Mantenha tudo organizado com as coleções
Salve e categorize o conteúdo com base nas suas preferências.
É possível ativar e usar o Notebook Security Scanner
para detectar vulnerabilidades em pacotes Python usados em
notebooks do Colab Enterprise (arquivos com a extensão ipynb)
e resolver essas descobertas de vulnerabilidade.
Depois de ativar o Notebook Security Scanner, ele verifica os notebooks do Colab Enterprise
uma vez a cada 24 horas e publica as descobertas de vulnerabilidade do pacote
na página Descobertas do Security Command Center.
Você pode usar o Notebook Security Scanner para notebooks do Colab Enterprise
criados nas seguintes regiões: us-central1, us-east4, us-west1
e europe-west4.
Ativar o Notebook Security Scanner
É possível ativar o Notebook Security Scanner no nível da organização
ou do projeto.
A maneira de ativar o Notebook Security Scanner depende de se o Security Command Center precisa ser ativado para sua organização ou projeto ou do nível do Security Command Center ativado para sua organização ou projeto.
Dependendo do seu caso de uso, siga as instruções na seção apropriada:
Analisar e resolver descobertas de vulnerabilidade de pacotes
Depois de ativar o Notebook Security Scanner, ele
verifica os notebooks do Colab Enterprise (arquivos com a extensão ipynb)
no seu projeto ou organização a cada 24 horas para detectar vulnerabilidades em
pacotes do Python e publica essas descobertas na página Descobertas do Security Command Center. Para um notebook do Colab Enterprise recém-criado, as descobertas de vulnerabilidade do pacote podem levar até quatro horas para aparecer na página Descobertas do Security Command Center.
Para analisar as descobertas de vulnerabilidade de pacote no Security Command Center, siga estas etapas:
No console do Google Cloud , acesse a página Descobertas do Security Command Center.
No seletor de recursos, selecione sua organização ou projeto.
Na seção Filtros rápidos, acesse a subseção Nome de exibição da origem e selecione Notebook Security Scanner.
O painel Resultados da consulta de descobertas mostra apenas as descobertas de vulnerabilidade de pacote do Notebook Security Scanner.
Para ver detalhes sobre uma descoberta específica, clique no nome dela na coluna
Categoria. O painel de detalhes da descoberta se expande para mostrar um resumo
dos detalhes da descoberta.
Para resolver uma descoberta de vulnerabilidade de pacote, siga as etapas mencionadas na seção Próximas etapas da descoberta.
Em alguns casos, uma correção para uma vulnerabilidade de pacote pode não estar disponível.
Nesses casos, recomendamos que você use pacotes alternativos do Python.
[[["Fácil de entender","easyToUnderstand","thumb-up"],["Meu problema foi resolvido","solvedMyProblem","thumb-up"],["Outro","otherUp","thumb-up"]],[["Difícil de entender","hardToUnderstand","thumb-down"],["Informações incorretas ou exemplo de código","incorrectInformationOrSampleCode","thumb-down"],["Não contém as informações/amostras de que eu preciso","missingTheInformationSamplesINeed","thumb-down"],["Problema na tradução","translationIssue","thumb-down"],["Outro","otherDown","thumb-down"]],["Última atualização 2025-09-05 UTC."],[],[],null,["| **Preview**\n|\n|\n| This feature is subject to the \"Pre-GA Offerings Terms\" in the General Service Terms section\n| of the [Service Specific Terms](/terms/service-terms#1).\n|\n| Pre-GA features are available \"as is\" and might have limited support.\n|\n| For more information, see the\n| [launch stage descriptions](/products#product-launch-stages).\n|\n| **Note:** This feature is available with either the\n| [Enterprise or Premium tier](/security-command-center/docs/service-tiers) of Security Command Center.\n\nYou can enable and use Notebook Security Scanner\nto detect vulnerabilities in Python packages that are used in\nColab Enterprise notebooks (files with the `ipynb` filename extension)\nand resolve those package vulnerability findings.\n\nAfter you enable Notebook Security Scanner, it scans Colab Enterprise\nnotebooks once in every 24 hours and publishes the package vulnerability findings\nto the Security Command Center **Findings** page.\n\nYou can use Notebook Security Scanner for Colab Enterprise notebooks\nthat are created in the following regions: `us-central1`, `us-east4`, `us-west1`,\nand `europe-west4`.