diff --git a/gcp/documentation/02_Solutions_and_Service_Architecture/convert.sh b/gcp/documentation/02_Solutions_and_Service_Architecture/convert.sh
new file mode 100755
index 00000000..1d4b1e5d
--- /dev/null
+++ b/gcp/documentation/02_Solutions_and_Service_Architecture/convert.sh
@@ -0,0 +1,4 @@
+#!/bin/bash
+
+#pandoc --to gfm --extract-media=images/notional-architecture '00_GCP Initial Notional Architecture.pptx' -o notional-architecture.md
+pandoc --to gfm --extract-media=images/solution-architecture '01_GCP Solutions Architecture.docx' -o solution-architecture.md
diff --git a/gcp/documentation/02_Solutions_and_Service_Architecture/images/solution-architecture/media/image1.jpeg b/gcp/documentation/02_Solutions_and_Service_Architecture/images/solution-architecture/media/image1.jpeg
new file mode 100644
index 00000000..543fad64
Binary files /dev/null and b/gcp/documentation/02_Solutions_and_Service_Architecture/images/solution-architecture/media/image1.jpeg differ
diff --git a/gcp/documentation/02_Solutions_and_Service_Architecture/images/solution-architecture/media/image2.png b/gcp/documentation/02_Solutions_and_Service_Architecture/images/solution-architecture/media/image2.png
new file mode 100644
index 00000000..fa07e8cd
Binary files /dev/null and b/gcp/documentation/02_Solutions_and_Service_Architecture/images/solution-architecture/media/image2.png differ
diff --git a/gcp/documentation/02_Solutions_and_Service_Architecture/images/solution-architecture/media/image3.png b/gcp/documentation/02_Solutions_and_Service_Architecture/images/solution-architecture/media/image3.png
new file mode 100644
index 00000000..fe077e1a
Binary files /dev/null and b/gcp/documentation/02_Solutions_and_Service_Architecture/images/solution-architecture/media/image3.png differ
diff --git a/gcp/documentation/02_Solutions_and_Service_Architecture/images/solution-architecture/media/image4.png b/gcp/documentation/02_Solutions_and_Service_Architecture/images/solution-architecture/media/image4.png
new file mode 100644
index 00000000..9fd801a5
Binary files /dev/null and b/gcp/documentation/02_Solutions_and_Service_Architecture/images/solution-architecture/media/image4.png differ
diff --git a/gcp/documentation/02_Solutions_and_Service_Architecture/images/solution-architecture/media/image5.jpeg b/gcp/documentation/02_Solutions_and_Service_Architecture/images/solution-architecture/media/image5.jpeg
new file mode 100644
index 00000000..c79109f3
Binary files /dev/null and b/gcp/documentation/02_Solutions_and_Service_Architecture/images/solution-architecture/media/image5.jpeg differ
diff --git a/gcp/documentation/02_Solutions_and_Service_Architecture/solution-architecture.md b/gcp/documentation/02_Solutions_and_Service_Architecture/solution-architecture.md
new file mode 100644
index 00000000..66ff6bf8
--- /dev/null
+++ b/gcp/documentation/02_Solutions_and_Service_Architecture/solution-architecture.md
@@ -0,0 +1,748 @@
+## 

+
+Table of Contents
+
+[1 Revision History [4](#revision-history)](#revision-history)
+
+[2 Executive Overview [5](#executive-overview)](#executive-overview)
+
+[2.1 Document Purpose [5](#document-purpose)](#document-purpose)
+
+[2.2 Document Audience [5](#document-audience)](#document-audience)
+
+[2.3 Document Organization
+[5](#document-organization)](#document-organization)
+
+[2.4 Document Control [5](#document-control)](#document-control)
+
+[2.5 Document Limits [5](#document-limits)](#document-limits)
+
+[3 Infrastructure Overview
+[6](#infrastructure-overview)](#infrastructure-overview)
+
+[3.1 Conceptual Design [6](#conceptual-design)](#conceptual-design)
+
+[4 Enterprise Service Dependencies
+[6](#enterprise-service-dependencies)](#enterprise-service-dependencies)
+
+[4.1 Telecommunications Office (TCO)
