Link a Google SecOps instance to Google Cloud services
A Google Security Operations instance depends on Google Cloud services for certain key capabilities, such as authentication.
This document explains how to configure your instance to link to these services, whether you're setting up a new deployment or migrating an existing Google SecOps instance.
Before you begin
Before you configure a Google SecOps instance with Google Cloud services, you must do the following:
-
Verify permissions. Ensure you have the necessary permissions to complete the steps in this document. For information about required permissions for each phase of the onboarding process, see Required roles and permissions .
-
Choose your project setup: You can either create a new Google Cloud project for your Google SecOps instance or link it to an existing Google Cloud project.
To create a new Google Cloud project and enable the Chronicle API, follow the steps in Create a Google Cloud project .
-
Configure an SSO provider for the Google SecOps instance: You can use Cloud Identity, Google Workspace, or a third-party identity provider (IdP), as follows:
-
If you use a third-party IdP, perform the steps in
Configure a third-party identity provider for Google SecOps .
-
If you use Cloud Identity or Google Workspace, perform the steps in
Configure a Google Cloud identity provider for Google SecOps .
-
To link a Google SecOps instance created for a Manage Security Services Provider (MSSP), contact your Google SecOps representative. Setup requires assistance from a Google SecOps representative.
After linking a Google SecOps instance to a Google Cloud project, the Google SecOps instance is now ready for further configuration. You can now examine ingested data and monitor the project for potential security threats.
Configure a new Google SecOps instance
Linking your new instance to a project enables authentication and monitoring features, including:
-
Cloud Identity integration for accessing a range of Google Cloud services, such as authentication, Identity and Access Management, Cloud Monitoring, and Cloud Audit Logs.
-
IAM and Workforce Identity Federation support for authenticating with your existing third-party IdP.
To link a Google SecOps instance to a Google Cloud project, perform these steps:
-
After your organization signs the Google SecOps customer contract, the onboarding SME receives an onboarding invitation email with an activation link. The activation link is valid for one-time use only.
In the onboarding invitation email, click the Go to Google Cloudactivation link to open the Link SecOps to a projectpage.
-
Click Select a projectto open the Select a resourcepage.
-
On the Select a resourcepage, select a Google Cloud project to link your new Google SecOps instance. There are two options:
-
Option 1: Create a new Google Cloud project:
Click New Project, and follow the steps described in Create a Google Cloud project .
-
Option 2: Select an existing projectfrom the list:
Follow the steps described in Select an existing project .
-
-
After you select a project, the system enables the Add contactsbutton, and the Add essential contactssection displays the Essential contactstable. This table shows notification Categoriesand the Emailaddress of the contact assigned to each.
Assign a contact person to at least the following four mandatory notification categories: technical, security, legal, and billing.
Assign a contact to one or more notification categories as follows:
-
To open the Edit contactwindow, click Add contactor click edit Editin a notification category with an existing contact.
-
Enter the contact person's Emailaddress, and select one or more notification Categories.
-
Click Save.
-
-
Click Next.
The system checks whether the Chronicle API is enabled. If enabled, the Onboardingpage displays the pre-filled onboarding information and runs the deployment process. This process can take up to 15 minutes to complete.
When the deployment completes successfully, you receive a notification. If the deployment fails, contact Google SecOps Support .
-
Verify that the deployment is correct as follows:
-
To view instance information, go to https://console.cloud.google.com/security/chronicle/settings.
-
To update any information, contact Google SecOps Support .
-
Select an existing project
-
On the Select a resourcepage, select your Organizationfrom the list.
The page displays a list of the Google Cloud projects and folders.
-
These belong to the same organization as the Google SecOps instance, and they have the same billing account.
-
If a project or folder has a warning Warningicon next to it, you cannot select it. Hold the pointer over the icon to view the reason, for example: missing permissions or billing mismatch.
-
-
Select a project based on the following criteria:
-
Criteria for linking an instance to a Google Cloud project:
-
The Google Cloud project must not already be linked to another Google SecOps instance.
-
You have the required IAM permissions to access and work with the project, see Permissions to add a Google Cloud project .
-
For a compliance controlled tenant (instance), the project must be in an Assured Workloads folder. See Workforce Identity Federation for details.
A compliance controlled tenant (instance) conforms to one of the following compliance control standards: FedRAMP, FedRAMP_MODERATE, HIPAA, PCI_DSS, FedRAMP_HIGH, IL4, IL5, CMEK_V1, or DRZ_ADVANCED.
-
-
To select a Google Cloud project for a compliance controlled tenant (instance):
- Select an Assured Workloads folder to open it.
