Notebook Security Scanner를 사용 설정하고 사용하여 Colab Enterprise 노트북(ipynb 파일 이름 확장자가 있는 파일)에서 사용되는 Python 패키지의 취약점을 탐지하고 이러한 패키지 취약점 발견 항목을 해결할 수 있습니다.
Notebook Security Scanner를 사용 설정하면 Colab Enterprise 노트북을 24시간마다 스캔하고 패키지 취약점 발견 항목을 Security Command Center 발견 항목 페이지에 게시합니다.
us-central1, us-east4, us-west1, europe-west4 리전에서 생성된 Colab Enterprise 노트북에 Notebook Security Scanner를 사용할 수 있습니다.
Notebook Security Scanner 사용 설정
조직 수준 또는 프로젝트 수준에서 Notebook Security Scanner를 사용 설정할 수 있습니다.
Notebook Security Scanner를 사용 설정하는 방법은 조직 또는 프로젝트에 Security Command Center를 활성화해야 하는지 여부 또는 조직 또는 프로젝트에 활성화된 Security Command Center 등급에 따라 다릅니다.
사용 사례에 따라 해당 섹션의 안내를 따르세요.
Notebook Security Scanner를 사용 설정하면 Notebook Security Scanner가 24시간마다 프로젝트 또는 조직의 Colab Enterprise 노트북(ipynb 파일 이름 확장자가 있는 파일)을 스캔하여 Python 패키지의 취약점을 탐지하고 이러한 발견 항목을 Security Command Center 발견 항목 페이지에 게시합니다. 새로 생성된 Colab Enterprise 노트북의 경우 패키지 취약점 발견 항목이 Security Command Center 발견 항목 페이지에 표시되는 데 최대 4시간이 걸릴 수 있습니다.
Security Command Center에서 패키지 취약점 발견 항목을 검토하려면 다음 단계를 따르세요.
Google Cloud 콘솔에서 Security Command Center 발견 사항 페이지로 이동합니다.
[[["이해하기 쉬움","easyToUnderstand","thumb-up"],["문제가 해결됨","solvedMyProblem","thumb-up"],["기타","otherUp","thumb-up"]],[["이해하기 어려움","hardToUnderstand","thumb-down"],["잘못된 정보 또는 샘플 코드","incorrectInformationOrSampleCode","thumb-down"],["필요한 정보/샘플이 없음","missingTheInformationSamplesINeed","thumb-down"],["번역 문제","translationIssue","thumb-down"],["기타","otherDown","thumb-down"]],["최종 업데이트: 2025-09-04(UTC)"],[],[],null,["| **Preview**\n|\n|\n| This feature is subject to the \"Pre-GA Offerings Terms\" in the General Service Terms section\n| of the [Service Specific Terms](/terms/service-terms#1).\n|\n| Pre-GA features are available \"as is\" and might have limited support.\n|\n| For more information, see the\n| [launch stage descriptions](/products#product-launch-stages).\n|\n| **Note:** This feature is available with either the\n| [Enterprise or Premium tier](/security-command-center/docs/service-tiers) of Security Command Center.\n\nYou can enable and use Notebook Security Scanner\nto detect vulnerabilities in Python packages that are used in\nColab Enterprise notebooks (files with the `ipynb` filename extension)\nand resolve those package vulnerability findings.\n\nAfter you enable Notebook Security Scanner, it scans Colab Enterprise\nnotebooks once in every 24 hours and publishes the package vulnerability findings\nto the Security Command Center **Findings** page.\n\nYou can use Notebook Security Scanner for Colab Enterprise notebooks\nthat are created in the following regions: `us-central1`, `us-east4`, `us-west1`,\nand `europe-west4`.\n\nEnable Notebook Security Scanner\n\nYou can enable Notebook Security Scanner at the organization level\nor project level.\n\nThe way you enable Notebook Security Scanner depends on whether\nSecurity Command Center needs to be activated for your organization or project, or on\nthe Security Command Center tier that is activated for your organization or project.\nDepending on your use case, follow the instructions in the appropriate section: \n\nNew activation Premium tier\n\nIf your organization doesn't have Security Command Center,\nthen activate Security Command Center Premium tier for your organization or project,\nand enable Notebook Security Scanner.\n\n1. In the Google Cloud console, go to the Security Command Center page.\n\n [Go to Security Command Center](https://console.cloud.google.com/security/command-center/config/services)\n2. In the resource selector, select your organization or project.\n3. Click **Get Security Command Center**.\n4. Select the **Premium** tier, and click **Next**.\n5. For **Notebook Security Scanner** , select **Enable** from the list, and click **Next**.\n6. Select **Grant roles automatically** , and then click **Grant roles**.\n7. After the service account is provisioned, click **Next**.\n8. To complete the activation process, click **Finish**.\n\nNew activation Enterprise tier\n\nIf your organization doesn't have Security Command Center,\nthen [activate Security Command Center Enterprise tier](/security-command-center/docs/activate-enterprise-tier#activate-the-security-command-center-enterprise-tier) for your organization,\nand enable Notebook Security Scanner.\n\nExisting Premium or Enterprise tier\n\nIf the Security Command Center Premium or Enterprise tier is activated for your\norganization or project, then enable Notebook Security Scanner.\n\n1. In the Google Cloud console, go to the Security Command Center page.\n\n [Go to Security Command Center](https://console.cloud.google.com/security/command-center/config/services)\n2. Click **settingsSettings**.\n3. In the **Notebook Security Scanner** card, click **Manage settings**.\n4. For your project, select **Enable** from the **Notebook Security Scanner** column.\n\nReview and resolve package vulnerability findings\n\nAfter you enable Notebook Security Scanner, Notebook Security Scanner\nscans the Colab Enterprise notebooks (files with the `ipynb` filename extension)\nin your project or organization every 24 hours to detect vulnerabilities in\nPython packages and publishes these findings to the Security Command Center\n**Findings** page. For a newly created Colab Enterprise\nnotebook, the package vulnerability findings might take a maximum of four hours\nto appear in the Security Command Center **Findings** page.\n\nTo review package vulnerability findings in Security Command Center, follow these\nsteps:\n\n1. In the Google Cloud console, go to the Security Command Center **Findings** page.\n\n [Go to Findings](https://console.cloud.google.com/security/command-center/findingsv2)\n2. In the resource selector, select your organization or project.\n\n3. In the **Quick filters** section, go to the **Source display name** subsection,\n and then select **Notebook Security Scanner**.\n\n The **Findings query results** panel shows only the\n package vulnerability findings of Notebook Security Scanner.\n4. To view details of a specific finding, click the finding name in the\n **Category** column. The finding details panel expands to display a summary\n of the finding details.\n\n | **Note:** There might be some vulnerabilities published with packages and versions which might not be present in the notebook. This is because, for the Python packages that are being installed without versions in unexecuted code cells, Notebook Security Scanner assumes the latest package version according to the [Python Package Index (PyPI)](https://pypi.org/) and publishes any vulnerabilities.\n5. To resolve a package vulnerability finding, follow the steps mentioned in the\n **Next steps** section of the finding.\n\n In some cases, a fix for a package vulnerability might not be available.\n In such cases, we recommend that you use alternative Python packages.\n\nWhat's next\n\n- [View package vulnerability findings](/security-command-center/docs/view-python-package-vulnerabilities)."]]