Jump to Content
Security & Identity

Cloud Security Command Center is now in beta and ready to use

December 5, 2018
Andy Chang

Senior Product Manager, Google Cloud

If you’re building applications or deploying infrastructure in the cloud, you need a central place to help understand your security posture, put it in a business context, and act on changes. In March, we announced Cloud Security Command Center in alpha, becoming the first major cloud provider to offer organization-level visibility into assets, vulnerabilities, and threats. Starting today, this security service is available to Google Cloud Platform (GCP) customers in beta.

This beta release comes with a number of new features, including:

  • Expanded coverage across GCP services including Cloud Datastore, Cloud DNS, Cloud Load Balancing, Cloud Spanner, Container Registry, Kubernetes Engine, and Virtual Private Cloud
  • 13 IAM roles added for fine grained access control across Cloud SCC
  • New examples of how to generate notifications when changes occur, or to trigger Cloud Functions from a Cloud SCC query
  • Ability to view and search for new, deleted, and total assets over a specified time period
  • Expanded client libraries including Java, Node, and Go
  • Expanded capabilities to manage asset discovery
  • Self-serve onboarding via GCP Marketplace
  • Self-serve partner security sources, such as Cavirin, Chef, and Redlock, via GCP Marketplace

Cloud Security Command Center (Cloud SCC) provides security teams with insight into infrastructure, configuration, application and data risk so that you can quickly address vulnerabilities, mitigate threats to your cloud resources and evaluate your overall security posture. With Cloud SCC, you can view and monitor an inventory of your cloud assets, be alerted to security anomalies, scan cloud storage to discover where you are storing sensitive data, detect common web vulnerabilities, and review access rights to your critical resources, all from a single, centralized data platform and dashboard.

Cloud Security Command Center gives us unprecedented visibility into the security posture of our VM instances and containerized workloads running within GCP. With this security service, we can quickly review and assess risks across all our GCP assets.

Alexander Schuchman, Director Information Security, Colgate-Palmolive

Cloud SCC is the best way to get started assessing and remediating security risks in your GCP environment. Here are three ways to use the service today:

1. Assess security risks and vulnerabilities

The Cloud SCC dashboard presents findings that help you quickly uncover security risks and potential vulnerabilities and threats. For example, you can view which Cloud Storage buckets are publicly accessible, identify VMs with public addresses, discover overly permissive firewall rules, and be alerted to instances that may have been compromised to perform coin mining. You can also easily see if users outside of your designated domain, or GCP organization, have access to your resources.

https://storage.googleapis.com/gweb-cloudblog-publish/images/discover_non-org_owners.max-1300x1300.png
Use Cloud SCC to quickly discover non-org owners with access to GCP resources
https://storage.googleapis.com/gweb-cloudblog-publish/images/uncover_VMs.max-1400x1400.png
With Cloud SCC, you can uncover VMs that are exposed to the internet

2. View and act on changes to your GCP assets

Cloud SCC gives you a comprehensive inventory of your cloud assets across numerous GCP services including App Engine, Cloud Datastore, Cloud DNS, Cloud Load Balancing, Cloud Spanner, Cloud Storage, Compute Engine, Container Registry, Kubernetes Engine, and Virtual Private Cloud. You can also view the inventory of your service accounts.

Using asset inventory, you can view resources for the entire GCP organization or just for particular projects. Cloud SCC performs ongoing discovery scans, allowing you to see asset history to understand exactly what’s changed in your environment and act on unauthorized modifications. With the assets display, you can see new, deleted, and total assets for a specified time period.

You can also generate notifications when changes occur and trigger Cloud Functions from a Cloud SCC query. For example, you can configure an action to automatically detect policy changes on a network firewall and then restore it back to a secure state, or detect when a Cloud Storage bucket becomes publicly accessible and then revert back to private access.

3. Integrate security findings from Google and other cloud security leaders

Cloud SCC is a flexible platform that integrates with Google Cloud security services such as Data Loss Prevention (DLP) API, Forseti, Cloud Security Scanner, and anomaly detection from Google as well as with third-party cloud security solutions from vendors such as Cavirin, Chef,  and Redlock. By integrating partner solutions with Cloud Security Command Center, you can get a comprehensive view of risks and threats all in one place without having to go to separate consoles. You can also jump from the Cloud SCC dashboard directly into these third-party tools to help speed remediation efforts.

https://storage.googleapis.com/gweb-cloudblog-publish/images/integrates.max-1800x1800.png
Cloud SCC integrates with leading third-party cloud security vendors

Cloud SCC can help you get a better handle on the security of your GCP environment today. Visit the Cloud SCC webpage for a product overview and documentation. You can start using Cloud SCC today, straight from GCP Marketplace.

Learn more about the Cavirin and Chef integrations.

Posted in