Security Command Center の使用中、次の問題が発生したときに役立つトラブルシューティングの手順について説明します。
Security Command Center を有効にできない
組織のポリシーでドメイン別に ID を制限すると、Security Command Center を有効にできません。自分とサービス アカウントは、許可されたドメインの一部である必要があります。
Security Command Center の有効化を試みる前に、許可されたドメインのアカウントにログインしていることを確認してください。
@*.gserviceaccount.com サービス アカウントを使用している場合は、許可されたドメイン内のグループの ID としてサービス アカウントを追加します。
Security Command Center のアセットが更新されない
VPC Service Controls を使用している場合、Security Command Center のサービス アカウントにアクセス権を付与する際に、Security Command Center 内のアセットのみが検出され、更新されます。
アセットの検出を有効にするには、Security Command Center のサービス アカウントにアクセス権を付与します。これにより、サービス アカウントはアセットの検出を完了し、 Google Cloud コンソールにアセットを表示できます。サービス アカウント名の形式は service-org-organization-id@security-center-api.iam.gserviceaccount.com です。
検出結果とアセットの表示、編集、作成、更新
Security Command Center の IAM ロールは、組織レベル、フォルダレベル、またはプロジェクト レベルで付与できます。検出結果、アセット、セキュリティ ソースを表示、編集、作成、更新する権限は、アクセス権が付与されているレベルによって異なります。Security Command Center のロールの詳細については、アクセス制御をご覧ください。
通知がない、または遅延している
状況によっては、通知がない、破棄される、または遅延する可能性があります。
NotificationConfig のフィルタに一致する検出結果がない可能性があります。通知をテストするには、Security Command Center API を使用して検出結果を作成します。
Model Armor に対するすべての API 呼び出しが「404 Not Found」エラーを返す
Model Armor API と Private Service Connect を確立します。このエラーは通常、プライベート Google アクセスを使用している場合、または Private Service Connect を使用せずに Model Armor リージョン エンドポイント(REP)にアクセスしている場合に発生します。詳細については、Private Service Connect エンドポイントを介したリージョン エンドポイントへのアクセスについてをご覧ください。
Sensitive Data Protection フィルタでエラーが発生するか、スキップされる
次のことを確認してください。
Sensitive Data Protection テンプレートが、呼び出される Model Armor エンドポイントと同じリージョンにある。
[[["わかりやすい","easyToUnderstand","thumb-up"],["問題の解決に役立った","solvedMyProblem","thumb-up"],["その他","otherUp","thumb-up"]],[["わかりにくい","hardToUnderstand","thumb-down"],["情報またはサンプルコードが不正確","incorrectInformationOrSampleCode","thumb-down"],["必要な情報 / サンプルがない","missingTheInformationSamplesINeed","thumb-down"],["翻訳に関する問題","translationIssue","thumb-down"],["その他","otherDown","thumb-down"]],["最終更新日 2025-09-05 UTC。"],[],[],null,["| Standard, Premium, and Enterprise [service tiers](/security-command-center/docs/service-tiers)\n\nLearn about troubleshooting steps that might be helpful if you experience the\nfollowing problems while using Security Command Center.\n| **Note:** For more troubleshooting information, see [Error messages](/security-command-center/docs/error-messages). In addition, Security Command Center provides error detectors, which report configuration errors that prevent Security Command Center and its services from working properly. Each error finding includes suggested remediation steps. For more information, see [Security Command Center errors](/security-command-center/docs/concepts-scc-errors).\n\nEnabling Security Command Center fails\n\nEnabling Security Command Center most commonly fails if your organization policies\n[restrict identities by domain](/resource-manager/docs/organization-policy/restricting-domains). You and your\nservice account must be part of an allowed domain:\n\n- Make sure you sign in to an account that's in an allowed domain before you try to enable Security Command Center.\n- If you're using an `@*.gserviceaccount.com` service account, add the service account as an identity in a group within an allowed domain.\n\nAssets in Security Command Center aren't updating\n\nIf you're using VPC Service Controls, assets in Security Command Center can only be\ndiscovered and updated when you grant access to the Security Command Center service\naccount.\n\nTo enable asset discovery, [grant access](/security-command-center/docs/how-to-use-security-health-analytics#service-perimeter) to the Security Command Center service account. This allows the service account\nto complete asset discovery and display assets in the Google Cloud console.\nThe service account name is in the form of\n`service-org-`\u003cvar translate=\"no\"\u003eorganization-id\u003c/var\u003e`@security-center-api.iam.gserviceaccount.com`.\n\nViewing, editing, creating, and updating findings and assets\n\n\nThe IAM roles for Security Command Center can be granted at the organization,\nfolder, or project level. Your ability to view, edit, create, or update findings, assets,\nand security sources depends on the level for which you are granted access. To learn more about\nSecurity Command Center roles, see [Access control](/security-command-center/docs/access-control).