カスタム モジュールは、組織固有のニーズを満たす検出ルールを持つモジュールが必要な場合に役立ちます。たとえば、リソースが特定の IP アドレスに接続されていることや、リソースが制限のあるリージョンで作成されたことがログエントリに示されている場合は、検出結果を作成するカスタム モジュールを追加できます。
Event Threat Detection 用カスタム モジュールの仕組み
カスタム モジュールとは、Event Threat Detection 検出機能の特定のグループのことで、独自の検出パラメータを使用して構成できます。Event Threat Detection 用カスタム モジュールは Google Cloud コンソールから作成できます。また、カスタム モジュール テンプレートを更新し、そのカスタム モジュールを Google Cloud CLI から Security Command Center に送信することもできます。利用可能なテンプレートについては、カスタム モジュールとテンプレートをご覧ください。
カスタム モジュール テンプレートは JSON で記述します。このテンプレートでは、検出パラメータを定義して、ログエントリ内のどのイベントで検出結果をトリガーするかを制御できます。たとえば、組み込み Malware: Bad IP 検出機能は、既知の不審な IP アドレスへの接続の証拠について、Virtual Private Cloud のフローログを確認します。お客様が保有する疑わしい IP アドレスのリストを使用し、Configurable Bad IP カスタム モジュールを有効にして変更することもできます。指定した IP アドレスへの接続がログに示されている場合は、検出結果が生成され、Security Command Center に書き込まれます。
[[["わかりやすい","easyToUnderstand","thumb-up"],["問題の解決に役立った","solvedMyProblem","thumb-up"],["その他","otherUp","thumb-up"]],[["わかりにくい","hardToUnderstand","thumb-down"],["情報またはサンプルコードが不正確","incorrectInformationOrSampleCode","thumb-down"],["必要な情報 / サンプルがない","missingTheInformationSamplesINeed","thumb-down"],["翻訳に関する問題","translationIssue","thumb-down"],["その他","otherDown","thumb-down"]],["最終更新日 2025-03-11 UTC。"],[],[],null,["| Premium and Enterprise [service tiers](/security-command-center/docs/service-tiers)\n\nThis page provides an overview of custom modules for Event Threat Detection.\n\nYou can configure modules, also known as *detectors* , to process your\n[Cloud Logging](/logging/docs/overview) stream and\ndetect threats based on parameters you specify. This feature extends the\nmonitoring capabilities of Event Threat Detection and lets you add modules with your\nown detection parameters, remediation guidance, and severity designations for\nconfigurations that the built-in detectors might not support.\n\nCustom modules are useful if you need modules with detection rules that meet the\nunique needs of your organization. For example, you can add a custom module that\ncreates findings if log entries show that a resource is connected to specific IP\naddresses or is created in a restricted region.\n\nHow custom modules for Event Threat Detection work\n\nCustom modules are a select group of Event Threat Detection detectors that you can\nconfigure with your own detection parameters. You can create an\nEvent Threat Detection custom module through the Google Cloud console. Alternatively,\nyou can create one by updating a custom module template and\nsending the custom module to Security Command Center through the Google Cloud CLI. For\ninformation about available templates, see [Custom modules and\ntemplates](#custom_modules_and_templates).\n\nCustom module templates are written in JSON and let you define detection\nparameters that control what events in log entries should trigger findings. For\nexample, the built-in `Malware: Bad IP` detector checks\nVirtual Private Cloud Flow Logs for evidence of connections to known suspicious IP\naddresses. However, you can enable and modify the `Configurable Bad IP` custom\nmodule with a list of suspicious IP addresses that you maintain. If your logs\nindicate a connection to any of your supplied IP addresses, a finding is\ngenerated and written to Security Command Center.\n\nModule templates also let you define the severity of threats and provide custom\nremediation steps to help your security teams fix issues.\n\nWith custom modules, you have more control over how Event Threat Detection detects\nthreats and reports findings. Custom modules include your supplied parameters,\nbut still utilize Event Threat Detection's proprietary detection logic and threat\nintelligence, including tripwire indicator matching. You can implement a broad\nset of threat models tailored to your organization's unique requirements.\n\nEvent Threat Detection custom modules run alongside the built-in detectors. Enabled\nmodules run in real-time mode, which triggers scans whenever new logs are\ncreated.\n\nCustom modules and templates\n\nThe following table contains a list of supported custom module types,\ndescriptions, required logs, and JSON module templates.