Google Cloud Security Command Center
Author: m | 2025-04-24
Google Cloud Solution Center Google Cloud Support Google Cloud Tech Youtube Channel SKU Groups - Security Command Center Stay Security Command Center Google Cloud Security Command Center: Node.js Client. Cloud Security Command Center API client for Node.js. A comprehensive list of changes in each version may be found in the CHANGELOG. Google Cloud Security Command Center Node.js Client API Reference; Google Cloud Security Command Center Documentation
Google Cloud Security Command Center
This page describes how you can configure and use thesecurity posture serviceafter you activate Security Command Center. To start, you must create a posture thatincludes your policies, organized in policy sets, and then deploy the posture using aposture deployment. After a posture is deployed, you can monitor for drift andfurther refine your posture over time.Before you beginComplete these tasks before you complete the remaining tasks on this page.Activate the Security Command Center Premium or Enterprise tierVerify that theSecurity Command Center Premium tier or Enterprise tieris activated at the organization level.If you want to use Security Health Analytics detectors as policies, select theSecurity Health Analytics service during the activation process.Set up permissions To get the permissions that you need to use posture, ask your administrator to grant you the Security Posture Admin (roles/securityposture.admin) IAM role. For more information about granting roles, see Manage access to projects, folders, and organizations. You might also be able to get the required permissions through custom roles or other predefined roles. For more information about security posture roles and security posturepermissions, seeIAM for organization-level activations.Set up Google Cloud CLIYou mustuse Google Cloud CLI version 461.0.0 or later. In the Google Cloud console, activate Cloud Shell. Activate Cloud Shell At the bottom of the Google Cloud console, a Cloud Shell session starts and displays a command-line prompt. Cloud Shell is a shell environment with the Google Cloud CLI already installed and with values already set for your current project. It can take a few seconds for the Security Command Center client libraries Stay organized with collections Save and categorize content based on your preferences. This page shows how to get started with the Cloud Client Libraries for theSecurity Command Center API. Client libraries make it easier to accessGoogle Cloud APIs from a supported language. Although you can useGoogle Cloud APIs directly by making raw requests to the server, clientlibraries provide simplifications that significantly reduce the amount of codeyou need to write.Read more about the Cloud Client Librariesand the older Google API Client Libraries inClient libraries explained.Install the client library C++ See Setting up a C++ development environmentfor details about this client library's requirements and install dependencies. C# Install-Package Google.Cloud.SecurityCenter.V2 For more information, see Setting Up a C# Development Environment. Go go get cloud.google.com/go/securitycenter/apiv2 For more information, see Setting Up a Go Development Environment. Java If you are using Maven, addthe following to your pom.xml file. For more information aboutBOMs, see The Google Cloud Platform Libraries BOM. If you are using Gradle,add the following to your dependencies: If you are using sbt, addthe following to your dependencies: For more information, see Setting Up a Java Development Environment. Node.js npm install --save @google-cloud/security-center For more information, see Setting Up a Node.js Development Environment. PHP composer require google/cloud-security-center For more information, see Using PHP on Google Cloud. Python pip install --upgrade google-cloud-securitycenter For more information, see Setting Up a Python Development Environment. Ruby gem install google-cloud-security_center For more information, see Setting Up a Ruby Development Environment. Set up authenticationTo authenticate calls to Google Cloud APIs, client libraries supportApplication Default Credentials (ADC);the libraries look for credentials in a set of defined locations and use those credentialsto authenticate