Detection services Stay organized with collections Save and categorize content based on your preferences.
This page contains a list of the detection services, sometimes alsoreferred to assecurity sources, that Security Command Center uses to detectsecurity issues in your cloud environments.
When these services detect an issue, they generate afinding, which isa record that identifies the security issue and provides you with theinformation you need to prioritize and resolve the issue.
You can view findings in the Google Cloud console and filter themin many different ways, such as by finding type, resource type, or fora specific asset. Each security source might provide more filters tohelp you organize your findings.
The IAM roles for Security Command Center can be granted at the organization,folder, or project level. Your ability to view, edit, create, or update findings, assets,and security sources depends on the level for which you are granted access. To learn more aboutSecurity Command Center roles, seeAccess control.
Vulnerability detection services
Vulnerability detection services include built-in and integrated servicesthat detect software vulnerabilities, misconfigurations, andposture violations in your cloud environments. Collectively, these typesof security issues are referred to asvulnerabilities.
Artifact Registry vulnerability assessment
Standard, Premium, and Enterpriseservice tiersArtifact Registry vulnerability assessment is a detection service that alertsyou to vulnerabilities in your deployed container images.
This detection service generates vulnerability findings for containerimages under the following conditions:
- The container image is stored inArtifact Registry.
The container image is deployed to one of the following assets:
- Google Kubernetes Engine cluster
- Cloud Run service
- Cloud Run job
- App Engine
Artifact Registry vulnerability assessment surfaces findings for vulnerabilities that areclassified aHIGH orCRITICAL severity. Artifact Registry vulnerability assessment won'tgenerate findings for vulnerabilities that have a lower severity.
If you enable Artifact Registry vulnerability assessment with Security Command Center,Artifact Registry vulnerability assessment automatically writes high and criticalfindings to Security Command Center. If your container images have vulnerabilitiescategorized as medium or low, you can manage them in theArtifact Registry vulnerability assessment, but Security Command Center doesn't display them.
After Artifact Registry vulnerability assessment findings are generated, they remain availablefor you to query up to five weeks after the last container image scan performed.For more information about Security Command Center data retention, seeDataretention.
Enable Artifact Registry vulnerability assessment findings
For Artifact Registry vulnerability assessment to generate findings inSecurity Command Center for deployed container images stored in Artifact Registry,theContainer Scanning APImust be enabled for your project.
If you haven't enabled the Container Scanning API, do the following:
In the Google Cloud console, go to theContainer Scanning API page.
Select the project you want to enable the Container Scanning API for.
ClickEnable.
Security Command Center will display findings for scanned vulnerable containerimages that are actively deployed to theapplicable runtimeassets. However, the detection service behaves differentlydepending on when you enabled Security Command Center and when you enabled theContainer Scanning API.
| Enablement scenario | Detection service behavior |
|---|---|
You enabled Security Command Centerafter you enabled the Container Scanning API and deployed a container image. | Artifact Registry vulnerability assessment will generate findings for existing vulnerabilities found with previous Artifact Registry scans within 24 hours of enablement. |
You enabled Security Command Center and deployed a container imagebefore you enabled the Container Scanning API. | Artifact Registry vulnerability assessment won't automatically generate vulnerability findings for container images you deployed before enabling the API until a new scan is triggered. To manually trigger a new scan, redeploy the container image to the same runtime resource. Artifact Registry vulnerability assessment will immediately generate findings if any vulnerabilities are detected during the scan. |
You enabled Security Command Centerand the Container Scanning API before you deployed a container image. | The newly deployed container image is immediately scanned in Artifact Registry and Artifact Registry vulnerability assessment generates findings if any vulnerabilities are detected by the scan. |
Disable Artifact Registry vulnerability assessment findings
To disable Artifact Registry vulnerability assessment findings, do the following:
In the Google Cloud console, go to theAPI/Service Details page for theContainer Scanning API.
Select the project you want to disable the Container Scanning API for.
ClickDisable API.
Security Command Center won't display findings for vulnerabilities detected in futurecontainer image scans. Security Command Center retains any existingArtifact Registry vulnerability assessment findings for at least 35 days after the lastcontainer image scan performed. For more information about Security Command Centerdata retention, seeData retention.
You can also disable Artifact Registry vulnerability assessment by disabling the VulnerabilityAssessment source ID in the Security Command Center settings; however, we don'trecommend this. Disabling the Vulnerability Assessment source ID will disableall the detection services classified under the Vulnerability Assessment sourceID. Therefore, we recommend disabling the Container Scanning API with thepreceding procedure.
Artifact Registry vulnerability assessment detectors
| Detector | Summary |
|---|---|
Category name in the API: | Finding description: A vulnerability was detected in a container image that was scanned in Artifact Registry. This image is deployed to one of the following assets:
Pricing tier:Standard, Premium, or Enterprise Fix this finding: Depending on the resource type, do the following:
Refer to the details of the finding for specific remediation steps based on the appropriate runtime resource. For Standard tier customers, using theAsset query feature of Cloud Asset Inventory to determine where the vulnerable container image is deployed is not supported. We recommend upgrading to the Premium or Enterprise tiers to get more detailed information. |
View Artifact Registry vulnerability assessment findings in the console
In the Google Cloud console, go to theFindings page of Security Command Center.
- Select your Google Cloud project or organization.
- In theQuick filters section, in theSource display name subsection, selectVulnerability Assessment. The findings query results are updated to show only the findings from this source.
- To view the details of a specific finding, click the finding name in theCategory column. The details panel for the finding opens and displays theSummary tab.
- On theSummary tab, review the details of the finding, including information about what was detected, the affected resource, and—if available—steps that you can take to remediate the finding.
- Optional: To view the full JSON definition of the finding, click theJSON tab.
Compliance Manager findings
Premium and Enterpriseservice tiers (requiresorganization-level activation)Compliance Manager creates findings for the detective and preventive cloud controls that you deploy in your Google Cloud environment. You can view these findingson theFindings page in Security Command Center.
View Compliance Manager findings in the console
In the Google Cloud console, go to theFindings page of Security Command Center.
- Select your Google Cloud project or organization.
- In theQuick filters section, in theSource display name subsection, selectCompliance Evaluation Service. The findings query results are updated to show only the findings from this source.
- To view the details of a specific finding, click the finding name in theCategory column. The details panel for the finding opens and displays theSummary tab.
- On theSummary tab, review the details of the finding, including information about what was detected, the affected resource, and—if available—steps that you can take to remediate the finding.
- Optional: To view the full JSON definition of the finding, click theJSON tab.
Data Security Posture Management
Premium and Enterpriseservice tiers (requiresorganization-level activation)Data Security Posture Management (DSPM)creates findings for potential violations to the data security frameworks andcloud controls that you apply in your environment. You can view these findingson theData Security & Compliance page, theRisk Overview page (undertheData tab), or in theFindings page inSecurity Command Center.