+[7](#telecommunications-office-tco)](#telecommunications-office-tco)
+
+[4.1.1 CIDR [7](#cidr)](#cidr)
+
+[4.1.2 MTIPS [7](#mtips)](#mtips)
+
+[4.1.3 Certificate Authority
+[7](#certificate-authority)](#certificate-authority)
+
+[4.1.4 Identity Management
+[7](#identity-management)](#identity-management)
+
+[4.1.5 Network Time Protocol
+[7](#network-time-protocol)](#network-time-protocol)
+
+[4.2 Office of Information Security (OIS)
+[7](#office-of-information-security-ois)](#office-of-information-security-ois)
+
+[4.2.1 Azure Sentinel [7](#azure-sentinel)](#azure-sentinel)
+
+[4.2.2 Security Operations Center (SOC)
+[7](#security-operations-center-soc)](#security-operations-center-soc)
+
+[4.3 Client Support Division (CSD)
+[8](#client-support-division-csd)](#client-support-division-csd)
+
+[4.3.1 IT Service Management
+[8](#it-service-management)](#it-service-management)
+
+[4.4 Computer Services Division (CSvD)
+[8](#computer-services-division-csvd)](#computer-services-division-csvd)
+
+[4.4.1 Enterprise Operations Center (EOC)
+[8](#enterprise-operations-center-eoc)](#enterprise-operations-center-eoc)
+
+[5 GCP Project Design [8](#gcp-project-design)](#gcp-project-design)
+
+[5.1 Project Relationship
+[8](#project-relationship)](#project-relationship)
+
+[5.2 Shared Services [8](#shared-services)](#shared-services)
+
+[6 Security and Governance
+[8](#security-and-governance)](#security-and-governance)
+
+[6.1 GCP Organizations [8](#gcp-organizations)](#gcp-organizations)
+
+[6.1.1 Census GCP Resource Management Folder Design
+[9](#census-gcp-resource-management-folder-design)](#census-gcp-resource-management-folder-design)
+
+[6.1.1.1 Assured Workloads [9](#assured-workloads)](#assured-workloads)
+
+[6.1.1.2 Baseline & Baseline-Mod Folders
+[9](#baseline-baseline-mod-folders)](#baseline-baseline-mod-folders)
+
+[6.1.1.3 Organization Level Folders (Ex: DITD, GEO)
+[9](#organization-level-folders-ex-ditd-geo)](#organization-level-folders-ex-ditd-geo)
+
+[6.1.1.4 Core Folder [10](#core-folder)](#core-folder)
+
+[6.1.1.5 Billing GCP Folder
+[11](#billing-gcp-folder)](#billing-gcp-folder)
+
+[6.2 GCP Security Command Center
+[11](#gcp-security-command-center)](#gcp-security-command-center)
+
+[6.3 System Usage [12](#system-usage)](#system-usage)
+
+[7 Capacity and Cost Management
+[12](#capacity-and-cost-management)](#capacity-and-cost-management)
+
+[8 Monitoring and Alerting
+[12](#monitoring-and-alerting)](#monitoring-and-alerting)
+
+[8.1 GCP Operations Suite
+[12](#gcp-operations-suite)](#gcp-operations-suite)
+
+[8.1.1 Logging [13](#logging)](#logging)
+
+[9 Asset Management [13](#asset-management)](#asset-management)
+
+[10 Appendix [13](#appendix)](#appendix)
+
+[10.1 Reference Documents
+[13](#reference-documents)](#reference-documents)
+
+List of Figures
+
+[Figure 1 GCP Conceptual Design [6](#_Toc165281635)](#_Toc165281635)
+
+[Figure 2 GCP Organization [9](#_Ref157515696)](#_Ref157515696)
+
+List of Table
+
+[Table 1 Revision History [4](#_Toc165281637)](#_Toc165281637)
+
+# Revision History
+
+Table 1 Revision History
+
+| Version | Date | Description |
+|---------|------------|-------------------------------------------------|
+| 0.01 | 9/14/2023 | Initial TOC and Draft Defined |
+| 0.02 | 9/18/2023 | Updates for GCP Design Decisions |
+| 0.03 | 9/29/2023 | Organizational Updates |
+| 0.04 | 10/6/2023 | Team Peer Review |
+| 0.05 | 10/11/2023 | Environment Updates |
+| 0.06 | 10/24/2023 | Ready for Baseline Review |
+| 1.00 | 1/30/2024 | GitLab inf/core \#426 |
+| 1.01 | 4/29/2024 | Update to organizational graphic inf/core \#567 |
+
+# Executive Overview
+
+This document describes the Google Cloud Platform (GCP) design in
+support of the Enterprise Cloud and the Secure Cloud Concept of
+Operations (CONOPS) for the United States Census Bureau (USCB).