requests to the API. With ADC, you can makecredentials available to your application in a variety of environments, such as localdevelopment or production, without needing to modify your application code.For production environments, the way you set up ADC depends on the serviceand context. For more information, see Set up Application Default Credentials.For a local development environment, you can set up ADC with the credentialsthat are associated with your Google Account: After installing the Google Cloud CLI, initialize it by running the following command: gcloud init If you're using an external identity provider (IdP), you must first sign in to the gcloud CLI with your federated identity. If you're using a local shell, then create local authentication credentials for your user account: gcloud auth application-defaultSecurity Command Center - Google Cloud
That applies to Vertex AI workloads,you can monitor for drift in two ways: from the Findings page, and fromthe Overview page. For all other postures, you can monitor for drift fromthe Findings page.To monitor for drift from the Findings page:In the Google Cloud console, go to the Findings page.Go to FindingsVerify that you are viewing the organization that you activated theSecurity Command Center Premium or Enterprise tier on.In the Quick filters pane, select the Posture violation finding.You can also enter the following filter in Query preview:state="ACTIVE" AND NOT mute="MUTED" AND finding_class="POSTURE_VIOLATION"To view the details for a finding, click the finding.To monitor for drift from the Overview page (Vertex AI workloadsonly):In the Google Cloud console, go to the Overview page.Go to OverviewVerify that you are viewing the organization that you activated theSecurity Command Center Premium or Enterprise tier on.Review the AI Workload Findings pane.The Vulnerabilities tab shows all the vulnerabilities related to anySecurity Health Analytics custom modules that apply specifically toVertex AI workloads.The Policy Drift tab shows any drift related to theVertex AI organization policies that you've applied in aposture.To view the details for a finding, click the finding. gcloud In the gcloud CLI, to view drift findings, run the following:gcloud scc findings list ORGANIZATION_ID \ --filter="category="SECURITY_POSTURE_DRIFT""Where ORGANIZATION_ID is the ID of the organization.For more information about addressing these findings, seeSecurity posture service findings.You can export these findings in the same way that you export any other findingsfrom Security Command Center. For more information, seeExporting Security Command Center data.To inactivate a. Google Cloud Solution Center Google Cloud Support Google Cloud Tech Youtube Channel SKU Groups - Security Command Center Stay Security Command Center Google Cloud Security Command Center: Node.js Client. Cloud Security Command Center API client for Node.js. A comprehensive list of changes in each version may be found in the CHANGELOG. Google Cloud Security Command Center Node.js Client API Reference; Google Cloud Security Command Center DocumentationSecurity Command Center-Google Cloud
Model Armor is a fully managed Google Cloud service that enhances thesecurity and safety of AI applications by screening LLM prompts and responses forvarious security and safety risks. Model Armor offers a number offeatures, including the following:Model-independent and cloud-independent: Model Armor is designed to supportany model on any cloud platform. That includes multi-cloud and multi-modelscenarios to choose the best AI solutions for your specific needs.Centralized management and enforcement: Model Armor enablescentralized management and enforcement of security and safety policies.Public REST APIs: Model Armor provides a public REST API, allowingyou to integrate prompt and response screening directly into yourapplications. This API-based approach supports various deployment scenarios.Role-based access control (RBAC): Model Armor incorporates role-basedaccess control (RBAC) to manage access and permissions within the service sothat different user roles have appropriate levels of control and visibility.Regional endpoints: Model Armor's API is exposed using regionalendpoints, providing low latency.Multiple regions: Model Armor is accessible