Stay organized with collectionsSave and categorize content based on your preferences.
Introduction to Assured Workloads
Assured Workloads lets you confidently secure and configure your
workloads to support various compliance requirements. Assured Workloads
regulates the Google personnel that can be granted access. It also ensures that
all authorization requests are recorded in audit logs. For more information, seeOverview of Assured Workloads.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-09-04 UTC."],[[["\u003cp\u003eAssured Workloads helps secure and configure workloads to meet diverse compliance needs.\u003c/p\u003e\n"],["\u003cp\u003eIt controls Google personnel access and logs all authorization requests in audit logs.\u003c/p\u003e\n"],["\u003cp\u003eThe service facilitates compliance through data residency, encryption, key management, and platform controls.\u003c/p\u003e\n"],["\u003cp\u003eAssured Workloads can be used to meet IL4, CJIS, FedRAMP Moderate, FedRAMP High, and US Regions and Support compliance regimes.\u003c/p\u003e\n"],["\u003cp\u003eIt also implements controls to limit unauthorized administrative access.\u003c/p\u003e\n"]]],[],null,["# Introduction to Assured Workloads\n=================================\n\nAssured Workloads lets you confidently secure and configure your\nworkloads to support various compliance requirements. Assured Workloads\nregulates the Google personnel that can be granted access. It also ensures that\nall authorization requests are recorded in audit logs. For more information, see\n[Overview of Assured Workloads](/assured-workloads/docs/concept-overview).\n\nAssured Workloads enables regulatory compliance by focusing on\n[data residency](/assured-workloads/docs/concept-data-residency), [data encryption](/assured-workloads/docs/concept-encryption-keys), [encryption key management](/assured-workloads/docs/concept-key-management),\nand [platform controls](/assured-workloads/docs/concept-platform-controls).\n\nGet started with using Assured Workloads\n----------------------------------------\n\nTo learn how you can get started with Assured Workloads, see\n[Deploy a resource with Assured Workloads](/assured-workloads/docs/deploy-resource).\n\nTo learn how you can be compliant with IL4 and CJIS compliance regimes, see\n[Create a new folder in a workload environment for IL4 and CJIS)](/assured-workloads/docs/create-new-project-il4-cjis).\n\nTo learn how you can be compliant with FedRAMP Moderate, FedRAMP High, and US\nRegions and Support compliance regimes, see\n[Create a new folder in a workload environment for FedRAMP and US Regions and Support](/assured-workloads/docs/create-new-project-fedramp-us-regions).\n\nTo learn about the controls that Google Cloud provides to prevent unauthorized\nadministrative access, see [Overview of administrative access controls](/assured-workloads/cloud-provider-access-management/docs/administrative-access)."]]