+
+## Document Purpose
+
+This document serves as the overarching design for the GCP
+infrastructure and the basis for additional GCP services to build upon.
+
+## Document Audience
+
+The target audience for this document are cloud, networking, and
+security leaders, architects, engineers, and operators.
+
+## Document Organization
+
+This document is a work product of the US Census Bureau Decennial
+Information Technology Directorate (DITD).
+
+## Document Control
+
+This document, and changes to this document, are governed by the Secure
+Cloud Team (SCT) Cloud Governance Board (CGB).
+
+## Document Limits
+
+This document assumes familiarity with GCP services. For additional
+information on GCP services, consult: [Google Cloud documentation
+\| Documentation](https://cloud.google.com/docs/). All GCP design
+elements found in this document are FedRAMP authorized. For a list of
+current FedRAMP services in scope, consult: [FedRAMP Marketplace -
+Compliance \| Google
+Cloud](https://cloud.google.com/security/compliance/fedramp/).
+
+# Infrastructure Overview
+
+## Conceptual Design
+
+The design of the GCP platform is based upon a minimum footprint to
+achieve an authorization to operate (ATO) for workloads hosted in the
+Google Cloud Platform census.gov organization. This design incorporates
+elements from the Census Enterprise to satisfy controls defined by the
+Office of Information Security (OIS) for authorization, access, logging,
+and operations.
+
+- GCP aggregates and ships logs to the Enterprise security services
+ provided by the Enterprise and hosted in Azure. This provides
+ visibility across all GCP assets and interactions.
+
+- Google Cloud Identity is integrated with the Enterprise Identity
+ Management System (IDMS). This provides a single sign on experience,
+ using Census Bureau James Bond IDs, to google projects.
+
+- Network communication with the Census Bureau is provided by the USCB
+ Telecommunications Office (TCO) via an encrypted Virtual Private
+ Network (VPN) using Cloud VPN. Communications to and hosted
+ on-premises resources utilizes this connection to communicate with
+ resources among USCB networks. As bandwidth requirements increase,
+ additional Cloud VPN connections or optional Google interconnects may
+ be utilized to expand capacity.
+
+
+
+Figure 1 GCP Conceptual
+Design[^1]
+
+# Enterprise Service Dependencies
+
+GCP integrates with a variety of services provided by Census Enterprise.
+This provides GCP consumers with core, bureau-wide capabilities while
+allowing systems to develop GCP Cloud-native systems. The systems and
+respective Census organizations providing those services, are listed
+below:
+
+## Telecommunications Office (TCO)
+
+### CIDR
+
+TCO allocated an IPv4 /16 and an IPv6 /48 CIDR block for use with GCP.
+Allocation of these addresses are governed by the CGB and are under
+configuration management in GitLab.
+
+### MTIPS
+
+GCP connects with the Census Managed Trusted Internet Protocol Service
+(MTIPS) provider using Google Cloud VPNs to on premise Datacenters.
+Traffic is encrypted and routing provided by TCO and associated BCC and
+HQ datacenter networking.
+
+A cloud-based TIC 3.0 solution will replace MTIPS functionality for
+cloud-specific assets at a later date. This reduces costs associated
+with egress over GCP VPNs, and Private Interconnects, increases
+scalability and throughput by leveraging native GCP networking services,
+and reduces latency and trips back to USCB datacenters hosted in the
+eastern part of the United States.