\n\nEnable Notebook Security Scanner\n\nYou can enable Notebook Security Scanner at the organization level\nor project level.\n\nThe way you enable Notebook Security Scanner depends on whether\nSecurity Command Center needs to be activated for your organization or project, or on\nthe Security Command Center tier that is activated for your organization or project.\nDepending on your use case, follow the instructions in the appropriate section: \n\nNew activation Premium tier\n\nIf your organization doesn't have Security Command Center,\nthen activate Security Command Center Premium tier for your organization or project,\nand enable Notebook Security Scanner.\n\n1. In the Google Cloud console, go to the Security Command Center page.\n\n [Go to Security Command Center](https://console.cloud.google.com/security/command-center/config/services)\n2. In the resource selector, select your organization or project.\n3. Click **Get Security Command Center**.\n4. Select the **Premium** tier, and click **Next**.\n5. For **Notebook Security Scanner** , select **Enable** from the list, and click **Next**.\n6. Select **Grant roles automatically** , and then click **Grant roles**.\n7. After the service account is provisioned, click **Next**.\n8. To complete the activation process, click **Finish**.\n\nNew activation Enterprise tier\n\nIf your organization doesn't have Security Command Center,\nthen [activate Security Command Center Enterprise tier](/security-command-center/docs/activate-enterprise-tier#activate-the-security-command-center-enterprise-tier) for your organization,\nand enable Notebook Security Scanner.\n\nExisting Premium or Enterprise tier\n\nIf the Security Command Center Premium or Enterprise tier is activated for your\norganization or project, then enable Notebook Security Scanner.\n\n1. In the Google Cloud console, go to the Security Command Center page.\n\n [Go to Security Command Center](https://console.cloud.google.com/security/command-center/config/services)\n2. Click **settingsSettings**.\n3. In the **Notebook Security Scanner** card, click **Manage settings**.\n4. For your project, select **Enable** from the **Notebook Security Scanner** column.\n\nReview and resolve package vulnerability findings\n\nAfter you enable Notebook Security Scanner, Notebook Security Scanner\nscans the Colab Enterprise notebooks (files with the `ipynb` filename extension)\nin your project or organization every 24 hours to detect vulnerabilities in\nPython packages and publishes these findings to the Security Command Center\n**Findings** page. For a newly created Colab Enterprise\nnotebook, the package vulnerability findings might take a maximum of four hours\nto appear in the Security Command Center **Findings** page.\n\nTo review package vulnerability findings in Security Command Center, follow these\nsteps:\n\n1. In the Google Cloud console, go to the Security Command Center **Findings** page.\n\n [Go to Findings](https://console.cloud.google.com/security/command-center/findingsv2)\n2. In the resource selector, select your organization or project.\n\n3. In the **Quick filters** section, go to the **Source display name** subsection,\n and then select **Notebook Security Scanner**.\n\n The **Findings query results** panel shows only the\n package vulnerability findings of Notebook Security Scanner.\n4. To view details of a specific finding, click the finding name in the\n **Category** column. The finding details panel expands to display a summary\n of the finding details.\n\n | **Note:** There might be some vulnerabilities published with packages and versions which might not be present in the notebook. This is because, for the Python packages that are being installed without versions in unexecuted code cells, Notebook Security Scanner assumes the latest package version according to the [Python Package Index (PyPI)](https://pypi.org/) and publishes any vulnerabilities.\n5. To resolve a package vulnerability finding, follow the steps mentioned in the\n **Next steps** section of the finding.\n\n In some cases, a fix for a package vulnerability might not be available.\n In such cases, we recommend that you use alternative Python packages.\n\nWhat's next\n\n- [View package vulnerability findings](/security-command-center/docs/view-python-package-vulnerabilities)."]]