View DSPM findings in the console
In the Google Cloud console, go to theFindings page of Security Command Center.
Select your Google Cloud organization.
Use the following query to view the findings for DSPM:
state="ACTIVE" AND NOT mute="MUTED" AND resource.name="//aiplatform.googleapis.com/projects/478190632149/locations/us-central1/models/1244151282898305024" AND category="DATA_SECURITY_POSTURE_ACCESS_VIOLATION" OR category="DATA_SECURITY_POSTURE_FLOW_VIOLATION" OR category="DATA_SECURITY_POSTURE_DELETION_VIOLATION" OR category="DATA_SECURITY_POSTURE_PROTECTION_KEY_GOVERNANCE" OR category="BIGQUERY_TABLE_CMEK_DISABLED" OR category="VERTEX_AI_MODEL_CMEK_DISABLED" OR category="VERTEX_AI_METADATA_STORE_CMEK_DISABLED" OR category="VERTEX_AI_DATASET_CMEK_DISABLED" OR category="VERTEX_AI_FEATURE_STORE_TABLE_CMEK_DISABLED" OR category="DATA_SECURITY_POSTURE_CMEK_POLICY_MISCONFIGURED" OR category="DATA_SECURITY_POSTURE_CMEK_POLICY_DELETED" OR category="DATA_SECURITY_POSTURE_CMEK_VIOLATION" OR category="SENSITIVE_DATA_PUBLIC_SQL_INSTANCE" OR category="SENSITIVE_DATA_PUBLIC_DATASET" OR category="SENSITIVE_DATA_BIGQUERY_TABLE_CMEK_DISABLED" OR category="SENSITIVE_DATA_DATASET_CMEK_DISABLED" OR category="SENSITIVE_DATA_SQL_CMEK_DISABLED" OR category="PUBLIC_DATASET" OR category="PUBLIC_SQL_INSTANCE" OR category="SQL_PUBLIC_IP" OR category="ACCESS_TRANSPARENCY_DISABLED" OR category="ORG_POLICY_LOCATION_RESTRICTION" OR category="BUCKET_POLICY_ONLY_DISABLED" OR category="DATA_EXFILTRATION_BIG_QUERY" OR category="DATA_EXFILTRATION_BIG_QUERY_EXTRACTION" OR category="DATA_EXFILTRATION_BIG_QUERY_TO_GOOGLE_DRIVE"To view the details of a specific finding, click the finding name in theCategory column. The details panel for the finding opens and displays theSummary tab.
On theSummary tab, review the details of the finding, includinginformation about what was detected, the affected resource, and—ifavailable—steps that you can take to remediate the finding.
Optional: To view the full JSON definition of the finding, click theJSONtab.
GKE security posture dashboard
Preview
This feature is subject to the "Pre-GA Offerings Terms" in the General Service Terms section of theService Specific Terms. Pre-GA features are available "as is" and might have limited support. For more information, see thelaunch stage descriptions.
Standard, Premium, and Enterpriseservice tiersThe Google Kubernetes Engine (GKE) security posture dashboard is a page in theGoogle Cloud console that provides you with opinionated, actionable findingsabout potential security issues in your GKE clusters.
To see these findings, enable any of the following GKEsecurity posture dashboard features:
| GKE security posture dashboard pane | Security Command Center finding class |
|---|---|
| Workload configuration auditing1 | MISCONFIGURATION |
| Top threats2 | THREAT |
| VULNERABILITY |
- Available only if you enable this feature in GKE.
- Available for Security Command Center Premium and Enterpriseservice tiers.
The findings display information about the security issue and providerecommendations to resolve them in your workloads or clusters.
Important: Security bulletin findings that are published in Security Command Centerdon't include acve field that lists the associated CVEs. To view the CVEs, check the finding'sdescription field, or review the security bulletin in the security posture dashboard.View GKE security posture dashboard findings in the console
In the Google Cloud console, go to theFindings page of Security Command Center.
- Select your Google Cloud project or organization.
- In theQuick filters section, in theSource display name subsection, selectGKE Security Posture. The findings query results are updated to show only the findings from this source.
- To view the details of a specific finding, click the finding name in theCategory column. The details panel for the finding opens and displays theSummary tab.
- On theSummary tab, review the details of the finding, including information about what was detected, the affected resource, and—if available—steps that you can take to remediate the finding.
- Optional: To view the full JSON definition of the finding, click theJSON tab.
IAM recommender
Standard, Premium, and Enterpriseservice tiersIAM recommendergenerates recommendations that you can follow to improve security by removingor replacing IAM roles from principals when the roles containIAM permissions that the principal does not need.
IAM recommender is automatically enabled when you activateSecurity Command Center.
Enable or disable IAM recommender findings
To enable or disable IAM recommender findings in Security Command Center,follow these steps:
Go to theIntegrated services tab of the Security Command CenterSettings page in the Google Cloud console:
Go to theIAM recommender entry.
To the right of the entry, selectEnable orDisable.
Findings from IAM recommender are classified as vulnerabilities.
To remediate an IAM recommender finding, expand the following section tosee a table of the IAM recommender findings. The remediation steps foreach finding are included in the table entry.
IAM recommender detectors
| Detector | Summary |
|---|---|
| Finding description: IAM recommender detected a service account that has one or more IAM roles that give excessive permissions to the user account. Pricing tier:Premium Supported assets:
Fix this finding: Use IAM recommender to apply the recommended fix for this finding by following these steps:
After the issue is fixed, IAM recommender updates the status of the finding to |
| Finding description: IAM recommender detected that the original default IAM role granted to a service agent was replaced with one of the basic IAM roles:Owner,Editor, orViewer. Basic roles are excessively permissive legacy roles and should not be granted to service agents. Pricing tier:Premium Supported assets:
Fix this finding: Use IAM recommender to apply the recommended fix for this finding by following these steps:
After the issue is fixed, IAM recommender updates the status of the finding to |
| Finding description: IAM recommender detected IAM that a service agent was granted one of the basic IAM roles:Owner,Editor, orViewer. Basic roles are excessively permissive legacy roles and should not be granted to service agents. Pricing tier:Premium Supported assets:
Fix this finding: Use IAM recommender to apply the recommended fix for this finding by following these steps:
After the issue is fixed, IAM recommender updates the status of the finding to |
| Finding description: IAM recommender detected a user account that has an IAM role that has not been used in the last 90 days. Pricing tier:Premium Supported assets:
Fix this finding: Use IAM recommender to apply the recommended fix for this finding by following these steps:
After the issue is fixed, IAM recommender updates the status of the finding to |
View IAM recommender findings in the console
In the Google Cloud console, go to theFindings page of Security Command Center.
