This page explains how to manage Security Health Analytics findings using Security Command Center.
Security Health Analytics is a built-in service in Security Command Center that scans the resources in your cloud environment and issues findings for any misconfigurations that it detects.
To receive Security Health Analytics findings, the service must be enabled in Security Command Center Services settings.
To receive findings for another cloud platform, Security Command Center must be connected to the other cloud platform.
Findings from Security Health Analytics detectors are searchable in the Google Cloud console, using the Security Command Center API, and, if you are using the Enterprise tier of Security Command Center, in the Security Operations console.
Scans start approximately one hour after Security Command Center is enabled. On Google Cloud, run in two modes: batch mode, which automatically runs once each day; and real-time mode, which runs scans against asset configuration changes.
Security Health Analytics detectors that don't support real-time scanning mode are listed in Security Command Center latency overview.
Security Health Analytics scans other cloud platforms in batch mode only.
Before you begin
To get the permissions that you need to manage Security Health Analytics findings, ask your administrator to grant you the following IAM roles on your organization, folder, or project:
-
Enable and disable detectors:
Security Center Settings Editor (
roles/securitycenter.settingsEditor
) -
View and filter findings:
Security Center Findings Viewer (
roles/securitycenter.findingsViewer
) -
Manage mute rules:
Security Center Mute Configurations Editor (
roles/securitycenter.muteConfigsEditor
) -
Manage security marks:
Security Center Finding Security Marks Writer (
roles/securitycenter.findingSecurityMarksWriter
) -
Programmatically manage findings:
Security Center Findings Editor (
roles/securitycenter.findingsEditor
) -
Grant inbound access to a VPC Service Controls service perimeter:
Access Context Manager Editor (
roles/accesscontextmanager.policyEditor
) -
Complete any task on this page:
Security Center Settings Admin (
roles/securitycenter.settingsAdmin
)
For more information about granting roles, see Manage access to projects, folders, and organizations.
You might also be able to get the required permissions through custom roles or other predefined roles.
Enable and disable detectors
Disabling detectors can impact the state of active findings. When a detector is disabled, existing findings are automatically marked as inactive.
When you activate Security Command Center at the organization level, you can disable Security Health Analytics or specific detectors for specific folders or projects. If Security Health Analytics or detectors are turned off for folders and projects, any existing findings attached to assets in those resources are marked as inactive.
The following Security Health Analytics detectors for Google Cloud are disabled by default:
ALLOYDB_AUTO_BACKUP_DISABLED
ALLOYDB_CMEK_DISABLED
BIGQUERY_TABLE_CMEK_DISABLED
BUCKET_CMEK_DISABLED
CLOUD_ASSET_API_DISABLED
DATAPROC_CMEK_DISABLED
DATASET_CMEK_DISABLED
DISK_CMEK_DISABLED
DISK_CSEK_DISABLED
NODEPOOL_BOOT_CMEK_DISABLED
PUBSUB_CMEK_DISABLED
SQL_CMEK_DISABLED
SQL_NO_ROOT_PASSWORD
SQL_WEAK_ROOT_PASSWORD
VPC_FLOW_LOGS_SETTINGS_NOT_RECOMMENDED
To enable or disable a Security Health Analytics detection module, do the following:
Console
You can enable or disable detectors on the Modules tab of the Security Health Analytics page in Security Command Center Settings in the Google Cloud console. The detectors can be enabled or disabled at the organization level or the project level.
gcloud
To enable a detector, also known as a module, run the
gcloud alpha scc settings services modules enable
command.
If you activated Security Command Center at the organization level, run the following command:
gcloud alpha scc settings services modules enable \
--organization=ORGANIZATION_ID \
--service=SECURITY_HEALTH_ANALYTICS \
--module=DETECTOR_NAME
Replace the following:
ORGANIZATION_ID
: your organization IDDETECTOR_NAME
: the name of the detector you want to enable
If you activated Security Command Center at the project level, run the following command:
gcloud alpha scc settings services modules enable \
--project=PROJECT_ID \
--service=SECURITY_HEALTH_ANALYTICS \
--module=DETECTOR_NAME
Replace the following:
PROJECT_ID
: your project IDDETECTOR_NAME
: the name of the detector you want to enable
To disable a detector, run the
gcloud alpha scc settings services modules disable
command.
