>

Enabling Security Health Analytics

This guide describes how to enable Security Health Analytics to write security findings from Google Cloud native scanners to Security Command Center (Security Command Center). Findings from Security Health Analytics scanners are searchable in the Security Command Center dashboard and using the Security Command Center API. When Security Health Analytics is enabled, scans automatically run twice each day, 12 hours apart.

Before you begin

  • To enable Security Health Analytics, you must have the Security Center Admin Cloud Identity and Access Management (Cloud IAM) role.
  • To access the Security Command Center dashboard, you must have the Security Center Admin Viewer Cloud IAM role.
  • To make changes to Security Command Center, like adding marks, you must have an appropriate editor role, like Security Center Admin Editor.

Learn more about Security Command Center roles.

Enabling Security Health Analytics

To view Security Health Analytics findings in Security Command Center, you enable it as a security source. This step requires the Security Center Admin Cloud IAM role.

  1. Go to the Security Command Center Security Sources page in the Cloud Console.
    Go to the Security Sources page
  2. Under Enabled, click to enable Security Health Analytics.

After you enable Security Health Analytics, you can view vulnerabilities in Security Command Center. Security Health Analytics scans automatically run twice a day, 12 hours apart.

Special-case detector: Customer Supplied Encryption Keys

The DISK_CSEK_DISABLED scanner doesn't apply to all users. To use this scanner, you must mark the assets for which you want to use self-managed encryption keys.

To enable the DISK_CSEK_DISABLED scanner for specific assets, apply the security mark 'enforce_customer_supplied_disk_encryption_keys' to the asset with a value of 'true'.

What's next

Was this page helpful? Let us know how we did:

Send feedback about...

Cloud Security Command Center
Need help? Visit our support page.