Enable Compliance Manager

Enable Compliance Manager and configure support for VPC Service Controls service perimeters so that you can apply frameworks to your Google Cloud organization.

Before you begin

Complete these tasks before you enable Compliance Manager.

Enable Compliance Manager

Complete the following steps to enable Compliance Manager at the organization level:

  1. Enable Compliance Manager using one of the following methods:

    Scenario Instructions
    You haven't activated Security Command Center or are using the Security Command Center Standard tier, and want to use the Security Command Center Premium tier. Enable Compliance Manager by activating Security Command Center Premium.
    You haven't activated Security Command Center and want to use the Security Command Center Enterprise tier. Enable Compliance Manager by activating Security Command Center Enterprise.
    You activated the Security Command Center Premium tier previously and want to enable Compliance Manager. Enable Compliance Manager using the Settings page.

    Go to the Settings page

    You activated the Security Command Center Enterprise tier previously and want to enable Compliance Manager. Enable Compliance Manager using the Activate Compliance Manager page.

    Go to Activate Compliance Manager

    For more information about Security Command Center tiers, see Security Command Center service tiers.

    Compliance Manager doesn't support customer-managed encryption keys (CMEK).

    When you enable Compliance Manager, the following services are also enabled:

    The Cloud Security Compliance service agent (service-org-ORGANIZATION_ID@gcp-sa-csc-hpsa.iam.gserviceaccount.com) is created when you enable Compliance Manager. Compliance Manager uses this service agent to access resources in your organization.

For Security Command Center Premium, frameworks are not applied to the organization automatically.

For Security Command Center Enterprise, the following frameworks are applied to the organization automatically:

  • AI Protection
  • Data Security and Privacy Essentials

What's next