[[["わかりやすい","easyToUnderstand","thumb-up"],["問題の解決に役立った","solvedMyProblem","thumb-up"],["その他","otherUp","thumb-up"]],[["わかりにくい","hardToUnderstand","thumb-down"],["情報またはサンプルコードが不正確","incorrectInformationOrSampleCode","thumb-down"],["必要な情報 / サンプルがない","missingTheInformationSamplesINeed","thumb-down"],["翻訳に関する問題","translationIssue","thumb-down"],["その他","otherDown","thumb-down"]],["最終更新日 2025-04-22 UTC。"],[[["\u003cp\u003eThe \u003cstrong\u003eSecurity insights\u003c/strong\u003e side panel in the Google Cloud console provides a comprehensive overview of security metrics for Cloud Build builds, including SLSA level, vulnerabilities, VEX status, SBOM, and build details.\u003c/p\u003e\n"],["\u003cp\u003eEnabling vulnerability scanning, which requires activating the Container Scanning API and storing build artifacts in Artifact Registry, is crucial for obtaining complete \u003cstrong\u003eSecurity insights\u003c/strong\u003e results.\u003c/p\u003e\n"],["\u003cp\u003eViewing \u003cstrong\u003eSecurity insights\u003c/strong\u003e requires specific IAM roles, such as Cloud Build Viewer and Container Analysis Occurrences Viewer, or equivalent permissions.\u003c/p\u003e\n"],["\u003cp\u003eThe \u003cstrong\u003eVulnerabilities\u003c/strong\u003e card shows the vulnerability occurrences, available fixes, and VEX status for the build artifacts and the \u003cstrong\u003eDependencies\u003c/strong\u003e card shows the SBOM for the build.\u003c/p\u003e\n"],["\u003cp\u003eThe SLSA level provides a maturity rating for the software build process based on security assurance guidelines.\u003c/p\u003e\n"]]],[],null,["# View build security insights\n\nThis page explains how to view security information about your Cloud Build\nbuilds using the **Security insights** side panel in the Google Cloud console.\n\nThe **Security insights** side panel provides a high-level overview of multiple\nsecurity metrics. You can use the side panel to identify and mitigate risks in\nyour build process.\n\nThis panel displays the following information:\n\n- **Supply-chain Levels for Software Artifacts (SLSA) Level** : Identifies the maturity level of your software build process in accordance with the [SLSA\n specification](https://slsa.dev/spec/v0.1/levels). For example, this build has achieved SLSA Level 3.\n- **Vulnerabilities** : An overview of any vulnerabilities found in your artifacts, and the name of the image that [Artifact Analysis](/artifact-analysis/docs/artifact-analysis) has scanned. You can click the image name to view vulnerability details. For example, in the screenshot, you can click on **java-guestbook-backend**.\n- [**Vulnerability Exploitability eXchange(VEX) status**](/artifact-analysis/docs/upload-view-vex-statements) for the built artifacts.\n- [**Software bill of materials (SBOM)**](/artifact-analysis/docs/sbom-overview) for the build artifacts.\n- **Build details**: Details of the build such as the builder and the link to view logs.\n\nTo learn how you can use Cloud Build with other Google Cloud products\nand features to improve the security posture of your\nsoftware supply chain, see [Software supply chain security](/software-supply-chain-security/docs/overview).\n\nEnable vulnerability scanning\n-----------------------------\n\nThe **Security insights** panel displays data from Cloud Build and\nfrom [Artifact Analysis](/artifact-analysis/docs/artifact-analysis).\nArtifact Analysis is a service that scans for vulnerabilities in\nOS, Java (Maven) and Go packages when you upload build artifacts to Artifact Registry.\n\nYou must enable vulnerability scanning to receive the complete set of **Security\ninsights** results.\n\n1. Enable the Container Scanning API to turn on vulnerability scanning.\n\n [Enable the Container Scanning API](https://console.cloud.google.com/flows/enableapi?apiid=containerscanning.googleapis.com)\n2. Execute a build and [store your build artifact in\n Artifact Registry](/build/docs/building/store-artifacts-in-artifact-registry).\n Artifact Analysis automatically scans the build artifacts.\n\nVulnerability scanning may take a few minutes, depending on the size of your\nbuild.\n\nFor more information on vulnerability scanning, see [Automatic\nscanning](/artifact-analysis/docs/scanning-types#automated).\n\nThere is a cost for scanning. See the [Pricing\npage](/artifact-analysis/pricing) for pricing information.