throughoutvarious regions in the United States and Europe.Integration with Security Command Center: Model Armor is integrated with Security Command Center,you to view the findings in the Security Command Center dashboard and identify violationsand remediate them from the source.Safety and security features:Safety and responsible AI filters:Model Armor offers the filters for content safety, addressingconcerns like sexually explicit, dangerous, harassment and hate speech content.Prompt injection and jailbreak detection:Model Armor includes features to detect and prevent promptinjection and jailbreak attacks.Data Loss Prevention (DLP) using Sensitive Data Protection:Model Armor includes the full capabilities of Google Cloud'sSensitive Data Protection service to provide data loss preventioncapabilities. It can discover, classify, and protect sensitive data(e.g., intellectual property like source code or personally identifiableinformation like credit card numbers), preventing its unauthorizedexposure in LLM interactions.Malicious URL detection:Model Armor is capable of identifying malicious URLs in bothprompts and responses, enhancing the security posture of AI applications.Support for screening PDFs:Model Armor supports screening text in PDFs for malicious content.BenefitsModel Armor offers several benefits for organizations, including thefollowing:Enhanced AI safety and security: Model Armor helps organizationsmitigate the security and safety risks associated with using LLMs. It addressesconcerns such as prompt injection and jailbreak attempts, harmful contentgeneration, malicious URLs, and sensitive data loss, allowing secureand reliable integrations of LLMs into products and services.Centralized visibility and control: Model Armor offers centralizedmanagement across all LLM applications, enabling CISOs and security architectsto monitor and control security and safety policies.Flexible deployment options: Model Armor supports multi-cloud,multi-model, and multi-LLM scenarios and can be deployed at different points in the Security Command Center 보안 기능지난 글에서는 Security Command Center 주요 보안 기능 개요 및 활성화 방안을 살펴보았습니다. 이번에는 Security Command Center가 제공하는 보안 기능을 상세히 알아보겠습니다. Security Command Center가 제공하는 대표적인 기능은 다음과 같습니다. Google Cloud 자원의 중앙 집중방식의 가시성 및 제어 확보Google Cloud에서 운영하는 자원의 잘못된 구성 및 취약점 찾기Google Cloud 자원에서 발생하는 위협 감지Google Cloud 환경의 보안 컴플라이언스 규정 준수 및 유지ㅇ자원의 중앙 집중 방식의 가시성 및 제어 확보기업 전산 환경에서 어려운 일 하나는 운영 자산 목록을 최신상태로 관리하는 것입니다. 운영하는 서버 및 컴퓨터의 수량, 제품의 도입 시기, 업그레이드 시기 등을 파악하는 것입니다. 전산 환경의 규모가 크고, 많은 이기종 제품을 운영하고 있다면 이 업무는 1-2명이 해결할 수 있는 수준이 아닙니다. 운영 자산의 실제 목록은 정보보안에서도 매우 중요한 기본 자료입니다. 보안은 자산을 위협으로부터 보호하는 행위입니다. 그러므로 자산을 보호하려면 보호 대상을 먼저 목록화하고 개별 자원의 특성을 파악해야 합니다. 그 이후에 자산별 보안 취약점에 대응한다면 보안 정책을 수립하기 매우 용이합니다. Security Command Center는 Asset Inventory를 활용하여 사용자가 사용하는 자원 목록을 최신상태로 실시간에 가깝게 관리합니다. 자원은 Google Cloud에서 생성하거나 운영하는 모든 컴퓨팅 자원을 말합니다. VPC 네트워크, GCE(Google Compute Engine), 네트워크 로드 밸런서와 NAT를 위해 설정한 대표 IP 등이 모두 자원입니다. Security Command Center는 Google Cloud내에서 사용자가 생성한 자원을 유형별 또는 프로젝트별로 자동으로 구분하여 보여줍니다.[운영 자원 가시성 확보]예시 그림에서는 IP 주소인 Address 자원을 확인할 수 있습니다. 자원 이름, 자원 소유자, 생성 시간과 수정 시간을 필드에서 확인할 수 있습니다. 자원 유형별로 필드 구성이 다를 수 있습니다. 목록 우측 위를 클릭하여 필드 정보를 수정할 수 있으며, 자원별로 필드를 다르게 설정하거나 모든 자원에 일괄적으로 동일한 설정을 구성할 수 있습니다. 사용자가 자원을 새로 생성하거나 수정하는 경우에도 거의 실시간으로 변경 내역이 Asset Inventory에 반영됩니다. 개별 자원의 잘못된 구성 및 취약점 찾기사용자가 생성한 자원은 워크로드 실행, 데이터 저장 등 다양한 역할을 수행합니다. 하지만 올바른 구성을 갖지 않는 경우 보안 문제가 발생할 수 있습니다. Security Command Center는 위협 방지를 위해서 Security Health Analytics라는 보안 위협 탐지 기능을 제공합니다. 프리미엄 등급에서는 모든 취약점 탐지를 제공하지만 표준 등급에서는 위험도가 High인 항목만을 점검할 수 있습니다.Security Health Analytics의 개별 감지기는 Google Cloud에서 운영중인 자원의 위협을 스캔합니다. 스캔은 Security Command Center가 사용 설정된 후 약 1시간 후 시작되며 두 가지 모드(배치 모드, 실시간 모드)로 실행됩니다. 일괄 모드는 매일 2번 12시간 간격으로 자동으로 스캔이 실행되고 실시간 모드는 자원 구성 변경사항이 감지되는 경우 위협 방지 스캔을 실행합니다. API 접속에 사용하는 키가 90일 동안 변경되지 않았거나 HTTPS 대신 HTTP 로드 밸런서를 사용하거나, 가상머신에 인터넷 IP를 할당하는 등의 Google이 설정한 보안 취약점을 자동으로 점검하고 이를 관리자에게 알립니다. Security Health Analytics의 취약점 발견 항목 전체 목록은 이곳에서 확인할 수 있습니다.Cloud 자원의 취약점 외에도 Web Security Scanner를 사용하면 클라우드에서 운영하는 웹 애플리케이션의 취약점도 탐지할 수 있습니다. 표준 등급에서는 스캔 대상 URL을 사용자가 직접 등록해야 합니다. 등록후에 스캔 주기를 지정할 수 있습니다. 프리미엄등급에서는 1주일마다 스캔 대상 URL을 자동으로 점검한 후에 취약점 스캔까지 완료합니다. 클라우드 자원의 동작 중 위협 탐지클라우드 환경의 전체 자원 목록을 확보하고 개별 자원의 취약점을 탐지했습니다. 다음 단계로는 각 자원들이 동작하는 과정에서 발생하는 통신 로그 등을 기반으로 위협을 감지를 수행합니다. 이 기능은 컨테이너 위협 탐지(Container Threat Detection), 이벤트 위협 탐지(Event Threat Detection), 가상머신 위협 탐지(VM Threat Detection), 이상징후 탐지(Anomaly Detection)이Managing Google Cloud security with Security Command Center