- Select your Google Cloud project or organization.
- In theQuick filters section, in theSource display name subsection, selectIAM Recommender. The findings query results are updated to show only the findings from this source.
- To view the details of a specific finding, click the finding name in theCategory column. The details panel for the finding opens and displays theSummary tab.
- On theSummary tab, review the details of the finding, including information about what was detected, the affected resource, and—if available—steps that you can take to remediate the finding.
- Optional: To view the full JSON definition of the finding, click theJSON tab.
In Security Command Center Premium, you can also view the IAM recommenderfindings on the legacyVulnerabilities page by selectingtheIAM recommender query preset.
Mandiant Attack Surface Management
Enterpriseservice tier (not available ifdata residency controls are enabled)Mandiant is a world leader in frontline threat intelligence.Mandiant Attack Surface Management identifies vulnerabilities and misconfigurationsin your external attack surfaces to help you stay up-to-date against thelatest cyber attacks.
Mandiant Attack Surface Management is automatically enabled when you activate theSecurity Command Center Enterprise tier and findings are available in the Google Cloud console.
For information about how the standalone Mandiant Attack Surface Management product differsfrom the Mandiant Attack Surface Management integration within Security Command Center, seeASM and Security Command Centeron the Mandiant documentation portal. This link requires Mandiantauthentication.
Review Mandiant Attack Surface Management findings in the console
In the Google Cloud console, go to theFindings page of Security Command Center.
- Select your Google Cloud project or organization.
- In theQuick filters section, in theSource display name subsection, selectMandiant Attack Surface Management. The findings query results are updated to show only the findings from this source.
- To view the details of a specific finding, click the finding name in theCategory column. The details panel for the finding opens and displays theSummary tab.
- On theSummary tab, review the details of the finding, including information about what was detected, the affected resource, and—if available—steps that you can take to remediate the finding.
- Optional: To view the full JSON definition of the finding, click theJSON tab.
Neither Security Command Center nor Mandiant Attack Surface Management mark findings as resolved. Onceyou resolve an issue, you can manually mark the issue resolved. If it is notidentified in the next Mandiant Attack Surface Management scan, it stays resolved.
Model Armor
Standard, Premium, and Enterpriseservice tiersModel Armor is a fully managed Google Cloud service that enhances thesecurity and safety of AI applications by screening LLM prompts and responses.
Vulnerability findings from the Model Armor service
| Finding | Summary |
|---|---|
| Finding description: A floor setting violation that occurs when a Model Armor template fails to meet the minimum security standards defined by the resource hierarchy floor settings. Pricing tier:Premium This finding requires that you update the Model Armor template to be in conformance with the floor settings defined at the resource hierarchy. |
Notebook Security Scanner
Preview
This feature is subject to the "Pre-GA Offerings Terms" in the General Service Terms section of theService Specific Terms. Pre-GA features are available "as is" and might have limited support. For more information, see thelaunch stage descriptions.
Premium and Enterpriseservice tiersNotebook Security Scanner is a built-in package vulnerability detection serviceofSecurity Command Center. After Notebook Security Scanner is enabled, it automaticallyscans Colab Enterprise notebooks (files with theipynb filename extension)every 24 hours to detect vulnerabilities in Python packages and publishesthese findings to the Security Command CenterFindings page.
You can use Notebook Security Scanner for Colab Enterprise notebooksthat are created in the following regions:us-central1,us-east4,us-west1,andeurope-west4.
To get started with Notebook Security Scanner, seeEnable and use Notebook Security Scanner.
Policy Controller
Standard, Premium, and Enterpriseservice tiers (requiresorganization-level activation)Policy Controllerenables the application and enforcement of programmable policiesfor your Kubernetes clusters. These policies act asguardrails and can helpwith best practices, security, and compliance management of your clusters andfleet.
If youinstall Policy Controller,and enable any of thePolicy Controller bundles, Policy Controller automatically writescluster violations to Security Command Center asMisconfiguration classfindings. The finding description and next steps in the Security Command Centerfindings are the same as the constraint description and remediation stepsof the corresponding Policy Controller bundle.
The Policy Controller findings come from the following Policy Controller bundles:
- CIS Kubernetes Benchmark v.1.5.1,a set of recommendations for configuring Kubernetes to support a strong securityposture. You can also view information about this bundle in theGitHub repository for
cis-k8s-v1.5.1. - PCI-DSS v3.2.1,a bundle which evaluates the compliance of your cluster resources againstsome aspects of the Payment Card Industry Data Security Standard (PCI-DSS) v3.2.1.You can also view information about this bundle in theGitHub repository for
pci-dss-v3.
To find and remediate Policy Controller findings, seeRemediating Policy Controller findings.
Risk Engine
Premium and Enterpriseservice tiersThe Security Command Center Risk Engine assesses the risk exposure of yourcloud deployments, assigns attack exposure scores to vulnerability findingsand your high-value resources, and diagrams paths that a potentialattacker could take to reach your high-value resources.
In the Enterprise or Premium tier of Security Command Center, the Risk Enginedetects groups of security issues that, when they occur together in aparticular pattern, create a path to one or more of your high-valueresources that a determined attacker couldpotentially use to reach and compromise those resources.
When Risk Engine detects one of these combinations, it generatesaTOXIC_COMBINATION class finding. In the finding, Risk Engineis listed as the source of the finding.
Risk Engine also identifies common resources or resource groupswhere multiple attack paths converge, and then generates aCHOKEPOINT classfinding.
For more information, seeToxic combinations and chokepoints overview.
Security Health Analytics
Standard, Premium, and Enterpriseservice tiersSecurity Health Analytics is a built-in detection service of Security Command Centerthat provides managed scans of your cloud resources to detectcommon misconfigurations.
When a misconfiguration is detected, Security Health Analytics generates a finding.Most Security Health Analytics findings are mapped to security standard controls sothat you can assess compliance.
Security Health Analytics scans your resources on Google Cloud. If you areusing the Enterprise tier and establish connections to other cloud platforms,Security Health Analytics can also scan your resources on those cloud platforms.
Depending on the Security Command Centerservice tier you are using, the availabledetectors differ:
- In the Standard tier, Security Health Analytics includes only abasic group of medium-severity and high-severity vulnerability detectors.
- ThePremium tier includes all vulnerability detectors for Google Cloud.
- TheEnterprise tier includes additional detectors for other cloud platforms.
Security Health Analytics is automatically enabled when you activateSecurity Command Center.
For more information, see the following:
- Security Health Analytics overview
- How to use Security Health Analytics
- Remediating Security Health Analytics findings
- Reference of Security Health Analytics findings
Security posture service
Premium and Enterpriseservice tiers (requiresorganization-level activation)Thesecurity posture serviceis a built-in service for the Security Command Center Premium tier that lets you define,assess, and monitor the overall status of your security in Google Cloud.It provides information about how your environment aligns with the policies thatyou define in your security posture.