\n\nGrant permissions to view insights\n----------------------------------\n\nTo view **Security insights** in Google Cloud console, you must have the\nfollowing [IAM roles](/iam/docs/overview), or a role with\nequivalent permissions. If Artifact Registry and Artifact Analysis are\nrunning in different projects, you must add the\nContainer Analysis Occurrences Viewer role or equivalent\npermissions in the project where Artifact Analysis is running.\n\n- [Cloud Build\n Viewer](/iam/docs/understanding-roles#cloudbuild.builds.viewer) (`roles/cloudbuild.builds.viewer`): View insights for a build.\n- [Container Analysis Occurrences Viewer](/iam/docs/understanding-roles#containeranalysis.occurrences.viewer) (`roles/containeranalysis.occurrences.viewer`): View vulnerabilities and other dependency information.\n\nView the Security insights side panel\n-------------------------------------\n\nTo view the **Security insights** panel:\n\n1. Open the **Build History** page in the Google Cloud console:\n\n [Open the Build History page](https://console.cloud.google.com/cloud-build/builds)\n2. Select your project and click **Open**.\n\n3. In the **Region** drop-down menu, select the region in which you ran your\n build.\n\n4. In the table with the builds, locate the row with the build for which you\n want to view security insights.\n\n5. Under the **Security insights** column click **View**.\n\n This opens the **Security insights** side panel.\n6. \\[Optional\\] If your build produces multiple artifacts, select the artifact\n for which you want to view security insights from the **Artifact** drop-down\n box.\n\n This displays the **Security insights** panel for the selected artifact.\n\n### SLSA level\n\nThe [SLSA level](https://slsa.dev/spec/v0.1/levels) rates\nyour build's current level of security assurance based on a collection of\n[guidelines](https://slsa.dev/spec/v0.1/requirements).\n\n### Vulnerabilities\n\nThe **Vulnerabilities** card displays the vulnerability occurrences,\navailable fixes, and VEX status for the build artifacts.\n\n[Artifact Analysis](/artifact-analysis/docs/scanning-types#automated)\nsupports scanning for container images pushed to\n[Artifact Registry](/artifact-registry/docs/overview). The scans detect\nvulnerabilities in operating system packages, and in application packages\ncreated in Java (Maven) or Go.\n\nScanning results are organized by [severity\nlevel](/artifact-analysis/docs/os-overview#severity_levels_for_vulnerabilities).\nThe severity level is a qualitative assessment based on exploitability, scope,\nimpact, and maturity of the vulnerability.\n\nClick the image name to see the artifacts that have been scanned for\nvulnerabilities.\n\nFor every container image pushed to Artifact Registry, Artifact Analysis\ncan store an associated VEX statement. VEX is a type of security advisory that\nindicates whether a product is affected by a known vulnerability.\n\nEach VEX statement provides:\n\n- The publisher of the VEX Statement\n- The artifact for which the statement is written\n- The vulnerability assessment (VEX status) for any known vulnerabilities\n\nDependencies\n------------\n\nThe **Dependencies** card shows a list of SBOMs with a list of\ndependencies.\n\nWhen you build a container image using Cloud Build and push\nit to Artifact Registry, Artifact Analysis can generate SBOM records for\nthe pushed images.\n\nAn SBOM is a full inventory of an application, identifying the packages your\nsoftware relies on. The contents can include third-party software from vendors,\ninternal artifacts, and open source libraries.\n\n### Build\n\nThe Build card includes the following information:\n\n- **Logs** - links to your build log information\n- **Builder** - builder name\n- **Completed** - time elapsed since the build completed\n- **Provenance** - verifiable metadata about a build\n\nProvenance metadata includes details such as the digests of the built images,\nthe input source locations, the build toolchain, build steps, and the build\nduration. You can also [validate build\nprovenance](/build/docs/securing-builds/view-build-provenance#validate_the_provenance_metadata)\nat any time.\n\nTo ensure that your future builds include provenance information, configure\nCloud Build to [require that your images have provenance\nmetadata](/build/docs/securing-builds/view-build-provenance#req-metadata).\n\nWhat's next\n-----------\n\n- Learn about [software supply chain security](/software-supply-chain-security/docs/overview).\n- Learn [software supply chain security best\n practices](/software-supply-chain-security/docs/overview).\n- Learn how to [store and view build\n logs](/build/docs/securing-builds/store-view-build-logs).\n- Learn how to [troubleshoot build errors](/build/docs/troubleshooting)."]]