- Inside the Assured Workloads folder, click the name of a Google Cloud project to open the Link SecOps to a projectpage.
- Complete the configuration described in Configure the IdP .
-
To select a Google Cloud project for a non-compliance controlled tenant (instance):
-
Click the name of a valid Google Cloud project to open the Link SecOps to a projectpage.
-
On the Link SecOps to a projectpage, select a different project, if needed. To do so, you click the project to display the Select a resourcepage again.
-
-
-
Click Nextto link your Google SecOps instance to the selected project, and open the Deploymentpage.
The Deploymentpage displays the final details of your instance and service and requires your consent before performing the final ddx. The page consists of sections displaying pre-filled, non-editable fields. Only a Google representative can change these details.
Review the details in each of the following sections. Click Nextto move to the next section:
-
Instance details
The page displays instance details set in your contract, for example company, region, package tier, and data retention duration.
Click Nextto display the next section.
-
Review service account
The page displays details of the service account to be created.
Click Nextto display the next section.
-
Configure single sign-on (SSO)
Choose a configured SSO provider. Select one of the following options based on the identity provider you use to manage user and group access to Google SecOps:
-
Google Cloud Identity:
Select this if you are using Cloud Identity or Google Workspace.
-
Workforce Identity Federation:
If you are using a third-party identity provider, select your workforce providerfrom the list.
If you don't see your identity provider listed, configure your provider, and then select your provider from the list. For details, see Configure a third-party identity provider .
Click Nextto display the next section.
-
-
Terms of service
- Select the I agree to...checkbox to agree to the terms.
- Click Start setupto deploy your Google SecOps instance, according to the displayed details.
-
Migrate an existing Google SecOps instance
To migrate an existing Google SecOps instance, link it to a Google Cloud project, migrate legacy authentication to Google Cloud, and use IAM for feature access control, follow the Migrate legacy SIEM Infra to Google Cloud guide.
Change SSO configuration
The following sections describe how to change identity providers:
- Change the third-party identity provider
- Migrate from a third-party identity provider to Cloud Identity
Change the third-party identity provider
-
Set up the new third-party identity provider and workforce identity pool .
-
In Google SecOps, under Settings> SOAR settings> Advanced> IDP group mapping, change the IdP group mapping to reference groups in the new identity provider.
Update SSO settings
Complete the following steps to change the SSO configuration for Google SecOps:
-
Open the Google Cloud console, and then select the Google Cloud project that is bound to Google SecOps.
-
Go to Security > Google SecOps.
-
On the Overviewpage, click the Single Sign-Ontab. This page displays the IdPs you configured when Configuring a third-party identity provider for Google SecOps .
-
Use the Single Sign-Onmenu to change SSO providers.
-
Right-click the Test SSO setuplink, and then open a private or incognito window.
- If you see a login screen, then SSO setup is successful. Continue with the next step.
- If you don't see a login screen, check the configuration of the third-party identity provider. See Configure a third-party identity provider for Google SecOps .
-
Return to Google Cloud console, click the Security > Google SecOps > Overviewpage, and then click the Single Sign-Ontab.
-
Click Saveat the bottom of the page to update the new provider.
-
Verify that you can sign in to Google SecOps.
Migrate from third-party identity provider to Cloud Identity
Complete the following steps to change the SSO configuration from using a third-party identity provider to Google Cloud Identity:
- Make sure you configure either Cloud Identity or Google Workspace as the identity provider.
- Grant the predefined Chronicle IAM roles and custom roles to users and groups in the Google SecOps-bound project.
- Grant the Chronicle SOAR Adminrole to the relevant users or groups.
-
In Google SecOps, under Settings> SOAR settings> Advanced> IDP group mapping, add the Chronicle SOAR Admin. For more information, see IdP group mapping .
-
Open the Google Cloud console, and then select the Google Cloud project that is bound to Google SecOps.
-
Go to Security > Chronicle SecOps.
-
On the Overviewpage, click the Single Sign-Ontab. This page displays the IdPs you configured when Configuring a third-party identity provider for Google SecOps .
-
Select the Google Cloud Identitycheckbox.
-
Right-click the Test SSO setuplink, and then open a private or incognito window.
- If you see a login screen, then SSO setup is successful. Continue with the next step.
- If you don't see a login screen, check the configuration of the identity provider.
-
Return to Google Cloud console, and then click Security > Chronicle SecOps> Overviewpage > Single Sign-Ontab.
-
Click Saveat the bottom of the page to update the new provider.
-
Verify that you can sign in to Google SecOps.
Need more help? Get answers from Community members and Google SecOps professionals.