+
+### Certificate Authority
+
+TCO manages a private Certificate Authority (CA), including a Root and
+Secondary CAs. As of this writing, certificate requirements are
+fulfilled by TCO. Later, an independent GCP Private CA may be offered,
+that is authorized and signed from the USCB secondary CAs. When a
+private or public certificate is required, TCO is engaged using a
+standard Remedy workflow process. This includes a CSR generation with
+required fields, and a certificate is provided. Certificate lifecycle
+management is a shared responsibility between the system and TCO, and
+TCO re-engagement is required to renew any certificates.
+
+### Identity Management
+
+GCP designs leverage USCB-managed IdP platforms and methodologies to
+centralize account management and practices. Identities are federated
+via SAML 2.0 through the IDMS system to GCP. Identity management occurs
+using Google Cloud Identity to provide access to resources and assets in
+GCP. Considerations for the use of SCIM are currently outside the scope
+of this document.
+
+### Network Time Protocol
+
+Time is offered by TCO. TCO maintains a network of physical atomic
+clocks located in Jeffersonville, Indiana and Bowie, Maryland.
+
+## Office of Information Security (OIS)
+
+OIS provides an analysis of the GCP FedRAMP package and details the user
+responsible controls. OIS also governs the use of Enterprise services to
+assist in satisfying user controls and mitigating security and
+operational risks using Azure Sentinel which is operated and monitored
+by members of the Enterprise Security Operations Center (SOC).
+
+### Azure Sentinel
+
+Sentinel is a cloud native Security Information and Event Management
+(SIEM) platform hosted in the Census Enterprise Azure subscription. This
+product provides intelligent detection, investigation, and response and
+is cloud-scale. GCP audit logs are aggregated from GCP Operations Suite
+Cloud Logging and GCP Security Command Center alerts are transferred
+directly to Sentinel via GCP Pub/Sub integration.
+
+### Security Operations Center (SOC)
+
+The SOC provides real-time monitoring and alerting for GCP cloud assets.
+If a security event is identified, the appropriate incident is raised
+and routed to DITD staff for mitigation and resolution. The SOC utilizes
+a SaaS product, Axonius, to aggregate an inventory of GCP assets
+periodically throughout the day.
+
+## Client Support Division (CSD)
+
+### IT Service Management
+
+CSD provides Remedy to the Census Enterprise. A GCP infrastructure
+support group is defined for all GCP related assets. Service requests,
+change requests, incidents, and work orders may be routed to this group
+to provide ongoing support for end-users of the GCP platform.
+
+## Computer Services Division (CSvD)
+
+### Enterprise Operations Center (EOC)
+
+The USCB Enterprise Operations Center (EOC) utilizes Solarwinds Orion as
+the primary enterprise monitoring platform. Solarwinds is utilized to
+monitor WAN connectivity to GCP from Census data centers.
+
+The EOC utilizes the Enterprise Incident Management Plan. The EOC
+provides up to 24x7 coverage, Service Level Agreements,
+bridge/conference support, triage, and call & ticket routing. At the
+time of this writing, the EOC is actively working towards an ATO for
+Datadog. Datadog is intended to address gaps in the current technology
+as it relates to cloud native constructs and services. Once the product
+is available for use across the USCB, additional capability will be made
+available. For more details about the Datadog implementation, see the
+reference link in the appendix.
+
+# GCP Project Design
+
+A GCP Project is the basic security and billing boundary for consuming
+services within GCP. All assets and resource consumption within a GCP
+project are billed to the billing project associated to the resource
+project.
+
+## Project Relationship
+
+Individual System teams are allocated projects by environment. This
+level of granularity provides system teams with the autonomy to develop
+and enhance their systems without affecting other systems and reduces
+administrative complexity for isolation, segmentation, and operations &
+maintenance (O&M). It provides a high velocity track for onboarding
+system teams using repeatable and consistent GCP project provisioning
+and service deployment standards and methods.
+
+GCP does not have a service limit on GCP projects and GCP Folders within
+an organization, and shared costs can be isolated down to the individual
+system team through this Project allocation. System teams have a
+dedicated Lab, Dev, Test, ITE, Stage, and Prod project placed in the
+corresponding GCP Folder (eg, GEO Dev, etc), as required.
