["Informasi yang saya butuhkan tidak ada","missingTheInformationINeed","thumb-down"],["Terlalu rumit/langkahnya terlalu banyak","tooComplicatedTooManySteps","thumb-down"],["Sudah usang","outOfDate","thumb-down"],["Masalah terjemahan","translationIssue","thumb-down"],["Masalah kode / contoh","samplesCodeIssue","thumb-down"],["Lainnya","otherDown","thumb-down"]],["Terakhir diperbarui pada 2025-05-29 UTC."],[[["Google Cloud Armor safeguards infrastructure and applications from various attacks, including Layer 3/4 and Layer 7 DDoS attacks, as well as targeted application attacks."],["The service utilizes Google's extensive global network to identify and mitigate attacks at the network's edge, which is well before reaching user workloads."],["Documentation provides resources such as security policy configuration, WAF rule tuning, Cloud Armor Enterprise utilization, and Adaptive Protection."],["Key reference information includes a custom rules language, APIs, security policy monitoring, and audit logging details."],["Users can access resources such as pricing, quotas, troubleshooting, release notes, and support information to help them manage and understand Google Cloud Armor."]]],[]]