If you activated Security Command Center at the organization level, run the following command:
gcloud alpha scc settings services modules disable \
--organization=ORGANIZATION_ID \
--service=SECURITY_HEALTH_ANALYTICS \
--module=DETECTOR_NAME
Replace the following:
ORGANIZATION_ID
: your organization IDDETECTOR_NAME
: the name of the detector you want to disable
If you activated Security Command Center at the project level, run the following command:
gcloud alpha scc settings services modules disable \
--project=PROJECT_ID \
--service=SECURITY_HEALTH_ANALYTICS \
--module=DETECTOR_NAME
Replace the following:
PROJECT_ID
: your project IDDETECTOR_NAME
: the name of the detector you want to disable
Filtering findings in the Google Cloud console
A large organization might have many vulnerability findings across their deployment to review, triage, and track. By using filters that are available on the Security Command Center Vulnerabilities and Findings pages in the Google Cloud console, you can focus on the highest severity vulnerabilities across your organization, and review vulnerabilities by asset type, project, and more.
For more information about filtering vulnerability findings, see Filter vulnerability findings in Security Command Center.
Manage findings with cases
Security Command Center automatically opens a case in the Security Operations console
for vulnerability and misconfiguration findings that have a severity level
of HIGH
or CRITICAL
. A single case can contain multiple related findings.
Use the case, which can be integrated with your preferred ticketing system, to manage the investigation and remediation of findings, by assigning owners, reviewing related information, and, with playbooks, automate your response workflow.
If a finding has a corresponding case, you can find a link to its case on the details page of the finding. Open the details page for a finding from the Findings page in the Google Cloud console. You can also see the total number of vulnerability cases that are open on the Risk overview page in the Google Cloud console.
For more information about cases, see Cases overview.
Mute findings
To control the volume of findings in Google Cloud console, you can manually or programmatically mute individual findings, or create mute rules that automatically mute findings based on filters you define. There are two types of mute rules you can use to control finding volume:
- Static mute rules that indefinitely mute future findings.
- Dynamic mute rules that contain an option to temporarily mute current and future findings.
We recommend using dynamic mute rules exclusively to reduce the number of findings you review manually. To avoid confusion, we don't recommend using both static and dynamic mute rules simultaneously. For a comparison of the two rule types, see Types of mute rules.
Findings that you mute in the Google Cloud console are hidden and silenced, but continue to be logged for audit and compliance purposes. You can view muted findings or unmute them at any time. To learn more, see Mute findings in Security Command Center.
Marking assets and findings with security marks
You can add custom properties to findings and assets in Security Command Center by using security marks. Security marks enable you to identify high-priority areas of interest like production projects, tag findings with bug and incident tracking numbers, and more.
For assets, you can add security marks only to those assets that Security Command Center supports. For the list of supported assets, see Supported asset types in Security Command Center.
Add assets to allowlists
Although it is not a recommended method, you can suppress unneeded findings by adding dedicated security marks to assets so that the Security Health Analytics detectors don't create security findings for those assets.
The recommended and most effective approach for controlling finding volume is to Mute findings. Mute findings that you don't need to review, because they are either for assets that are isolated or because the findings fall within acceptable business parameters.
When you apply dedicated security marks to assets, the assets are added to an allowlist in Security Health Analytics, which marks any findings for those assets as resolved during the next batch scan.
Dedicated security marks must be applied directly to assets, not findings, as described in How allowlists work later on this page. If you apply a mark to a finding, the underlying asset can still generate findings.