Last April we announced the general availability of Shielded VM—virtual machine instances that are hardened with a set of easily configurable security features to ensure that when your VM boots, it’s running a verified bootloader and kernel. To make it accessible to everyone, we offered Shielded VM at no additional charge.To continue improving the safety and security of our ecosystem, today we’re making Unified Extensible Firmware Interface (UEFI) and Shielded VM the default for everyone using Google Compute Engine—at no additional charge. This provides defense-in-depth hardening features to all supported VM instances, including protection from:Malicious guest system firmware, UEFI extensions, and driversPersistent boot and kernel compromise in the guest OSVM-based secret exfiltration and replay“Using Shielded VM to run our secure services on Google Cloud Platform has improved our security posture, while being quick and simple to implement,” said Michael Capicotto, Cloud Security Architect at Two Sigma. “Making this the default for Compute Engine is a great next step toward improving security for all.”What's newSince Shielded VM became generally available, we’ve continued to add support for common use cases based on your feedback and feature suggestions. Adoption across Google Cloud: In addition to making Shielded VM the default across Google Compute Engine, several VM-based Google Cloud services, including Cloud SQL, Google Kubernetes Engine, Kaggle, and Managed Service for Microsoft Active Directory, are now using Shielded VM as their underlying infrastructure.Migration support: Starting with version 4.5, Migrate for Compute Engine (formerly Velostrata) includes support for migration of UEFI-based VMs from on-prem to Shielded VM in Google Compute Engine.Security Command Center integration: Security Health Analytics findings now allow you to identify VM instances with Shielded VM support that don't have secure boot enabled, so you can enable it if possible.The power to chooseIn addition to the new features we’ve added, Shielded VMs now offer more flexibility around the operating system images you can use and how you get them. Support across multiple operating systems: For an extensive list of operating systems that support Shielded VM features, as well as which projects these can be found in, please see Google Compute Engine images.Marketplace for an open ecosystem: Shielded VM images are also available in the GCP Marketplace. These are brought to you in collaboration with Deep Learning VM, as well as our third-party partners at Center for Internet Security (CIS) and Server General. "Our goal is to help our customers to secure their dataGoogle Cloud Security Basics: The Security Command Center
Feature records access requests to storage buckets which is useful for security audits. By default, server access logging is not enabled for S3 buckets.If you add a detector that's specific to AWS, you must deploy the postureat the organization level.Upload your posture file to a version-controlled source repository so thatyou can track the changes that you make to it over time.Create a postureComplete this task to create a posture resource in Security Command Center that youcan deploy. If you created a posture from a predefined posture template usingthe Google Cloud console, the posture resource is created automatically foryou. Console In the Google Cloud console, go to the Posture Management page.Go to Posture ManagementVerify that you are viewing the organization that you activated theSecurity Command Center Premium or Enterprise tier on.Click Create Posture. You can create a posture by starting with anexisting posture or template, or by using the policies applied to a resource.Create a posture using an existing posture or templateSelect Start with an existing posture or template (browse postures).Specify posture details such as posture name and description.Click Select Posture. You can create a posture based on an existing posture or a template.Select Posture to create a posture using an existing posture. Select