The security posture service isn't related to theGKEsecurity posture dashboard, which only shows findings in GKEclusters.
Security posture service findings
| Finding | Summary |
|---|---|
| Finding description: The security posture service detected a change to a Security Health Analytics detector that occurred outside of a posture update. Pricing tier:Premium Fix this finding: This finding requires that you accept the change or revert the change so that the detector settings in your posture and your environment match. You have two options to resolve this finding: you can update the Security Health Analytics detector or you can update the posture and posture deployment. To revert the change, update the Security Health Analytics detector in the Google Cloud console. For instructions, see Enable and disable detectors. To accept the change, complete the following:
|
| Finding description: The security posture service detected a change to a Security Health Analytics custom module that occurred outside of a posture update. Pricing tier:Premium Fix this finding: This finding requires that you accept the change or revert the change so that the custom module settings in your posture and your environment match. You have two options to resolve this finding: you can update the Security Health Analytics custom module or you can update the posture and posture deployment. To revert the change, update the Security Health Analytics custom module in the Google Cloud console. For instructions, see Update a custom module. To accept the change, complete the following:
|
| Finding description: The security posture service detected that a Security Health Analytics custom module was deleted. This deletion occurred outside of a posture update. Pricing tier:Premium Fix this finding: This finding requires that you accept the change or revert the change so that the custom module settings in your posture and your environment match. You have two options to resolve this finding: you can update the Security Health Analytics custom module or you can update the posture and posture deployment. To revert the change, update the Security Health Analytics custom module in the Google Cloud console. For instructions, see Update a custom module. To accept the change, complete the following:
|
| Finding description: The security posture service detected a change to an organization policy that occurred outside of a posture update. Pricing tier:Premium Fix this finding: This finding requires that you accept the change or revert the change so that the organization policy definitions in your posture and your environment match. You have two options to resolve this finding: you can update the organization policy or you can update the posture and posture deployment. To revert the change, update the organization policy in the Google Cloud console. For instructions, see Creating and editing policies. To accept the change, complete the following:
|
| Finding description: The security posture service detected that an organization policy was deleted. This deletion occurred outside of a posture update. Pricing tier:Premium Fix this finding: This finding requires that you accept the change or revert the change so that the organization policy definitions in your posture and your environment match. You have two options to resolve this finding: you can update the organization policy or you can update the posture and posture deployment. To revert the change, update the organization policy in the Google Cloud console. For instructions, see Creating and editing policies. To accept the change, complete the following:
|
| Finding description: The security posture service detected a change to a custom organization policy that occurred outside of a posture update. Pricing tier:Premium Fix this finding: This finding requires that you accept the change or revert the change so that the custom organization policy definitions in your posture and your environment match. You have two options to resolve this finding: you can update the custom organization policy or you can update the posture and posture deployment. To revert the change, update the custom organization policy in the Google Cloud console. For instructions, see Update a custom constraint. To accept the change, complete the following:
|
| Finding description: The security posture service detected that a custom organization policy was deleted. This deletion occurred outside of a posture update. Pricing tier:Premium Fix this finding: This finding requires that you accept the change or revert the change so that the custom organization policy definitions in your posture and your environment match. You have two options to resolve this finding: you can update the custom organization policy or you can update the posture and posture deployment. To revert the change, update the custom organization policy in the Google Cloud console. For instructions, see Update a custom constraint. To accept the change, complete the following:
|
Sensitive Data Protection
Standard, Premium, and Enterpriseservice tiersSensitive Data Protection is a fully managed Google Cloud servicethat helps you discover, classify, and protect your sensitive data. You can useSensitive Data Protection to determine whether you're storing sensitiveor personally identifiable information (PII), like the following:
- Person names
- Credit card numbers
- National or state ID numbers
- Health insurance ID numbers
- Secrets
In Sensitive Data Protection, each type of sensitive data that yousearch for is called aninfoType.
If you configure your Sensitive Data Protection operation to sendresults to Security Command Center, you can see the findings directly in theSecurity Command Center section of the Google Cloud console, in addition to theSensitive Data Protection section.
Vulnerability findings from the Sensitive Data Protection discovery service
The Sensitive Data Protection discovery service helps you determine whether you are storing highly sensitive data that is not protected.
| Category | Summary |
|---|---|
| Finding description: The specified resource has high-sensitivity data that can be accessed by anyone on the internet. Supported assets:
Remediation: For Google Cloud data, remove For Amazon S3 data, configure block public access settings or update the object's ACL to deny public read access. For more information, see Configuring block public access settings for your S3 buckets andConfiguring ACLs in the AWS documentation. For Azure Blob Storage data, remove public access to the container and the blobs. For more information, seeOverview: Remediating anonymous read access for blob data in the Azure documentation. Compliance standards: Not mapped |
| Finding description: There are secrets—such as passwords, authentication tokens, and Google Cloud credentials—in environment variables. To enable this detector, see Report secrets in environment variables to Security Command Center in the Sensitive Data Protection documentation. Supported assets: Remediation: For Cloud Run functions environment variables, remove the secret from the environment variable andstore it in Secret Manager instead. For Cloud Run service revision environment variables, move all traffic off of the revision, and then delete the revision. Compliance standards:
|
| Finding description: There are secrets—such as passwords, authentication tokens, and cloud credentials—in the specified resource. Supported assets:
Remediation:
Compliance standards: Not mapped |
Misconfiguration findings from the Sensitive Data Protection discovery service
The Sensitive Data Protection discovery service helps you determine whether you havemisconfigurations that might expose sensitive data.
| Category | Summary |
|---|---|
| Finding description: The specified resource has high-sensitivity or moderate-sensitivity data and the resource isn't using a customer-managed encryption key (CMEK). Supported assets:
Remediation:
Compliance standards: Not mapped |
Observation findings from Sensitive Data Protection
This section describes the observation findings that Sensitive Data Protection generates in Security Command Center.
Observation findings from the discovery service
The Sensitive Data Protection discovery service helps you determinewhether your data contains specific infoTypes and where they reside in yourorganization, folders, and projects. It generatesthe following observation finding categories in Security Command Center:
Data sensitivity- An indication of the sensitivity level of the data in a particular data asset.Data is sensitive if it contains PII or other elements that might requireadditional control or management. The severity of the finding is thesensitivity level that Sensitive Data Protectioncalculated whengenerating the data profile.
Data risk- The risk associated with the data in its current state. When calculating datarisk, Sensitive Data Protection considers the sensitivity level ofthe data in the data asset and the presence of access controls to protect thatdata. The severity of the finding is thedata risk level thatSensitive Data Protectioncalculated when generatingthe data profile.