How allowlists work
Each Security Health Analytics detector has a dedicated mark type for allowlists, in
the form of allow_FINDING_TYPE:true
. Adding this
dedicated mark to an asset that is supported by Security Command Center
lets you exclude the asset from the detection policy.
For example, to exclude the finding type SSL_NOT_ENFORCED
, set the security
mark, allow_ssl_not_enforced:true
, on the related Cloud SQL instance.
The specified detector won't create findings for marked assets.
For a complete list of finding types, see the Security Health Analytics detectors list. To learn more about security marks and techniques for using them, see Using security marks.
Asset types
This section describes how security marks work for different assets.
Allowlist assets: When you add a dedicated mark to an asset, like a Cloud Storage bucket or firewall, the associated finding is marked as resolved when the next batch scan runs. The detector won't generate new findings or update existing findings for the asset until the mark is removed.
Allowlist projects: When you add a mark to a project resource, findings for which the project itself is the scanned, or target, resource are resolved. However, assets contained within the project, such as virtual machines or crypto keys, can still generate findings. This security mark is only available if you activate Security Command Center Premium tier at the organization level.
Allowlist folders: When you add a mark to a folder resource, findings for which the folder itself is the scanned, or target, resource are resolved. However, assets contained within the folder, including projects, can still generate findings. This security mark is only available if you activate Security Command Center Premium tier at the organization level.
Detectors that support multiple assets: If a detector supports more than one asset type, you must apply the dedicated mark to each asset. For example, the
KMS_PUBLIC_KEY
detector supportsCryptoKey
andKeyRing
Cloud Key Management Service assets. If you apply the markallow_kms_public_key:true
to theCryptoKey
asset, thenKMS_PUBLIC_KEY
findings for that asset are resolved. However, findings can still be generated for theKeyRing
asset.
Security marks are only updated during batch scans, not real-time scans. If a dedicated security mark is removed, and the asset has a vulnerability, it might take up to 24 hours before the mark is deleted and a finding is written.
Special-case detector: Customer Supplied Encryption Keys
The
DISK_CSEK_DISABLED
detector isn't on by default. To use this detector, you must mark the
assets for which you want to use self-managed encryption keys.
To enable the DISK_CSEK_DISABLED
detector for specific assets,
apply the security mark
enforce_customer_supplied_disk_encryption_keys
to the asset with a value of
true
.
Viewing active finding count by finding type
You can use the Google Cloud console or Google Cloud CLI commands to view active finding counts by finding type.
Console
The Google Cloud console lets you view a count of active findings for each finding type.
To view Security Health Analytics findings by finding type, do the following:
Go to Security Command Center in the Google Cloud console.
To display Security Health Analytics findings, click the Vulnerabilities page.
To sort findings by the number of active findings for each finding type, click the Active column header.
gcloud
To use the gcloud CLI to get a count of all active findings, you query Security Command Center to get the Security Health Analytics source ID. Then you use the source ID to query the active findings count.
Step 1: Get the source ID
To get the source ID, run one of the following commands:
If you activated Security Command Center at the organization level, run the following command:
gcloud scc sources describe organizations/ORGANIZATION_ID \ --source-display-name="Security Health Analytics"
If you activated Security Command Center at the project level, run the following command:
gcloud scc sources describe projects/PROJECT_ID \ --source-display-name="Security Health Analytics"
If you haven't already enabled the Security Command Center API, you are prompted to enable it. When the Security Command Center API is enabled, run the previous command again. The command should display output like the following:
description: Scans for deviations from a GCP security baseline.
displayName: Security Health Analytics
name: organizations/ORGANIZATION_ID/sources/SOURCE_ID
Note the SOURCE_ID
to use in the next step.
Step 2: Get the active findings count
Use the SOURCE_ID
you noted in the previous step to
filter findings from Security Health Analytics. The following gcloud CLI
commands return a count of findings by category.