a posture from the list of postures displayed and then select one or more revisions from the list of available revisions for the selected posture.Select Template to create a posture using a template and then select one or more templates from the list of templates displayed.Click Save.. Google Cloud Solution Center Google Cloud Support Google Cloud Tech Youtube Channel SKU Groups - Security Command Center Stay Security Command Center Google Cloud Security Command Center: Node.js Client. Cloud Security Command Center API client for Node.js. A comprehensive list of changes in each version may be found in the CHANGELOG. Google Cloud Security Command Center Node.js Client API Reference; Google Cloud Security Command Center DocumentationSecurity Command Center overview - Google Cloud
Console, go to the Posture Management page.Go to Posture ManagementVerify that you are viewing the organization that you activated theSecurity Command Center Premium or Enterprise tier on.On the Postures tab, click the posture you want to update.On the Posture details page, click Edit.Select the posture status and click Save. gcloud To change the state of a posture, run the gcloud scc postures update command.You can't update the posture state at the same time that you update otherfields. For instructions about running the gcloud scc postures update command,see Modify a posture YAML file.Update a posture deploymentUpdate a posture deployment on a project, folder, or organization to deploy anew posture or deploy a new revision of a posture.If the posture revision that you're updating includes a custom organizationconstraint that was deleted using the Google Cloud console, you can't updatethe posture deployment using the same posture ID. The Organization Policy Service preventsthe creation of custom organization constraints that have the same name.Instead, you must create a new version of the posture or use a different postureID.Also, findings for the policy deployments deleted as part of the update processwill be deactivated. Console In the Google Cloud console, go to the Posture Management page.Go to Posture ManagementVerify that you are viewing the organization that you activatedthe Security Command Center Premium or Enterprise tier on.On the Postures tab, click the posture that you want to update.On the Posture details page, select the revision of the posture.Click Apply to resources.Click Select to select the organization, folder, orComments
This page describes how you can configure and use thesecurity posture serviceafter you activate Security Command Center. To start, you must create a posture thatincludes your policies, organized in policy sets, and then deploy the posture using aposture deployment. After a posture is deployed, you can monitor for drift andfurther refine your posture over time.Before you beginComplete these tasks before you complete the remaining tasks on this page.Activate the Security Command Center Premium or Enterprise tierVerify that theSecurity Command Center Premium tier or Enterprise tieris activated at the organization level.If you want to use Security Health Analytics detectors as policies, select theSecurity Health Analytics service during the activation process.Set up permissions To get the permissions that you need to use posture, ask your administrator to grant you the Security Posture Admin (roles/securityposture.admin) IAM role. For more information about granting roles, see Manage access to projects, folders, and organizations. You might also be able to get the required permissions through custom roles or other predefined roles. For more information about security posture roles and security posturepermissions, seeIAM for organization-level activations.Set up Google Cloud CLIYou mustuse Google Cloud CLI version 461.0.0 or later. In the Google Cloud console, activate Cloud Shell. Activate Cloud Shell At the bottom of the Google Cloud console, a Cloud Shell session starts and displays a command-line prompt. Cloud Shell is a shell environment with the Google Cloud CLI already installed and with values already set for your current project. It can take a few seconds for the