Depending on the size of your organization, Sensitive Data Protectionfindings can start appearing in Security Command Center within a few minutes afteryou enable sensitive data discovery. For larger organizations ororganizations with specific configurations that affect finding generation, itcan take up to 12 hours before initial findings appear in Security Command Center.
Subsequently, Sensitive Data Protection generates findings inSecurity Command Center within a few minutes after the discovery service scans yourresources.
For information about how to send data profile results to Security Command Center,seeEnable sensitive datadiscovery.
Observation findings from the Sensitive Data Protection inspection service
A Sensitive Data Protection inspection job identifies each instance ofdata of a specific infoType in a storage system like a Cloud Storage bucketor a BigQuery table. For example, you can run an inspection jobthat searches for all strings that match theCREDIT_CARD_NUMBER infoTypedetector in a Cloud Storage bucket.
For each infoType detector that has one or more matches, Sensitive Data Protectiongenerates a corresponding Security Command Center finding. The finding category isthe name of the infoType detector that had a match—for example,Creditcard number. The finding includes the number of matching strings that weredetected in text or images in the resource.
For security reasons, the actual strings that were detected aren't included inthe finding. For example, aCredit card number finding shows how manycredit card numbers were found, but doesn't show the actual credit card numbers.
Because there are more than 150 built-in infoType detectors inSensitive Data Protection, all possible Security Command Center findingcategories aren't listed here. For a full list of infoType detectors, seeInfoType detector reference.
For information on how to send the results of an inspection job toSecurity Command Center, seeSend Sensitive Data Protection inspection job results toSecurity Command Center.
Review Sensitive Data Protection findings in the console
In the Google Cloud console, go to theFindings page of Security Command Center.
- Select your Google Cloud project or organization.
- In theQuick filters section, in theSource display name subsection, selectSensitive Data Protection. The findings query results are updated to show only the findings from this source.
- To view the details of a specific finding, click the finding name in theCategory column. The details panel for the finding opens and displays theSummary tab.
- On theSummary tab, review the details of the finding, including information about what was detected, the affected resource, and—if available—steps that you can take to remediate the finding.
- Optional: To view the full JSON definition of the finding, click theJSON tab.
VM Manager
Preview
This feature is subject to the "Pre-GA Offerings Terms" in the General Service Terms section of theService Specific Terms. Pre-GA features are available "as is" and might have limited support. For more information, see thelaunch stage descriptions.
Premium and Enterpriseservice tiers (requiresorganization-level activation)VM Manager is a suite of tools thatcan be used to manage operating systems for large virtual machine (VM) fleetsrunning Windows and Linux on Compute Engine.
To use VM Manager withproject-level activationsof Security Command Center Premium, activate Security Command Center Standardin the parent organization.
If youenable VM Manager withthe Security Command Center Premium tier, VM Managerautomatically writeshigh andcritical findings from itsvulnerability reports, whichare in preview, to Security Command Center. The reports identify vulnerabilities inoperating systems (OS) that are installed on VMs, includingCommon Vulnerabilities and Exposures (CVEs).
Vulnerability reports are not available for Security Command Center Standard.
Findings simplify the process of using VM Manager's PatchCompliance feature, which is in preview. The feature lets you conductpatchmanagement at the organization level acrossall of your projects. VM Manager supports patch management at thesingle project level.
To remediate VM Manager findings, seeRemediating VM Manager findings.
To stop vulnerability reports from being written to Security Command Center, seeMute VM Manager findings.
Vulnerabilities of this type all relate to installed operating system packages in supported Compute Engine VMs.
| Detector | Summary | Asset scan settings |
|---|---|---|
| Finding description: VM Manager detected a vulnerability in the installed operating system (OS) package for a Compute Engine VM. Pricing tier:Premium Supported assets | VM Manager's vulnerability reports detail vulnerabilities in installed operating system packages for Compute Engine VMs, including Common Vulnerabilities and Exposures (CVEs). For a complete list of supported operating systems, seeOperating system details. Findings appear in Security Command Center shortly after vulnerabilities are detected. Vulnerability reports in VM Manager are generated as follows:
|
Vulnerability Assessment for AWS
Enterpriseservice tierThe Vulnerability Assessment for Amazon Web Services (AWS) service detects software vulnerabilitiesin your workloads that are running on EC2 virtual machines (VMs) on theAWS cloud platform.
For each detected vulnerability, Vulnerability Assessment for AWS generates aVulnerability class finding in theSoftware vulnerability findingcategory in Security Command Center.
The Vulnerability Assessment for AWS service scans snapshots of the running EC2 machineinstances, so production workloads are unaffected. This scan method iscalledagentless disk scanning, because no agents are installed thescan targets.
For more information, see the following:
Vulnerability Assessment for Google Cloud
Preview
This feature is subject to the "Pre-GA Offerings Terms" in the General Service Terms section of theService Specific Terms. Pre-GA features are available "as is" and might have limited support. For more information, see thelaunch stage descriptions.
Premium and Enterpriseservice tiersThe Vulnerability Assessment for Google Cloud service detects software vulnerabilities in the followingresources on the Google Cloud platform:
- Running Compute Engine VM instances
- Nodes inGKE Standard clusters
- Containers running in GKE Standard andGKE Autopilot clusters
For each detected vulnerability, Vulnerability Assessment for Google Cloud generates aVulnerabilityclass finding in theSoftware vulnerability orOS vulnerability findingcategory in Security Command Center.
The Vulnerability Assessment for Google Cloud service scans your Compute Engine VM instances bycloning their disks approximately every 12 hours, mounting them in a secure VMinstance, and assessing them with theSCALIBR scanner.
For more information, seeVulnerability Assessment for Google Cloud.
Web Security Scanner
Standard, Premium, and Enterpriseservice tiersWeb Security Scannerprovides managed and custom web vulnerability scanning for publicApp Engine, GKE, and Compute Engine serviced webapplications.
Managed scans
Premium and Enterpriseservice tiersWeb Security Scanner managed scans are configured and managed bySecurity Command Center. Managed scans automatically run once each week to detect andscan public web endpoints. These scans don't use authentication and they sendGET-only requests so they don't submit any forms on live websites.
Managed scans run separately from custom scans.
If Security Command Center is activated at theorganization level,you can use managed scans to centrally manage basic web applicationvulnerability detection for projects in your organization, without having toinvolve individual project teams. When findings are discovered, you can workwith those teams to set up more comprehensive custom scans.
When you enable Web Security Scanner as a service, managed scan findings areautomatically available in the Security Command CenterVulnerabilities page andrelated reports. For information about how to enable Web Security Scannermanaged scans, seeConfigure Security Command Center services.
Managed scans support only applications that use the default port, which is 80for HTTP connections and 443 for HTTPS connections. If your application usesa non-default port, do a custom scan instead.