If you activated Security Command Center at the organization level, run the following command:
gcloud scc findings group organizations/ORGANIZATION_ID/sources/SOURCE_ID \ --group-by=category --page-size=PAGE_SIZE
If you activated Security Command Center at the project level, run the following command:
gcloud scc findings group projects/PROJECT_ID/sources/SOURCE_ID \ --group-by=category --page-size=PAGE_SIZE
You can set the page size to any value up to 1000. The command should display output like the following, with results from your organization:
groupByResults:
- count: '1'
properties:
category: MFA_NOT_ENFORCED
- count: '3'
properties:
category: ADMIN_SERVICE_ACCOUNT
- count: '2'
properties:
category: API_KEY_APIS_UNRESTRICTED
- count: '1'
properties:
category: API_KEY_APPS_UNRESTRICTED
- count: '2'
properties:
category: API_KEY_EXISTS
- count: '10'
properties:
category: AUDIT_CONFIG_NOT_MONITORED
- count: '10'
properties:
category: AUDIT_LOGGING_DISABLED
- count: '1'
properties:
category: AUTO_UPGRADE_DISABLED
- count: '10'
properties:
category: BUCKET_IAM_NOT_MONITORED
- count: '10'
properties:
category: BUCKET_LOGGING_DISABLED
nextPageToken: TOKEN
readTime: '2023-08-05T21:56:13.862Z'
totalSize: 50
Programmatically manage findings
Using the Google Cloud CLI with the Security Command Center SDK enables you to automate almost anything you can do with Security Command Center in the Google Cloud console. You can also remediate many findings using the gcloud CLI. For more information, review the documentation for the resource types described in each finding:
- Listing security findings
- Creating, modifying, and querying security marks
- Creating and updating security findings
- Creating, updating, and listing finding sources
- Configuring organization settings
To export or list assets programmatically, use the Cloud Asset Inventory API. For more information, see Export asset history and metadata.
The asset methods and fields of the Security Command Center API are deprecated and will be removed on or after June 26, 2024.
Until they are removed, users who activated Security Command Center before June 26, 2023 can use the asset methods of the Security Command Center API to list assets, but these methods support only the assets that Security Command Center supports.
For information about using the deprecated asset API methods, see listing assets.
Scanning projects protected by a service perimeter
This feature is only available if you activate Security Command Center Premium tier at the organization level.
If you have a service perimeter that blocks access to certain projects and services, you must grant the Security Command Center service account inbound access to that service perimeter. Otherwise, Security Health Analytics can't produce findings related to the protected projects and services.
The service account's identifier is an email address with the following format:
service-org-ORGANIZATION_ID@security-center-api.iam.gserviceaccount.com
Replace ORGANIZATION_ID
with the numerical
identifier of your organization.
To grant a service account inbound access to a service perimeter, follow these steps.
Go to VPC Service Controls.
On the toolbar, select your Google Cloud organization.
In the drop-down list, select the access policy that contains the service perimeter you want to grant access to.
The service perimeters associated with the access policy appear in the list.
Click the name of the service perimeter.
Click
Edit perimeterIn the navigation menu, click Ingress Policy.
Click Add rule.
Configure the rule as follows:
FROM attributes of the API client
- For Source, select All sources.
- For Identity, select Selected identities.
- In the Add User/Service Account field, click Select.
- Enter the service account email address. If you have both organization-level and project-level service accounts, add both of them.
- Click Save.
TO attributes of GCP services/resources
-
For Project, select All projects.
For Services, select All services or select each of the following individual services that Security Health Analytics requires:
- BigQuery API
- Binary Authorization API
- Cloud Logging API
- Cloud Monitoring API
- Compute Engine API
- Kubernetes Engine API
If a service perimeter restricts access to a required service, Security Health Analytics can't produce findings for that service.
In the navigation menu, click Save.
For more information, see Configuring ingress and egress policies.
What's next
- Learn about Security Health Analytics detectors and findings.
- Read recommendations for remediating Security Health Analytics findings.
- Learn how to use Security Command Center security marks.
- Learn about cases.
- Learn more about using Security Command Center in the Google Cloud console to review assets and findings.