+
+An associated DMZ ITE, Stage, and Prod set of projects can be
+established, as required.
+
+## Shared Services
+
+Core Infrastructure services, including shared infrastructure,
+operations, and application services for system teams, are arranged in a
+separate GCP Folder structure and associated GCP projects that align to
+a respective function for resources there.
+
+# Security and Governance
+
+## GCP Organizations
+
+The census.gov organization provides centralized governance, control,
+cost management, audit compliance, and service resource sharing. The
+organization design aligns with the infrastructure GCP Software
+Development Lifecycle (iSDLC), a set of developer and tester guidelines,
+configuration management practices, and agile software development
+methods for developing, testing, and releasing infrastructure as code.
+
+### Census GCP Resource Management Folder Design
+
+The Enterprise GCP Organization layout is depicted below:
+
+
+
+Figure 2 GCP Organization
+
+#### Assured Workloads
+
+Folders depicted in green in Figure 2 GCP Organization, provide security
+controls that ensure alignment with FedRAMP moderate requirements as
+established by the GCP FedRAMP moderate package and approval. Folders
+and projects nested under green folders cannot use non-FedRAMP services.
+
+#### Baseline & Baseline-Mod Folders
+
+These folders contain organization specific security policies, including
+prevention of external addresses and approved regions. This hosts the
+terraform state bucket for gcp-iac-core.
+
+#### Organization Level Folders (Ex: DITD, GEO)
+
+This folder is for applying a program specific set of security policies.
+Unless an individual system or application requires a unique set of
+controls or exceptions to a control, a generalized organizational
+structure will be utilized to apply policies. The following describes
+the organizational structure of the subfolders.
+
+##### Lab (System Level)
+
+GCP Project membership in this GCP Folder is designated for
+experimentation and prototyping. Title data is not permitted in this
+environment.
+
+##### Dev (System Level)
+
+GCP Project membership in this GCP Folder is designated for system
+specific functional software development activities. Title data is not
+permitted in this environment.
+
+##### Test (System Level)
+
+GCP Project membership in this GCP Folder is designated for system
+specific project level testing activities. Title data is not permitted
+in this environment.
+
+##### ITE (System Level)
+
+Accounts membership in this GCP Folder is designated for integrated
+testing activities.
+
+##### Stage (System Level)
+
+Accounts membership in this GCP Folder is designated for system specific
+pre-production, operations readiness, and performance testing
+activities.
+
+##### Prod (System Level)
+
+Accounts membership in this GCP Folder is designated for system specific
+production activities.
+
+#### Core Folder
+
+##### DMZ (Future Use Case Placeholder – Not included in initial ATO)
+
+###### Routing
+
+GCP Project membership in this GCP Folder is designated for GCP Cloud
+Routers and VPCs supporting ingress and/or egress requirements to
+resources external to the Census Bureau networks.
+
+###### ITE (System Level)
+
+Accounts membership in this GCP Folder is designated for DMZ integrated
+testing activities.
+
+###### Stage (System Level)
+
+Accounts membership in this GCP Folder is designated for system specific
+DMZ pre-production, operations readiness, and performance testing
+activities.
+
+###### Prod (System Level)
+
+Accounts membership in this GCP Folder is designated for system specific
+DMZ production activities.
+
+##### Platform
+
+###### Networking
+
+GCP Project membership in this GCP Folder is designed to support core
+Networking services including GCP Cloud Router and centralized VPCs for
+VPC sharing.
+
+####### Routing-High
+
+GCP Project membership in this GCP Folder is designated for GCP Cloud
+Routers and VPCs supporting ingress and/or egress requirements to
+resources external to the Census Bureau networks for prod projects.
+
+####### Routing-Lower
+
+GCP Project membership in this GCP Folder is designated for GCP Cloud
+Routers and VPCs supporting ingress and/or egress requirements to
+resources external to the Census Bureau networks for lab, dev, test,
+ITE, and stage projects.
+
+####### Dev
+
+GCP Project membership in this GCP Folder is designated for network
+development activities.