2025-04-19Security Command Center client libraries Stay organized with collections Save and categorize content based on your preferences. This page shows how to get started with the Cloud Client Libraries for theSecurity Command Center API. Client libraries make it easier to accessGoogle Cloud APIs from a supported language. Although you can useGoogle Cloud APIs directly by making raw requests to the server, clientlibraries provide simplifications that significantly reduce the amount of codeyou need to write.Read more about the Cloud Client Librariesand the older Google API Client Libraries inClient libraries explained.Install the client library C++ See Setting up a C++ development environmentfor details about this client library's requirements and install dependencies. C# Install-Package Google.Cloud.SecurityCenter.V2 For more information, see Setting Up a C# Development Environment. Go go get cloud.google.com/go/securitycenter/apiv2 For more information, see Setting Up a Go Development Environment. Java If you are using Maven, addthe following to your pom.xml file. For more information aboutBOMs, see The Google Cloud Platform Libraries BOM. If you are using Gradle,add the following to your dependencies: If you are using sbt, addthe following to your dependencies: For more information, see Setting Up a Java Development Environment. Node.js npm install --save @google-cloud/security-center For more information, see Setting Up a Node.js Development Environment. PHP composer require google/cloud-security-center For more information, see Using PHP on Google Cloud. Python pip install --upgrade google-cloud-securitycenter For more information, see Setting Up a Python Development Environment. Ruby gem install google-cloud-security_center For more information, see Setting Up a Ruby Development Environment. Set up authenticationTo authenticate calls to Google Cloud APIs, client libraries supportApplication Default Credentials (ADC);the libraries look for credentials in a set of defined locations and use those credentialsto authenticate requests to the API. With ADC, you can makecredentials available to your application in a variety of environments, such as localdevelopment or production, without needing to modify your application code.For production environments, the way you set up ADC depends on the serviceand context. For more information, see Set up Application Default Credentials.For a local development environment, you can set up ADC with the credentialsthat are associated with your Google Account: After installing the Google Cloud CLI, initialize it by running the following command: gcloud init If you're using an external identity provider (IdP), you must first sign in to the gcloud CLI with your federated identity. If you're using a local shell, then create local authentication credentials for your user account: gcloud auth application-default
2025-04-17That applies to Vertex AI workloads,you can monitor for drift in two ways: from the Findings page, and fromthe Overview page. For all other postures, you can monitor for drift fromthe Findings page.To monitor for drift from the Findings page:In the Google Cloud console, go to the Findings page.Go to FindingsVerify that you are viewing the organization that you activated theSecurity Command Center Premium or Enterprise tier on.In the Quick filters pane, select the Posture violation finding.You can also enter the following filter in Query preview:state="ACTIVE" AND NOT mute="MUTED" AND finding_class="POSTURE_VIOLATION"To view the details for a finding, click the finding.To monitor for drift from the Overview page (Vertex AI workloadsonly):In the Google Cloud console, go to the Overview page.Go to OverviewVerify that you are viewing the organization that you activated theSecurity Command Center Premium or Enterprise tier on.Review the AI Workload Findings pane.The Vulnerabilities tab shows all the vulnerabilities related to anySecurity Health Analytics custom modules that apply specifically toVertex AI workloads.The Policy Drift tab shows any drift related to theVertex AI organization policies that you've applied in aposture.To view the details for a finding, click the finding. gcloud In the gcloud CLI, to view drift findings, run the following:gcloud scc findings list ORGANIZATION_ID \ --filter="category="SECURITY_POSTURE_DRIFT""Where ORGANIZATION_ID is the ID of the organization.For more information about addressing these findings, seeSecurity posture service findings.You can export these findings in the same way that you export any other findingsfrom Security Command Center. For more information, seeExporting Security Command Center data.To inactivate a