\n\nYou need these JSON module templates if you want to use the\ngcloud CLI to create or update custom modules. To see a template,\nclick the expand icon add_circle next to its name. For information\nabout using custom modules, see [Configure and manage custom\nmodules](/security-command-center/docs/use-custom-modules-etd).\n\n| Finding category | Module type | Log source types | Description |\n|-----------------------------------------|-------------------------------------------------------|-----------------------------------------------------------------------------------------------------------------------------------------------|-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|\n| Configurable bad IP | `CONFIGURABLE_BAD_IP` | [VPC flow logs](/vpc/docs/flow-logs) [Firewall Rules logs](/vpc/docs/firewall-rules-logging) | Detects a connection to a specified IP address |\n| Configurable bad domain | `CONFIGURABLE_BAD_DOMAIN` | [Cloud DNS logs](/dns/docs/monitoring) | Detects a connection to a specified domain name |\n| Unexpected Compute Engine instance type | `CONFIGURABLE_ALLOWED_COMPUTE_ENGINE_INSTANCE_TYPE` | **Cloud Audit Logs:** [Admin Activity logs](/iam/docs/audit-logging) | Detects the creation of Compute Engine instances that do not match a specified instance type or configuration. |\n| Unexpected Compute Engine source image | `CONFIGURABLE_ALLOWED_COMPUTE_ENGINE_SOURCE_IMAGE` | **Cloud Audit Logs:** [Admin Activity logs](/iam/docs/audit-logging) | Detects the creation of a Compute Engine instance with an image or image family that does not match a specified list |\n| Unexpected Compute Engine region | `CONFIGURABLE_ALLOWED_COMPUTE_ENGINE_REGION` | **Cloud Audit Logs:** [Admin Activity logs](/iam/docs/audit-logging) | Detects the creation of a Compute Engine instance in a region that is not in a specified list |\n| Breakglass account used | `CONFIGURABLE_BREAKGLASS_ACCOUNT_USED` | **Cloud Audit Logs:** [Admin Activity logs](/iam/docs/audit-logging) [Data Access logs](/logging/docs/audit/configure-data-access) (optional) | Detects the usage of an emergency access (*breakglass*) account |\n| Unexpected role grant | `CONFIGURABLE_UNEXPECTED_ROLE_GRANT` | **Cloud Audit Logs:** [Admin Activity logs](/iam/docs/audit-logging) | Detects when a specified role is granted to a user |\n| Custom role with prohibited permission | `CONFIGURABLE_CUSTOM_ROLE_WITH_PROHIBITED_PERMISSION` | **Cloud Audit Logs:** [Admin Activity logs](/iam/docs/audit-logging) | Detects when a custom role with any of the specified IAM permissions is created or updated. |\n| Unexpected Cloud API Call | `CONFIGURABLE_UNEXPECTED_CLOUD_API_CALL` | **Cloud Audit Logs:** [Admin Activity logs](/iam/docs/audit-logging) [Data Access logs](/logging/docs/audit/configure-data-access) (optional) | Detects when a specified principal calls a specified method against a specified resource. A finding is generated only if all regular expressions are matched in a single log entry. |\n\nPricing and quota\n\nThis feature is free of charge to Security Command Center Premium\ncustomers.\n\nEvent Threat Detection custom modules are subject to quota limits.\n\nThe default quota limit for the creation of custom modules is 200.\n\nAPI calls to custom module methods are also subject to quota limits. The\nfollowing table shows the default quota limits for custom module API calls.\n\n| API call type | Limit |\n|------------------------|----------------------------------------------|\n| Get, List | 1,000 API calls per minute, per organization |\n| Create, Update, Delete | 60 API calls per minute, per organization |\n\nModule size limits\n\nEach Event Threat Detection custom module has a\nsize limit of 6 MB.\n\nRate limits\n\nThe following rate limits apply:\n\n- 30 findings per custom module per hour.\n- 200 custom module findings per parent resource (organization or project) per hour. Each finding counts towards either an organization or project, depending on which level the source custom module was created in.\n\nThese limits can't be increased.\n\nWhat's next\n\n- Learn how to [create and manage custom modules](/security-command-center/docs/use-custom-modules-etd)."]]