+
+####### VPC Sharing-Lower
+
+GCP Project membership in this GCP Folder is designated for VPC sharing
+for lab, dev, test, integration & test (ITE), and stage projects.
+
+####### VPC Sharing-High
+
+GCP Project membership in this GCP Folder is designated for VPC sharing
+for prod projects.
+
+###### Shared Services
+
+GCP Project membership in this GCP Folder contains shared service
+projects. Future services may include IT Operations Management (ITOM)
+services, application services such as GitLab runners, and
+infrastructure platform services. Sub GCP Folders are designated for the
+development of Infrastructure, Application, and IT Operations Management
+services.
+
+##### Security
+
+GCP Project membership in this GCP Folder is designed for Security / OIS
+tooling, centralized log aggregation and collection, and key management.
+
+##### Sandbox Folder (Infrastructure Lab)
+
+GCP Project Membership in this GCP Folder is designed to accommodate
+infrastructure labs for evaluation of new and emerging technology and
+standards. Workloads are isolated from production networks to provide
+the cloud engineering team the ability to perform research, analysis,
+and prototyping of new products and features. ***NOTE:** This is
+**not to be utilized** for infrastructure and networking
+development and testing as part of the regular management of changes.*
+
+##### TIC Folder (Future Use Case Placeholder – Not included in initial ATO)
+
+GCP Project Membership in this folder is designed to provide
+infrastructure and capabilities for an GCP-based TIC 3.0-compliant
+networking environment. It is contained in a separate folder to provide
+GCP service integration and associated organization policies to tightly
+control and manage resources required in an edge network environment.
+
+#### Billing GCP Folder
+
+This folder will serve as an aggregation point for all billing accounts
+in the environment, segmented by GCP contracts. Permissions to it are
+restricted. Billing accounts will integrate and export to BigQuery and
+with FinOps tooling, including Apptio Cloudability. If independent
+contracts are required, an independent billing project is required,
+along with integration with Apptio. Financial strategy is outside the
+scope of this document.
+
+## GCP Security Command Center
+
+Security Command Center provides a centralized vulnerability and threat
+reporting service. Security Command elevates security configurations,
+provides asset inventory and discovery, and identify misconfigurations,
+vulnerabilities, and threats. Activation of Security Command Center at
+the Census organization-level (top-level folder), to provide
+consolidated view of all findings within Census organization. At the
+time writing this, following are list of design configurations for
+Security Command Center:
+
+- Organization-level activation of Security Command Center is active for
+ one or more projects within Census GCP Organization and thus enables
+ the Premium tier of Security Commands Center.
+
+- Security Command Center’s detectors are configured for Center for
+ Information Security (CIS).
+
+- DITD Security Team or Cloud Security Engineers, with either
+ “gr-sec.adm” or “gr-sec.auditor” Google Identity roles are responsible
+ for managing and responding to the applicable cloud vulnerabilities
+ and security findings within Security Command Center.
+
+- For any High or Critical severity findings the DITD Cloud Security
+ Engineer, designated SOC members, or Security Auditor will escalate
+ these findings to the GCP Information System Security Officer (ISSO)
+ per OIS security policy.
+
+- Designated Enterprise Security Operations Center (SOC) members provide
+ real-time monitoring and are alerted for GCP cloud assets. If a
+ security event is identified, the appropriate incident is raised and
+ routed to DITD security staff for mitigation and including
+ notification to the SOC.
+
+## System Usage
+
+No actions may be performed in GCP without an associated authenticated
+and authorized account.
+
+# Capacity and Cost Management
+
+GCP manages and maintains capacity as part of their service offering.
+This does not eliminate the need for USCB to plan and maintain capacity
+utilization/planning and cost management controls. A list of approved
+services is governed by the CGB. Vendor details, including contact
+information, current support contracts, escalation points, software
+services, feature requests, product roadmap, integration points,
+announcements, and end-of-life/support are recorded in a vendor log
+referenced in the GCP Cloud Operations Plan. A government stakeholder
+designated by the CGB is responsible for reviewing the vendor
+relationship with GCP. Meetings are hosted to review GCP performance,
+current issues, product updates, program dependencies, security events,
+and other topics of importance.
