Security Command Center と Google SecOps による Backup and DR Service
コレクションでコンテンツを整理
必要に応じて、コンテンツの保存と分類を行います。
このガイドでは、Security Command Center、Google Security Operations(Google SecOps)、Backup and DR Service の統合について説明します。この統合により、Backup and DR Service 内で発生したリスクの高いアクションのアラートを Security Command Center と Google SecOps に表示できます。
Security Command Center と Backup and DR サービス用の Google SecOps を使用すると、次のことができます。
ワークロードからの保護の削除など、高リスクの操作に関する即時アラートを受け取る
脅威を調査して、影響を受けたバックアップ リソースを特定する
ケースにバックアップの脅威を集約して、迅速かつ体系的な修復を行う
Security Command Center は、 Google Cloud 全体からログとイベントを取り込み、潜在的なセキュリティ リスクを特定します。Security Command Center Enterprise に含まれている Google SecOps は、SIEM(セキュリティ情報およびイベント管理)と SOAR(セキュリティ オーケストレーション、自動化、対応)のツールであり、複数のソースの脅威をインテリジェントに集約して関連付けます。Google SecOps では、脅威のケース管理と修復も可能です。
始める前に
Security Command Center Premium がまだ有効になっていない場合は、有効にします。これは、 Google Cloud コンソールを使用して行うことができます。Security Command Center Enterprise の場合は、 Google Cloudアカウント チームにお問い合わせください。
検出結果の生成
バックアップと DR サービスでユーザーが行った高リスクのアクションは、Event Threat Detection(Security Command Center Premium と Security Command Center Enterprise の一部)を使用してモニタリングされます。これらのアクションはリアルタイムでモニタリングされ、 Google Cloud全体の他のリスクイベントと相関付けられ、検出結果(Security Command Center)、アラート(Google SecOps)、自動キュレートされたケース(Google SecOps)として表示されます。
Google SecOps には、リスクの高いイベントをアラートとして表示するキュレーションされた検出機能があります。これらのキュレートされた検出には、バックアップとバックアップ リソースに対する潜在的な脅威が含まれます。キュレートされた検出では、追加の構成は必要ありません。アラートは、トリアージと修復のためにケースに集約されます。
バックアップと DR サービスの脅威検出は、Security Command Center Premium と Security Command Center Enterprise のすべてのお客様が利用できます。Google SecOps for Backup and DR Service は、Security Command Center Enterprise をご利用のお客様専用のサービスです。
[[["わかりやすい","easyToUnderstand","thumb-up"],["問題の解決に役立った","solvedMyProblem","thumb-up"],["その他","otherUp","thumb-up"]],[["わかりにくい","hardToUnderstand","thumb-down"],["情報またはサンプルコードが不正確","incorrectInformationOrSampleCode","thumb-down"],["必要な情報 / サンプルがない","missingTheInformationSamplesINeed","thumb-down"],["翻訳に関する問題","translationIssue","thumb-down"],["その他","otherDown","thumb-down"]],["最終更新日 2025-09-04 UTC。"],[[["\u003cp\u003eThis guide explains how Security Command Center and Google Security Operations (SecOps) integrate with Backup and DR Service to provide enhanced security monitoring.\u003c/p\u003e\n"],["\u003cp\u003eThe integration allows for real-time alerts on high-risk actions within Backup and DR Service, such as deleting backups or removing workload protection, directly surfaced in Security Command Center and Google SecOps.\u003c/p\u003e\n"],["\u003cp\u003eSecurity Command Center and Google SecOps help to investigate threats, identify affected backup resources, and aggregate backup threats into cases for faster remediation.\u003c/p\u003e\n"],["\u003cp\u003eHigh-risk actions are monitored using Event Threat Detection, resulting in Security Command Center \u003cem\u003efindings\u003c/em\u003e and Google SecOps \u003cem\u003ealerts\u003c/em\u003e that are also aggregated into auto-curated \u003cem\u003ecases\u003c/em\u003e for easy triage.\u003c/p\u003e\n"],["\u003cp\u003eSecurity Command Center and Google SecOps offer built-in investigation tooling, including integrations with Cloud Logging, MITRE classifications, and Cloud Monitoring, to enable quick investigation and remediation of security findings.\u003c/p\u003e\n"]]],[],null,["# Security Command Center and Google SecOps for Backup and DR Service\n\nThis guide describes the integration between Security Command Center,\nGoogle Security Operations (Google SecOps), and Backup and DR Service.\nThis integration enables alerts for high risk actions that occur within\nBackup and DR Service that are surfaced in Security Command Center and Google SecOps.\n\nWith Security Command Center and Google SecOps for Backup and DR Service you can:\n\n- Receive instant alerts on high-risk actions, such as removing protection from a workload\n- Investigate threats and identify affected backup resources\n- Aggregate backup threats in cases for quick and systematic remediation\n\nSecurity Command Center ingests logs and events from across Google Cloud to identify\npotential security risks. Google SecOps, included as part of\nSecurity Command Center Enterprise, is a SIEM (security information and event management)\nand SOAR (security orchestration, automation, and response) tool that\nintelligently aggregates and correlates threats across multiple sources.\nGoogle SecOps also enables case management and remediation for\nthreats.\n\n**Before You Begin**\n\nActivate Security Command Center Premium if it is not already enabled. This can be done\nusing the Google Cloud console. For Security Command Center Enterprise, contact your Google Cloud\naccount team.\n\n**Generating a Finding**\n\nHigh risk actions taken by a user in Backup and DR Service are monitored using\nEvent Threat Detection (part of Security Command Center Premium and Security Command Center Enterprise).\nThese actions are monitored in real-time, correlated with other risk events\nacross Google Cloud, and surfaced as *findings* (Security Command Center), *alerts*\n(Google SecOps) and auto-curated *cases* (Google SecOps).\n\nThese actions include:\n\n- Deleting a backup\n- Deleting a Backup Plan\n- Removing backup protection from a workload\n- Removing backup infrastructure that may impact recovery\n\nA full list of detections are available in [Security Command Center documentation](/security-command-center/docs).\n\n**Real-time findings in Security Command Center**\n\nWhen an action is deemed a security risk by Security Command Center, a finding is\ngenerated. A security administrator can then take a closer look at the\nresources affected and take recommended next steps. Findings include details\non the resources affected, when the security event occurred, and what actions\nto take to remediate a threat.\n\nSecurity Command Center offers built-in investigation tooling for customers. Links to\nCloud Logging, MITRE indicator, and affected resources enable rapid\nremediation.\n\n- Cloud Logging integration lets you click through to a detailed Cloud Logging query.\n- Cloud Monitoring integration enables [creation of additional alerts](/logging/docs/alerting/log-based-alerts#lba-by-api) on similar events.\n- MITRE classifications indicate type of attack indicated by a finding as shown in this [example](https://attack.mitre.org/techniques/T1490/).\n\n**Case management and remediation in Google SecOps**\n\nGoogle SecOps features *curated detections* which surface high-risk\nevents as Alerts. Among these curated detections are potential threats to backups\nand backup resources. Curated detections require no additional configuration.\nAlerts are also aggregated into cases for triage and remediation.\n\nThreat detection for Backup and DR Service is available to all Security Command Center Premium\nand Security Command Center Enterprise customers. Google SecOps for\nBackup and DR Service is available exclusively to Security Command Center Enterprise customers."]]