Stay organized with collectionsSave and categorize content based on your preferences.
Introduction to Assured Workloads
Assured Workloads lets you confidently secure and configure your
workloads to support various compliance requirements. Assured Workloads
regulates the Google personnel that can be granted access. It also ensures that
all authorization requests are recorded in audit logs. For more information, seeOverview of Assured Workloads.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-09-04 UTC."],[[["\u003cp\u003eAssured Workloads helps secure and configure workloads to meet diverse compliance requirements.\u003c/p\u003e\n"],["\u003cp\u003eIt controls which Google personnel can access workloads and logs all authorization requests.\u003c/p\u003e\n"],["\u003cp\u003eKey compliance areas supported by Assured Workloads include data residency, encryption, key management, and platform controls.\u003c/p\u003e\n"],["\u003cp\u003eYou can start using Assured Workloads by learning how to deploy a resource.\u003c/p\u003e\n"],["\u003cp\u003eIt provides support and instructions for various compliance regimes like IL4, CJIS, FedRAMP, and US Regions.\u003c/p\u003e\n"]]],[],null,["# Introduction to Assured Workloads\n=================================\n\nAssured Workloads lets you confidently secure and configure your\nworkloads to support various compliance requirements. Assured Workloads\nregulates the Google personnel that can be granted access. It also ensures that\nall authorization requests are recorded in audit logs. For more information, see\n[Overview of Assured Workloads](/assured-workloads/docs/concept-overview).\n\nAssured Workloads enables regulatory compliance by focusing on\n[data residency](/assured-workloads/docs/concept-data-residency), [data encryption](/assured-workloads/docs/concept-encryption-keys), [encryption key management](/assured-workloads/docs/concept-key-management),\nand [platform controls](/assured-workloads/docs/concept-platform-controls).\n\nGet started with using Assured Workloads\n----------------------------------------\n\nTo learn how you can get started with Assured Workloads, see\n[Deploy a resource with Assured Workloads](/assured-workloads/docs/deploy-resource).\n\nTo learn how you can be compliant with IL4 and CJIS compliance regimes, see\n[Create a new folder in a workload environment for IL4 and CJIS)](/assured-workloads/docs/create-new-project-il4-cjis).\n\nTo learn how you can be compliant with FedRAMP Moderate, FedRAMP High, and US\nRegions and Support compliance regimes, see\n[Create a new folder in a workload environment for FedRAMP and US Regions and Support](/assured-workloads/docs/create-new-project-fedramp-us-regions).\n\nTo learn about the core principles upon which controls that prevent unauthorized\nadministrative access are based, see [Overview of administrative access controls](/assured-workloads/cloud-provider-access-management/docs/administrative-access)."]]