2025-04-05Model Armor is a fully managed Google Cloud service that enhances thesecurity and safety of AI applications by screening LLM prompts and responses forvarious security and safety risks. Model Armor offers a number offeatures, including the following:Model-independent and cloud-independent: Model Armor is designed to supportany model on any cloud platform. That includes multi-cloud and multi-modelscenarios to choose the best AI solutions for your specific needs.Centralized management and enforcement: Model Armor enablescentralized management and enforcement of security and safety policies.Public REST APIs: Model Armor provides a public REST API, allowingyou to integrate prompt and response screening directly into yourapplications. This API-based approach supports various deployment scenarios.Role-based access control (RBAC): Model Armor incorporates role-basedaccess control (RBAC) to manage access and permissions within the service sothat different user roles have appropriate levels of control and visibility.Regional endpoints: Model Armor's API is exposed using regionalendpoints, providing low latency.Multiple regions: Model Armor is accessible throughoutvarious regions in the United States and Europe.Integration with Security Command Center: Model Armor is integrated with Security Command Center,you to view the findings in the Security Command Center dashboard and identify violationsand remediate them from the source.Safety and security features:Safety and responsible AI filters:Model Armor offers the filters for content safety, addressingconcerns like sexually explicit, dangerous, harassment and hate speech content.Prompt injection and jailbreak detection:Model Armor includes features to detect and prevent promptinjection and jailbreak attacks.Data Loss Prevention (DLP) using Sensitive Data Protection:Model Armor includes the full capabilities of Google Cloud'sSensitive Data Protection service to provide data loss preventioncapabilities. It can discover, classify, and protect sensitive data(e.g., intellectual property like source code or personally identifiableinformation like credit card numbers), preventing its unauthorizedexposure in LLM interactions.Malicious URL detection:Model Armor is capable of identifying malicious URLs in bothprompts and responses, enhancing the security posture of AI applications.Support for screening PDFs:Model Armor supports screening text in PDFs for malicious content.BenefitsModel Armor offers several benefits for organizations, including thefollowing:Enhanced AI safety and security: Model Armor helps organizationsmitigate the security and safety risks associated with using LLMs. It addressesconcerns such as prompt injection and jailbreak attempts, harmful contentgeneration, malicious URLs, and sensitive data loss, allowing secureand reliable integrations of LLMs into products and services.Centralized visibility and control: Model Armor offers centralizedmanagement across all LLM applications, enabling CISOs and security architectsto monitor and control security and safety policies.Flexible deployment options: Model Armor supports multi-cloud,multi-model, and multi-LLM scenarios and can be deployed at different points in the
2025-04-19Security Command Center 보안 기능지난 글에서는 Security Command Center 주요 보안 기능 개요 및 활성화 방안을 살펴보았습니다. 이번에는 Security Command Center가 제공하는 보안 기능을 상세히 알아보겠습니다. Security Command Center가 제공하는 대표적인 기능은 다음과 같습니다. Google Cloud 자원의 중앙 집중방식의 가시성 및 제어 확보Google Cloud에서 운영하는 자원의 잘못된 구성 및 취약점 찾기Google Cloud 자원에서 발생하는 위협 감지Google Cloud 환경의 보안 컴플라이언스 규정 준수 및 유지ㅇ자원의 중앙 집중 방식의 가시성 및 제어 확보기업 전산 환경에서 어려운 일 하나는 운영 자산 목록을 최신상태로 관리하는 것입니다. 운영하는 서버 및 컴퓨터의 수량, 제품의 도입 시기, 업그레이드 시기 등을 파악하는 것입니다. 전산 환경의 규모가 크고, 많은 이기종 제품을 운영하고 있다면 이 업무는 1-2명이 해결할 수 있는 수준이 아닙니다. 운영 자산의 실제 목록은 정보보안에서도 매우 중요한 기본 자료입니다. 보안은 자산을 위협으로부터 보호하는 행위입니다. 그러므로 자산을 보호하려면 보호 대상을 먼저 목록화하고 개별 자원의 특성을 파악해야 합니다. 그 이후에 자산별 보안 취약점에 대응한다면 보안 정책을 수립하기 매우 용이합니다. Security Command Center는 Asset Inventory를 활용하여 사용자가 사용하는 자원 목록을 최신상태로 실시간에 가깝게 관리합니다. 