+
+Cost management for GCP is based around independent project billing
+codes. Each project is linked to a billing project/code. New
+project/billing codes are established, as required, for maintaining
+project cost control and visibility.
+
+The following guidelines exists:
+
+- Systems are responsible for self-governing their planning, budget,
+ optimization, and consumption.
+
+- Specific system members, designated by system leadership, are
+ responsible for onboarding with Apptio Cloudability to receive access
+ to cloud financial reports.
+
+- All assets must comply with GCP Naming and Tagging Standards.
+
+- Periodic reviews, reporting, and audits are defined in the GCP
+ Operations Plan.
+
+GCP offers both Labels and Tags to track deployed assets within the
+platform. Labels are utilized for annotating meta data to resources that
+can be queried within BigQuery and provide context for billing and other
+functions. GCP Tags are applied to resources to affect policies and
+other security focused uses. With respect to billing and capacity the
+focus will be on GCP Labels. Billing data is aggregated and accessible
+from GCP BigQuery. Only infrastructure administrators have access to
+BigQuery for this purpose. Apptio Cloudability is integrated with GCP
+and BigQuery to produce financial reports.
+
+Standard GCP labels are required. All GCP labels must follow the
+labeling standards documented in the Enterprise Naming and Tagging
+standards. Labeling is enforced through IaC deployment. Tags are
+enforced through organization and project inheritance.
+
+# Monitoring and Alerting
+
+## GCP Operations Suite
+
+The monitoring and alerting capabilities within GCP are included within
+the Operations Suite. Cloud Monitoring API collects metrics, events, and
+metadata from cloud resources that are deployed throughout the GCP
+organization. These metrics are ingested into the Operations Suite where
+that data to generate insights via dashboards, charts, and alerts.
+Alerting also resides within the Cloud Monitoring API which comprises of
+an alerting policy, incident record, and notification channel.
+Configuration of alerts can be performed from project, folder, and
+organizational level within GCP. At the time of writing this document,
+the following configurations are applied for monitoring and alerting for
+GCP audit logs:
+
+- Bucket-scoped log-based metrics are configured for logs that are
+ routed into a centralized logging bucket through the aggregated
+ log-sink within GCP Organization.
+
+- Creation of Logging Metric project within Core folder, contains the
+ user-defined metrics for the bucket-scoped log-based metric.
+
+- Cloud Security Engineers with the appropriate Google group membership
+ are responsible to define the appliable system-defined [Google Cloud
+ metrics](https://cloud.google.com/monitoring/api/metrics_gcp#gcp-logging)
+ within the Logging Metric GCP project.
+
+- Labels created for log-based metrics must adhere to the [GCP Naming
+ and Tagging
+ Standards](https://uscensus.sharepoint.com/:x:/r/sites/DITDSIRS/_layouts/15/Doc.aspx?sourcedoc=%7B73417D72-DA96-4CEA-8021-DAD6068EA2BE%7D&file=02_Naming%20and%20Tagging%20Standard%20-%20GCP.xlsx&action=default&mobileredirect=true)
+ schema.
+
+- Metric Scopes are defined within a GCP scoping project that resides
+ within CORE folder structure. These metric scopes are codified as
+ Infrastructure as Code (IaC) and sourced within CORE GitLab source
+ code repository.
+
+- Creation of the alerting policies for log-based metrics is the
+ responsibilities of the DITD Cloud Security Engineer following the
+ applicable guidance from OIS.
+
+- The notification channel for alerting will be distribution list (DL)
+ for DITD Security team, any further coordination with the SOC is the
+ responsibility of the DITD Security Team.
+
+### Logging
+
+Cloud Logging API is a capability within Operations Suite. Cloud Logging
+provides the real-time log-management, with storage, search, analysis
+and monitoring support. At the time of writing this document, the
+current design and configurations for Cloud Logging are the following:
+
+- Collate and route all organization-level logs to an Aggregated Sinks.
+
+- The aggregate sink resides within the Core folder within Census GCP
+ Organization folder structure.
