Security Command Center
Built-in security and risk management solution for Google Cloud.
Improve security posture
Identify security misconfigurations and vulnerabilities in your Google Cloud environment and resolve them with actionable recommendations.
Uncover threats with specialized detectors built into the Google Cloud infrastructure to detect data exfiltration, compromised identities, cryptocurrency mining, and more.
Assess and manage risk
Use attack path simulation to discover and shut down possible pathways that adversaries can use to access and compromise cloud resources.
Cryptomining Protection Program Overview
This document explains the Security Command Center Cryptomining Protection Program and how to participate.
Mitigate threats and vulnerabilities
Complete this six-hour lab based course and learn how to strengthen your cloud defenses using Security Command Center—and earn a digital skill badge.
Security Command Center concepts
Quickly learn about key Security Command Center concepts.
Improve cloud security posture
Use this guide to secure your Google Cloud environment with Security Command Center.
Detect and stop cyber threats
Use this guide to learn how Security Command Center detects threats in your Google Cloud environment.
Security Command Center FAQs
Discover the answers to frequently ask questions for Security Command Center.
Security Command Center evaluation guide
Use this guide to set up and evaluate the core capabilities of Security Command Center Premium.
Getting started with Security Command Center
Watch our six-part video series to learn how to get started with Security Command Center.
|Security posture management||Platform-native ability to surface security misconfigurations and vulnerabilities in your Google Cloud resources. Helps ensure the appropriate policies are in place and get alerted when policies are misconfigured or unexpectedly change.|
|Built-in threat detection||Threat detection built into each layer of Google Cloud, covering identities, data, compute, and storage. Find incidents of identity compromise, data exfiltration, malicious script execution, cryptomining, and more.|
|Attack path simulation||Mimic behaviors of real-world attackers using graph models of your Google Cloud environment to find cloud resources exposed to attack. Use attack exposure scoring to prioritize security findings that should be addressed first.|
|Cryptomining Protection Program||Get up to $1M of financial protection for undetetected cryptomining attacks. See what built-in threat detection can do for your organization.|
|SIEM and SOAR integrations||Leverage the Security Command Center built-in integrations to easily integrate with your SIEM and SOAR platforms, including Chronicle. You can automatically send Security Command Center data to SIEM/SOAR platforms for further analysis and manage responses to security findings.|
|Real-time notifications and remediation||Receive notifications about new findings or updates to findings within minutes and take action. Quickly remediate security alerts by using Pub/Sub events and Cloud Functions. Receive Security Command Center alerts via Gmail, SMS, and Jira with Pub/Sub notification integration.|
|Asset query||Use SQL-like queries to get detailed information on where assets are located in your Google Cloud environment and how they are configured.|