Girmiti Bridge the gap between Development and IT Operation teams with proven DevOps practises

Scale up software development with DevOps Solutions

Girmiti team leverage the Google Cloud Platform Services to define the process to plan, test, compare and control the deliverables.

The GCP Services Reference Architecture is followed which are provided for all levels of the application infrastructure design and prepare the Low level design and High Level Design adhering to CIS and GCP Security Best Practices.

We provide basis of recommendations and justifications documents and Prepare plan for the clients across Globe

Documentation is part of GCP Services Support right from the Plan, HLD, LLD, Hardening, Configuration, RunBook Preparation across all the environments.

Use of the best practices tools in Google Cloud Platform

  • Virtual Private Cloud – Initial setup to isolate the environment

  • Compute / APP / Kubernetes Engine – Instance for Application Servers setup or for dockers

  • Cloud Memorystore – use of Redis cache for Database and oAuth tokens

  • Cloud Functions – to Automate the Deployment or Serverless Functions

  • Cloud Load Balancing – Use of Load balancer with Worldwide Autoscaling when required

  • Cloud Storage for storage of artifacts and logs and Backups and archival with encryption

  • Cloud Deployment Manager or Terraform for Templates driven with parallel deployment of Infrastructure resources on different region

  • Application Monitoring using Elastic Search and APM plugins, and Appdynamic or StackTrace or NewRelic

  • Log Management using Scripts for Elastic Search or Stackdriver logging and Monitoring

  • Security with regular check by Cloud Platform Security, Google Cloud Audit Logging, Firewall Rules to lock down the incoming and outgoing requests and PCI Check List and Full Managed Cloud KMS and HSM

  • OS – Choose of CIS Hardening operating system or use the custom CIS scripts to harden the OS and Application Server.

  • High Availability Testing considering all the components in the infrastructure

  • Health check per application and alerts using StackDrivers logging and Monitoring

  • VPN Gateway and two factor authentications using MPA for Console and Logins

  • Database high availability and Backup and restore

  • Full disk encryption and data encryption-at-rest and secure logs for sensitive data

  • Vulnerability Scan and Patch Management using Cloud Security Scanner, Container Security and use of Shielded VMs along with Cloud IAMs for authorization.

For detailed information visit Read more..

For more information please contact us at




Contact Us