Custom scans
Standard, Premium, and Enterpriseservice tiersWeb Security Scanner custom scans provide granular information aboutapplication vulnerability findings, like outdated libraries, cross-sitescripting, or use of mixed content.
You define custom scans at the project level.
Custom scan findings are available inSecurity Command Center after you complete the guide toset up Web Security Scanner custom scans.
Detectors and compliance
Web Security Scanner supports categories in theOWASP Top Ten,a document that ranks and provides remediation guidance for the top 10 mostcritical web application security risks, as determined by the Open WebApplication Security Project (OWASP). For guidance on mitigating OWASP risks,seeOWASP Top 10 mitigation options on Google Cloud.
Note:The categoryA09:2021 Security Logging and Monitoring Failures(previouslyA10:2017 Insufficient Logging & Monitoring) is not supported.This category describes insufficiencies that allow attackers to remain undetected. Unlikethe other nine OWASP categories, it doesn't pertain to specific vulnerabilitiesthat attackers can exploit. Similarly, Web Security Scanner can't attack webapplications to provoke a detectable response. The issues included in thiscategory require human judgment.
The compliance mapping is included for reference and is not provided or reviewedby the OWASP Foundation.
This functionality is only intended for you to monitor for compliance controlsviolations. The mappings are not provided for use as the basis of, or as asubstitute for, the audit, certification, or report of compliance of yourproducts or services with any regulatory or industry benchmarks or standards.
For more information, seeWeb Security Scanner Overview.
Threat detection services
Threat detection services include built-in and integrated servicesthat detect events that might indicate potentially harmful events,such as compromised resources or cyberattacks.
Anomaly Detection
Standard, Premium, and Enterpriseservice tiers (requiresorganization-level activation)Anomaly Detection is a built-in service that uses behavior signals fromoutside your system. It displays granular information about securityanomalies detected for your service accounts, suchas potential leaked credentials. Anomaly Detection isautomatically enabled when you activate Security Command Center Standard orPremium tier, and findings are available in the Google Cloud console.
Anomaly Detection findings include the following:
| Anomaly name | Finding category | Description |
|---|---|---|
| account_has_leaked_credentials | Credentials for a Google Cloud service account are accidentally leaked online or are compromised. Severity: Critical |
Account has leaked credentials
GitHub notified Security Command Center that the credentialsthat were used for a commit appear to be the credentials for aGoogle Cloud Identity and Access Management service account.
The notification includes the service account name and the private keyidentifier. Google Cloud also sends yourdesignated contact for security and privacyissues a notification by email.
To remediate this issue, take one or more of the following actions:
- Identify the legitimate user of the key.
- Rotate the key.
- Remove the key.
- Investigate any actions that were taken by the key after thekey was leaked to ensure that none of the actions were malicious.
JSON: leaked account credentials finding
{"findings":{"access":{},"assetDisplayName":"PROJECT_NAME","assetId":"organizations/ORGANIZATION_ID/assets/ASSET_ID","canonicalName":"projects/PROJECT_ID/sources/SOURCE_INSTANCE_ID/findings/FINDING_ID","category":"account_has_leaked_credentials","contacts":{"security":{"contacts":[{"email":"EMAIL_ADDRESS"}]}},"createTime":"2022-08-05T20:59:41.022Z","database":{},"eventTime":"2022-08-05T20:59:40Z","exfiltration":{},"findingClass":"THREAT","findingProviderId":"organizations/ORGANIZATION_ID/firstPartyFindingProviders/cat","indicator":{},"kubernetes":{},"mitreAttack":{},"mute":"UNDEFINED","name":"organizations/ORGANIZATION_ID/sources/SOURCE_INSTANCE_ID/findings/FINDING_ID","parent":"organizations/ORGANIZATION_ID/sources/SOURCE_INSTANCE_ID","parentDisplayName":"Cloud Anomaly Detection","resourceName":"//cloudresourcemanager.googleapis.com/projects/PROJECT_ID","severity":"CRITICAL","sourceDisplayName":"Cloud Anomaly Detection","state":"ACTIVE","vulnerability":{},"workflowState":"NEW"},"resource":{"name":"//cloudresourcemanager.googleapis.com/projects/PROJECT_ID","display_name":"PROJECT_NAME","project_name":"//cloudresourcemanager.googleapis.com/projects/PROJECT_ID","project_display_name":"PROJECT_NAME","parent_name":"//cloudresourcemanager.googleapis.com/organizations/ORGANIZATION_ID","parent_display_name":"ORGANIZATION_NAME","type":"google.cloud.resourcemanager.Project","folders":[]},"sourceProperties":{"project_identifier":"PROJECT_ID","compromised_account":"SERVICE_ACCOUNT_NAME@PROJECT_ID.iam.gserviceaccount.com","finding_type":"Potential compromise of a resource in your organization.","summary_message":"We have detected leaked Service Account authentication credentials that could be potentially compromised.","action_taken":"Notification sent","private_key_identifier":"SERVICE_ACCOUNT_KEY_ID","url":"https://github.com/KEY_FILE_PATH/KEY_FILE_NAME.json"}}
Container Threat Detection
Premium and Enterpriseservice tiersContainer Threat Detection can detect the most common container runtime attacks and alert youin Security Command Center and optionally in Cloud Logging. Container Threat Detectionincludes several detection capabilities, an analysis tool, and an API.
Container Threat Detection detection instrumentation collects low-level behavior in theguest kernel and performs natural language processing on code to detect thefollowing events:
Added Binary ExecutedAdded Library LoadedCommand and Control: Steganography Tool Detected(Preview)Credential Access: Find Google Cloud CredentialsCredential Access: GPG Key ReconnaissanceCredential Access: Search Private Keys or PasswordsDefense Evasion: Base64 ELF File Command LineDefense Evasion: Base64 Encoded Python Script ExecutedDefense Evasion: Base64 Encoded Shell Script ExecutedDefense Evasion: Launch Code Compiler Tool In Container(Preview)Execution: Added Malicious Binary ExecutedExecution: Added Malicious Library LoadedExecution: Built in Malicious Binary ExecutedExecution: Container EscapeExecution: Fileless Execution in /memfd:Execution: Ingress Nightmare Vulnerability Execution(Preview)Execution: Kubernetes Attack Tool ExecutionExecution: Local Reconnaissance Tool ExecutionExecution: Malicious Python executedExecution: Modified Malicious Binary ExecutedExecution: Modified Malicious Library LoadedExecution: Netcat Remote Code Execution In ContainerExecution: Possible Arbitrary Command Execution through CUPS (CVE-2024-47177)Execution: Possible Remote Command Execution Detected(Preview)Execution: Program Run with Disallowed HTTP Proxy EnvExecution: Socat Reverse Shell DetectedExecution: Suspicious OpenSSL Shared Object LoadedExfiltration: Launch Remote File Copy Tools in ContainerImpact: Detect Malicious Cmdlines(Preview)Impact: Remove Bulk Data From DiskImpact: Suspicious crypto mining activity using the Stratum ProtocolMalicious Script ExecutedMalicious URL ObservedPrivilege Escalation: Abuse of Sudo For Privilege Escalation (CVE-2019-14287)Privilege Escalation: Fileless Execution in /dev/shmPrivilege Escalation: Polkit Local Privilege Escalation Vulnerability (CVE-2021-4034)Privilege Escalation: Sudo Potential Privilege Escalation (CVE-2021-3156)Reverse ShellUnexpected Child Shell
Learn more about Container Threat Detection.
