Overview of Assured Workloads

This page provides information about Assured Workloads.

What is Assured Workloads?

Assured Workloads provides Google Cloud users with the ability to apply controls to a folder in support of regulatory, regional, or sovereign requirements.

When to use Assured Workloads

You can use Assured Workloads to achieve compliance-based outcomes on Google Cloud, using the following controls to support your requirements:

  • Data residency: Ensures Google Cloud customer data is stored in a customer-selected Google Cloud region. If a customer's developer attempts to store data at rest in a region outside of the selection, the action will be blocked.

    Learn more about Data residency.

  • Data sovereignty: Ensures Google Cloud customers have mechanisms to exercise independent control over service provider's access to their data, approving access only for specific provider behaviors that are deemed appropriate and necessary by the customer.

    The Sovereign Controls for EU control package is a key component of data sovereignty. See Restrictions and limitations in Sovereign Controls for EU for more information.

  • Personnel data access controls based on attributes: Ensures that only Google personnel who are able to satisfy certain physical location and background check requirements are able to access Google Cloud customer data when fulfilling support obligations. For example, Impact Level 4 (IL4) requires anyone accessing data be a US Person who has completed an ADP-1 Single Scope Background Investigation (SSBI).

    Learn more about Personnel data access controls based on attributes.

  • Personnel support case ownership controls based on attributes: Ensures that only Google support personnel who satisfy certain requirements are able to provide support to Assured Workloads customers.

    Learn more about Personnel support case ownership controls based on attributes.

  • Encryption: Google-owned and Google-managed encryption keys, provided by default, are FIPS-140-2 compliant and support FedRAMP Moderate compliance. Customer-managed encryption keys (CMEK) represent an added layer of control and separation of duties. For example, IL4 requires FIPS 140-2 validated modules.

    Learn more about Supporting compliance with key management.

When not to use Assured Workloads

How to use Assured Workloads

You are required to create an organization prior to using Assured Workloads.

After you create an organization, create an Assured Workloads folder to start using Assured Workloads.

Control package renaming notice

Assured Workloads uses control packages to refer to sets of controls that support the baseline for a compliance framework, statute, or regulation. We will be changing the names for control packages in the console and APIs in June 2025.

The following table describes the upcoming and current names for some of the control packages. Only the names have changed; the underlying functionality has not changed.

Upcoming name Current name

Australia Data Boundary

Australia Regions

Australia Data Boundary and Support

Australia Regions with Assured Support

Brazil Data Boundary

Brazil Regions

Canada Data Boundary

Canada Regions

Canada Data Boundary and Support

Canada Regions and Support

Chile Data Boundary

Chile Regions

Data Boundary for Canada Controlled Goods

Canada Controlled Goods

Data Boundary for Canada Protected B

Canada Protected B

Data Boundary for CJIS

Criminal Justice Information Systems (CJIS)

Data Boundary for FedRAMP High

FedRAMP High

Data Boundary for FedRAMP Moderate

FedRAMP Moderate

Data Boundary for Impact Level 2 (IL2)

Impact Level 2 (IL2)

Data Boundary for Impact Level 4 (IL4)

Impact Level 4 (IL4)

Data Boundary for Impact Level 5 (IL5)

Impact Level 5 (IL5)

Data Boundary for IRS Publication 1075

IRS Publication 1075

Data Boundary for ITAR

International Traffic in Arms Regulations (ITAR)

EU Data Boundary

EU Regions

EU Data Boundary and Support

EU Regions and Support

EU Data Boundary with Access Justifications

Sovereign Controls for EU

Hong Kong Data Boundary

Hong Kong Regions

India Data Boundary

India Regions

Indonesia Data Boundary

Indonesia Regions

Israel Data Boundary

Israel Regions

Israel Data Boundary and Support

Israel Regions and Support

Japan Data Boundary

Japan Regions

Kingdom of Saudi Arabia Data Boundary with Access Justifications

Sovereign Controls for Kingdom of Saudi Arabia (KSA)

Qatar Data Boundary

Qatar Regions

Singapore Data Boundary

Singapore Regions

South Africa Data Boundary

South Africa Regions

South Korea Data Boundary

South Korea Regions

Switzerland Data Boundary

Switzerland Regions

Taiwan Data Boundary

Taiwan Regions

UK Data Boundary

UK Regions

US Data Boundary

US Regions

US Data Boundary and Support

US Regions and Support

US Data Boundary for Healthcare and Life Sciences

Healthcare and Life Sciences Controls

US Data Boundary for Healthcare and Life Sciences with Support

Healthcare and Life Sciences Controls with US Support

What's next