\n\nMissing or delayed notifications\n\nIn some situations, notifications might be missing, dropped, or delayed:\n\n- There might not be any findings that match the filters in your `NotificationConfig`. To test notifications, use the Security Command Center API to [create a finding](/security-command-center/docs/how-to-api-create-manage-findings#creating_a_finding).\n- The Security Command Center service account must have the `securitycenter.notificationServiceAgent` role on the Pub/Sub topic. The service account name is in the form of `service-`\u003cvar translate=\"no\"\u003eorganization-id\u003c/var\u003e`@gcp-sa-scc-notification.iam.gserviceaccount.com`.\n - If you remove the role, notification publishing is disabled.\n - If you remove the role and then grant the role again, notifications are delayed.\n- If you delete and recreate the Pub/Sub topic, notifications will be dropped.\n\nWeb Security Scanner\n\nThis section contains troubleshooting steps that you might find helpful if you\nhave problems using Web Security Scanner\n\nScan errors for Compute Engine and GKE\n\nIf the URL for a scan is misconfigured, Web Security Scanner rejects it. Possible\nreasons for rejection include:\n\nURL has an IP address that is ephemeral\n\nMark this IP address as static:\n\n- For an application on a single VM, reserve the IP address on the VM\n- For an application behind a load balancer, reserve the IP address on the load balancer.\n\nURL is mapped to a wrong IP address\n\nTo fix this finding, refer to the instructions from your DNS registrar service.\n\nURL is mapped to an ephemeral IP address of the same VM\n\nMark this IP address as static.\n\nURL is mapped to a reserved IP address\n\nThis error happens when the URL is mapped to an IP address that's reserved in a\ndifferent project of the same organization. To resolve this, define security\nscans for the VM or HTTP load balancer in the project for which it is defined.\n\nURL is mapped to more than one IP address.\n\nMake sure that all IP addresses that are mapped to this URL are reserved for the\nsame project. If there is at least one IP address that isn't reserved for the\nsame project, the Scan Create or Edit or Update operation fails.\n\nModel Armor\n\nThis section contains troubleshooting steps that you might find helpful if you\nhave problems using Model Armor.\n\nAll API calls to Model Armor return a 404 Not Found error\n\nEstablish a Private Service Connect to the\nModel Armor APIs. This error typically occurs when Model Armor\nregional endpoints (REPs) are accessed using Private Google Access or without\na Private Service Connect. For more information, see\n[About accessing regional endpoints through Private Service Connect endpoints](/vpc/docs/about-accessing-regional-google-apis-endpoints).\n\nSensitive Data Protection filter gives an error or is skipped\n\nVerify the following:\n\n- The Sensitive Data Protection template is in the same region as the Model Armor endpoint being called.\n- The service agent making the Model Armor request has the `dlp.User` and `dlp.Reader` roles in the project containing the Sensitive Data Protection template.\n\nThis error occurs due to client errors in the `SanitizeUserPrompt` or `SanitizeModelResponse`\nrequests or issues with the Sensitive Data Protection template.\n\nModel Armor global endpoint errors\n\nEnsure that you are making the API requests to the appropriate\nregional endpoint instead of the global endpoint.\n\nModel Armor supports the following operations only\non its regional endpoints:\n\n- Create, read, update, delete, and list operations on templates.\n- `SanitizeUserPrompt` and `SanitizeModelResponse` API requests.\n\nIf you make the API requests for those operations to the global endpoint, you\nwill see the following error. \n\n {\n \"error\": {\n \"code\": 403,\n \"message\": \"Write access to project '\u003cPROJECT_ID\u003e' was denied\",\n \"status\": \"PERMISSION_DENIED\"\n }\n }\n\nWhat's next\n\nLearn about [Security Command Center errors](/security-command-center/docs/concepts-scc-errors)."]]