자원은 Google Cloud에서 생성하거나 운영하는 모든 컴퓨팅 자원을 말합니다. VPC 네트워크, GCE(Google Compute Engine), 네트워크 로드 밸런서와 NAT를 위해 설정한 대표 IP 등이 모두 자원입니다. Security Command Center는 Google Cloud내에서 사용자가 생성한 자원을 유형별 또는 프로젝트별로 자동으로 구분하여 보여줍니다.[운영 자원 가시성 확보]예시 그림에서는 IP 주소인 Address 자원을 확인할 수 있습니다. 자원 이름, 자원 소유자, 생성 시간과 수정 시간을 필드에서 확인할 수 있습니다. 자원 유형별로 필드 구성이 다를 수 있습니다. 목록 우측 위를 클릭하여 필드 정보를 수정할 수 있으며, 자원별로 필드를 다르게 설정하거나 모든 자원에 일괄적으로 동일한 설정을 구성할 수 있습니다. 사용자가 자원을 새로 생성하거나 수정하는 경우에도 거의 실시간으로 변경 내역이 Asset Inventory에 반영됩니다. 개별 자원의 잘못된 구성 및 취약점 찾기사용자가 생성한 자원은 워크로드 실행, 데이터 저장 등 다양한 역할을 수행합니다. 하지만 올바른 구성을 갖지 않는 경우 보안 문제가 발생할 수 있습니다. Security Command Center는 위협 방지를 위해서 Security Health Analytics라는 보안 위협 탐지 기능을 제공합니다. 프리미엄 등급에서는 모든 취약점 탐지를 제공하지만 표준 등급에서는 위험도가 High인 항목만을 점검할 수 있습니다.Security Health Analytics의 개별 감지기는 Google Cloud에서 운영중인 자원의 위협을 스캔합니다. 스캔은 Security Command Center가 사용 설정된 후 약 1시간 후 시작되며 두 가지 모드(배치 모드, 실시간 모드)로 실행됩니다. 일괄 모드는 매일 2번 12시간 간격으로 자동으로 스캔이 실행되고 실시간 모드는 자원 구성 변경사항이 감지되는 경우 위협 방지 스캔을 실행합니다. API 접속에 사용하는 키가 90일 동안 변경되지 않았거나 HTTPS 대신 HTTP 로드 밸런서를 사용하거나, 가상머신에 인터넷 IP를 할당하는 등의 Google이 설정한 보안 취약점을 자동으로 점검하고 이를 관리자에게 알립니다. Security Health Analytics의 취약점 발견 항목 전체 목록은 이곳에서 확인할 수 있습니다.Cloud 자원의 취약점 외에도 Web Security Scanner를 사용하면 클라우드에서 운영하는 웹 애플리케이션의 취약점도 탐지할 수 있습니다. 표준 등급에서는 스캔 대상 URL을 사용자가 직접 등록해야 합니다. 등록후에 스캔 주기를 지정할 수 있습니다. 프리미엄등급에서는 1주일마다 스캔 대상 URL을 자동으로 점검한 후에 취약점 스캔까지 완료합니다. 클라우드 자원의 동작 중 위협 탐지클라우드 환경의 전체 자원 목록을 확보하고 개별 자원의 취약점을 탐지했습니다. 다음 단계로는 각 자원들이 동작하는 과정에서 발생하는 통신 로그 등을 기반으로 위협을 감지를 수행합니다. 이 기능은 컨테이너 위협 탐지(Container Threat Detection), 이벤트 위협 탐지(Event Threat Detection), 가상머신 위협 탐지(VM Threat Detection), 이상징후 탐지(Anomaly Detection)이
2025-04-16Last April we announced the general availability of Shielded VM—virtual machine instances that are hardened with a set of easily configurable security features to ensure that when your VM boots, it’s running a verified bootloader and kernel. To make it accessible to everyone, we offered Shielded VM at no additional charge.To continue improving the safety and security of our ecosystem, today we’re making Unified Extensible Firmware Interface (UEFI) and Shielded VM the default for everyone using Google Compute Engine—at no additional charge. This provides defense-in-depth hardening features to all supported VM instances, including protection from:Malicious guest system firmware, UEFI extensions, and driversPersistent boot and kernel compromise in the guest OSVM-based secret exfiltration and replay“Using Shielded VM to run our secure services on Google Cloud Platform has improved our security posture, while being quick and simple to implement,” said Michael Capicotto, Cloud Security Architect at Two Sigma. “Making this the default for Compute Engine is a great next step toward improving security for all.”What's newSince Shielded VM became generally available, we’ve continued to add support for common use cases based on your feedback and feature suggestions. Adoption across Google Cloud: In addition to making Shielded VM the default across Google Compute Engine, several VM-based Google Cloud services, including Cloud SQL, Google Kubernetes Engine, Kaggle, and Managed Service for Microsoft Active Directory, are now using Shielded VM as their underlying infrastructure.Migration support: Starting with version 4.5, Migrate for Compute Engine (formerly Velostrata) includes support for migration of UEFI-based VMs from on-prem to Shielded VM in Google Compute Engine.Security Command Center integration: Security Health Analytics findings now allow you to identify VM instances with Shielded VM support that don't have secure boot enabled, so you can enable it if possible.The power to chooseIn addition to the new features we’ve added, Shielded VMs now offer more flexibility around the operating system images you can use and how you get them. Support across multiple operating systems: For an extensive list of operating systems that support Shielded VM features, as well as which projects these can be found in, please see Google Compute Engine images.Marketplace for an open ecosystem: Shielded VM images are also available in the GCP Marketplace. These are brought to you in collaboration with Deep Learning VM, as well as our third-party partners at Center for Internet Security (CIS) and Server General. "Our goal is to help our customers to secure their data
2025-04-13