Event Threat Detection
Premium and Enterpriseservice tiersEvent Threat Detection uses log data frominside your systems. It watchesCloud Logging stream for projects, and consumeslogs as they become available. When a threat is detected, Event Threat Detectionwrites a finding to Security Command Center and to a Cloud Logging project.Event Threat Detection is automatically enabled when you activate theSecurity Command Center Premium tier and findings are available in theGoogle Cloud console.
The following table lists examples of Event Threat Detection findings.
Project-level activations - unsupported findingsWhen Security Command Center isactivated at the project level, certain Event Threat Detection detection modules are unsupported. For a list of Event Threat Detection findings that are unavailable with project-level activations as a result, seeEvent Threat Detection findings that are unsupported.
Data destruction | Event Threat Detection detects data destruction by examining audit logs from the Backup and DR Service Management Server for the following scenarios:
|
Data exfiltration | Event Threat Detection detects data exfiltration from BigQuery and Cloud SQL by examining audit logs for the following scenarios:
|
Cloud SQL suspicious activity | Event Threat Detection examines audit logs to detect the following events that might indicate a compromise of a valid user account on Cloud SQL instances:
|
AlloyDB for PostgreSQL suspicious activity | Event Threat Detection examines audit logs to detect the following events that might indicate a compromise of a valid user account on AlloyDB for PostgreSQL instances:
|
Brute force SSH | Event Threat Detection detects brute force of password authentication SSH by examining syslog logs for repeated failures followed by a success. |
Cryptomining | Event Threat Detection detects coin mining malware by examining VPC Flow Logs and Cloud DNS logs for connections to known bad domains or IP addresses of mining pools. |
IAM abuse | Anomalous IAM grants: Event Threat Detection detects the addition of IAM grants that might be considered anomalous, like:
|
Inhibit System Recovery | Event Threat Detection detects anomalous changes to Backup and DR that may impact backup posture, including major policy changes and removal of critical Backup and DR components. |
Log4j | Event Threat Detection detects possible attempts at Log4j exploitation and active Log4j vulnerabilities. |
Malware | Event Threat Detection detects malware by examining VPC Flow Logs and Cloud DNS logs for connections to known command and control domains and IPs. |
Outgoing DoS | Event Threat Detection examines VPC Flow Logs to detect outgoing denial of service traffic. |
Anomalous access | Event Threat Detection detects anomalous access by examiningCloud Audit Logs for Google Cloud service modifications that originated from anonymous proxy IP addresses, like Tor IP addresses. |
Anomalous IAM behavior | Event Threat Detection detects anomalous IAM behavior by examiningCloud Audit Logs for the following scenarios:
|
Service account self-investigation | Event Threat Detection detects when a service account credential is used to investigate the roles and permissions associated with that same service account. |
Compute Engine Admin Added SSH Key | Event Threat Detection detects a modification to the Compute Engine instance metadata ssh key value on an established instance (older than 1 week). |
Compute Engine Admin Added Startup Script | Event Threat Detection detects a modification to the Compute Engine instance metadata startup script value on an established instance (older than 1 week). |
Suspicious account activity | Event Threat Detection detects potential compromise of Google Workspace accounts by examining audit logs for anomalous account activities, including leaked passwords and attempted suspicious logins. |
Government-backed attack | Event Threat Detection examines Google Workspace audit logs to detect when government-backed attackers might have tried to compromise a user's account or computer. |
Single sign-on (SSO) changes | Event Threat Detection examines Google Workspace audit logs to detect when SSO is disabled or settings are changed for Google Workspace administrator accounts. |
2-step verification | Event Threat Detection examines Google Workspace audit logs to detect when 2-step verification is disabled on user and administrator accounts. |
Anomalous API behavior | Event Threat Detection detects anomalous API behavior by examining Cloud Audit Logs for requests to Google Cloud services that a principal has not seen before. |
Defense Evasion | Event Threat Detection detects Defense Evasion by examining Cloud Audit Logs for the following scenarios:
|
Discovery | Event Threat Detection detects discovery operations by examining audit logs for the following scenarios:
|
Initial Access | Event Threat Detection detects initial access operations by examining audit logs for the following scenarios:
|
Privilege escalation | Event Threat Detection detects privilege escalation in GKE by examining audit logs for the following scenarios:
|
Cloud IDS detections | Cloud IDS detects layer 7 attacks by analyzing mirrored packets and, when it detects a suspicious event, triggers an Event Threat Detection finding. To learn more about Cloud IDS detections, seeCloud IDS Logging information. |
Lateral movement | Event Threat Detection detects potential modified-boot-disk attacks by examining Cloud Audit Logs for frequent boot disk detachments and re-attachments across Compute Engine instances. |
Learn more about Event Threat Detection.
Google Cloud Armor
Standard, Premium, and Enterpriseservice tiers (requiresorganization-level activation)Cloud Armor helps protect yourapplication by providing Layer 7 filtering. Cloud Armor scrubs incomingrequests for common web attacks or other Layer 7 attributes to potentially blocktraffic before it reaches your load-balanced backend services or backendbuckets.
Cloud Armor exports two findings to Security Command Center:
Virtual Machine Threat Detection
Premium and Enterpriseservice tiersVirtual Machine Threat Detection is a built-in service of Security Command Center. This service scansvirtual machines to detect potentially malicious applications, such ascryptocurrency mining software, kernel-mode rootkits, and malware running incompromised cloud environments.
VM Threat Detection is part of the Security Command Center threat detectionsuite and is designed to complement the existing capabilities ofEvent Threat Detection andContainer Threat Detection.
For more information about VM Threat Detection, seeVM Threat Detectionoverview.
VM Threat Detection threat findings
VM Threat Detection can generate the following threat findings.