+
+- A Cloud Logging bucket stores all aggregated audit logs within Census
+ Organization for the default number of days.
+
+ - 400 days for Admin Activity logs (including IAM logs) and System
+ Event audit logs.
+
+ - Data Access Logs and Policy Denied logs are stored for 30 days by
+ default.
+
+- GCP Audit Logs will be integrated with Microsoft Azure Sentinel by way
+ of a Pub/Sub integration with Azure.
+
+For additional design, Enterprise integration, and operational details,
+consult the GCP Operations Suite Cloud Logging design document.
+
+# Asset Management
+
+Assets are tracked through an integration of GCP and Apptio Cloudability
+and Axonius. Apptio tracks all assets deployed to GCP, and associated
+cloud consumption costs. Axonius provides an inventory of all deployed
+GCP assets.
+
+# Appendix
+
+## Reference Documents
+
+- [USCB GCP Identity Detailed
+ Design](https://uscensus.sharepoint.com/:w:/s/DITDSIRS/EXyyzNyQ1iNHvXPCyrEBSPkB8_U_F9e22sFj7j552nyXLg?e=rnoQjS)
+
+- [USCB GCP Cloud DNS Detailed
+ Design](https://uscensus.sharepoint.com/:w:/s/DITDSIRS/Ed33dNlVFt1Di0rQRbLZa_gBRT6h0dnpRg-5ThzR64NbbA?e=W8bk0i)
+
+- [USCB GCP Networking Detailed
+ Design](https://uscensus.sharepoint.com/:w:/s/DITDSIRS/EctS_2nmCj9HtTELOW8wv6cBqycZJYH01VNqMVgapaFuew?e=Vc7C3l)
+
+- [USCB GCP Operations Suite – Cloud
+ Logging](https://uscensus.sharepoint.com/:w:/s/DITDSIRS/EUWHv2fuP0dMpsb4RbP5nmEBI040PmYvjs5k4x_RS2_K8A?e=wGvD3e)
+
+- [USCB Azure Sentinel SharePoint Content
+ Hub](https://uscensus.sharepoint.com/:u:/s/DITDSIRS/EYrMDaQNE6RNjAZEf-i59IEBgjJGM6wzqmPUucsVPT50ww?e=vG5gic)
+
+- [USCB GCP Standards and Frameworks (iSDLC, Naming, Tagging, Projects,
+ Roles, Groups,
+ Guidelines)](https://uscensus.sharepoint.com/:f:/s/DITDSIRS/EpbVeuUQbE1Ftjo-SJpUjj4BG9Nq15mRUQdNsUaQcRyeyw?e=OvPw18)
+
+- [Cloud Concept of
+ Operations](https://uscensus.sharepoint.com/:w:/s/DITDSIRS/EaC_b3BNlPVLj-VwhcCEFdsB37unOxCiTh00H449c1Av6A?e=07a9hW)
+ USCB Enterprise Management System SharePoint site
+
+- USCB [Datadog
+ Implementation](https://uscensus.sharepoint.com/teams/csvd/Datadog/SitePages/Home.aspx)
+ SharePoint site
+
+- USCB Remedy Request for Enterprise Event Management
+
+- [Google Cloud
+ Metrics](https://cloud.google.com/monitoring/api/metrics_gcp#gcp-logging)
+
+- [Google Cloud Computing Foundations
+ Benchmark](https://www.cisecurity.org/benchmark/google_cloud_computing_platform)
+
+- [Enterprise Secure Cloud Concept of
+ Operations](https://uscensus.sharepoint.com/:w:/t/OCIOSecureCloud/EckI_0J5vOJIhreZy-0WSMMBqOI7b5_yrmb78-HeB9IZ-Q?e=uapwY2)
+
+- [GCP Operations
+ Plan](https://uscensus.sharepoint.com/:w:/s/DITDSIRS/EfHiSwwk1mFCtyuXFnCKGoMBjV158-8VEfxVUCVI37D3lQ?e=BkivsF)
+
+[^1]: This is a conceptual graphic and does not depict all services in
+ use. See GCP Service Detailed Designs and Architecture, and Services
+ in Scope for additional details linked in the Appendix.