Cryptocurrency mining threat findings
VM Threat Detection detects the following finding categories through hash matching or YARA rules.
| Category | Module | Description |
|---|---|---|
| CRYPTOMINING_HASH | Matches memory hashes of running programs against known memory hashes of cryptocurrency mining software. Findings are classified asHigh severity by default. |
| CRYPTOMINING_YARA | Matches memory patterns, such as proof-of-work constants, known to be used by cryptocurrency mining software. Findings are classified asHigh severity by default. |
|
| Identifies a threat that was detected by both theCRYPTOMINING_HASH andCRYPTOMINING_YARA modules. For more information, see Combined detections. Findings are classified asHigh severity by default. |
Kernel-mode rootkit threat findings
Preview
This feature is subject to the "Pre-GA Offerings Terms" in the General Service Terms section of theService Specific Terms. Pre-GA features are available "as is" and might have limited support. For more information, see thelaunch stage descriptions.
VM Threat Detection analyzes kernel integrity at run time to detect common evasion techniques that are used by malware.
TheKERNEL_MEMORY_TAMPERING module detects threats by doing a hash comparison on the kernel code and kernel read-only data memory of a virtual machine.
TheKERNEL_INTEGRITY_TAMPERING module detects threats by checking the integrity of important kernel data structures.
| Category | Module | Description |
|---|---|---|
| Rootkit | ||
|
| A combination of signals matching a known kernel-mode rootkit is present. To receive findings of this category, make sure both modules are enabled. Findings are classified asHigh severity by default. |
| Kernel memory tampering | ||
| KERNEL_MEMORY_TAMPERING | Unexpected modifications of kernel read-only data memory are present. Findings are classified asHigh severity by default. |
| Kernel integrity tampering | ||
| KERNEL_INTEGRITY_TAMPERING | ftrace points are present with callbacks pointing to regions that are not in the expected kernel or module code range. Findings are classified asHigh severity by default. |
| KERNEL_INTEGRITY_TAMPERING | Interrupt handlers that aren't in the expected kernel or module code regions are present. Findings are classified asHigh severity by default. |
| KERNEL_INTEGRITY_TAMPERING | Kernel code pages that are not in the expected kernel or module code regions are present. Findings are classified asHigh severity by default. |
| KERNEL_INTEGRITY_TAMPERING | kprobe points are present with callbacks pointing to regions that are not in the expected kernel or module code range. Findings are classified asHigh severity by default. |
| KERNEL_INTEGRITY_TAMPERING | Unexpected processes in the scheduler run queue are present. Such processes are in the run queue, but not in the process task list. Findings are classified asHigh severity by default. |
| KERNEL_INTEGRITY_TAMPERING | System call handlers that aren't in the expected kernel or module code regions are present. Findings are classified asHigh severity by default. |
Errors
Error detectors can help you detect errors in your configuration that preventsecurity sources from generating findings. Error findings are generated bytheSecurity Command Center security source andhave the finding classSCC errors.
Inadvertent actions
Standard, Premium, and Enterpriseservice tiers (requiresorganization-level activation)The following finding categories represent errors possibly caused by unintentional actions.
| Category name | API name | Summary | Severity |
|---|---|---|---|
| API_DISABLED | Finding description: A required API is disabled for the project. The disabled service can't send findings to Security Command Center. Pricing tier:Premium or Standard Supported assets Batch scans: Every 60 hours | Critical |
| APS_NO_RESOURCE_VALUE_CONFIGS_MATCH_ANY_RESOURCES | Finding description:Resource value configurations are defined for attack path simulations, but they do not match any resource instances in your environment. The simulations are using the default high-value resource set instead. This error can have any of the following causes:
Pricing tier:Premium Supported assets Batch scans: Before every attack path simulation. | Critical |
| APS_RESOURCE_VALUE_ASSIGNMENT_LIMIT_EXCEEDED | Finding description: In the lastattack path simulation, the number of high-value resource instances, as identified by theresource value configurations, exceeded the limit of 1,000 resource instances in a high-value resource set. As a result, Security Command Center excluded the excess number of instances from the high-value resource set. The total number of matching instances and the total number of instances excluded from the set are identified in the The attack exposure scores on any findings that affect excluded resource instances do not reflect the high-value designation of the resource instances. Pricing tier:Premium Supported assets Batch scans: Before every attack path simulation. | High |
| KTD_IMAGE_PULL_FAILURE | Finding description: Container Threat Detection can't be enabled on the cluster because a required container image can't be pulled (downloaded) from The attempt to deploy the Container Threat Detection DaemonSet resulted in the following error: Pricing tier:Premium Supported assets Batch scans: Every 30 minutes | Critical |
| KTD_BLOCKED_BY_ADMISSION_CONTROLLER | Finding description: Container Threat Detection can't be enabled on a Kubernetes cluster. A third-party admission controller is preventing the deployment of a Kubernetes DaemonSet object that Container Threat Detection requires. When viewed in the Google Cloud console, the finding details include the error message that was returned by Google Kubernetes Engine when Container Threat Detection attempted to deploy a Container Threat Detection DaemonSet Object. Pricing tier:Premium Supported assets Batch scans: Every 30 minutes | High |
| KTD_SERVICE_ACCOUNT_MISSING_PERMISSIONS | Finding description: A service account is missing permissions that Container Threat Detection requires. Container Threat Detection could stop functioning properly because the detection instrumentation cannot be enabled, upgraded, or disabled. Pricing tier:Premium Supported assets Batch scans: Every 30 minutes | Critical |
| GKE_SERVICE_ACCOUNT_MISSING_PERMISSIONS | Finding description: Container Threat Detection can't generate findings for a Google Kubernetes Engine cluster, because the GKE default service account on the cluster is missing permissions. This prevents Container Threat Detection from being successfully enabled on the cluster. Pricing tier:Premium Supported assets Batch scans: Every week | High |
| MISCONFIGURED_CLOUD_LOGGING_EXPORT | Finding description: The project configured for continuous export to Cloud Logging is unavailable. Security Command Center can't send findings to Logging. Pricing tier:Premium Supported assets Batch scans: Every 30 minutes | High |
| VPC_SC_RESTRICTION | Finding description: Security Health Analytics can't produce certain findings for a project. The project is protected by aservice perimeter, and the Security Command Center service account doesn't have access to the perimeter. Pricing tier:Premium or Standard Supported assets Batch scans: Every 6 hours | High |
| SCC_SERVICE_ACCOUNT_MISSING_PERMISSIONS | Finding description: The Security Command Center service account is missing permissions required to function properly. No findings are produced. Pricing tier:Premium or Standard Supported assets Batch scans: Every 30 minutes | Critical |
For more information, seeSecurity Command Center errors.
What's next
- Learn about Security Command Center in theSecurity Command Center overview.
- Learn how to add new security sources byconfiguring Security Command Center services.
Except as otherwise noted, the content of this page is licensed under theCreative Commons Attribution 4.0 License, and code samples are licensed under theApache 2.0 License. For details, see theGoogle Developers Site Policies. Java is a registered trademark of Oracle and/or its affiliates.
Last updated 2025-12-17 UTC.