Feature availability with project-level activations

Some Security Command Center features—detection services and finding categories—require access to logs, data, resources, or even other services outside of the scope of a single project, so are not available with project-level activations.

Many such features can be enabled by activating the Standard tier of Security Command Center (Security Command Center Standard) in the parent organization. However, a few of the listed features are not available at all with project-level activations.

Activating Security Command Center Standard, which is free of charge , enables the Standard-tier features for your entire organization, including all projects.

The following sections list the Security Command Center services and finding categories that require organization-level activations by service tier.

Features you can enable by activating the Standard tier in the parent organization

This section lists the features that you can enable for a project-level activation of Security Command Center by activating Security Command Center Standard in the parent organization.

Security Health Analytics findings

To enable the following Standard-tier finding categories for a project-level activation of Security Command Center Premium, activate Security Command Center Standard in the parent organization, which enables the finding for all projects in the organization:

  • MFA not enforced
  • Public log bucket

You can enable the following Premium-tier finding categories in project-level activations of Security Command Center Premium by activating Security Command Center Standard in the parent organization:

  • Audit config not monitored
  • Bucket IAM not monitored
  • Cluster private Google access disabled
  • CUSTOM_ORG_POLICY_VIOLATION
  • Custom role not monitored
  • Default network
  • DNS logging disabled
  • Egress deny rule not set
  • Firewall not monitored
  • HTTP load balancer
  • KMS project has owner
  • Legacy network
  • Locked retention policy not set
  • Log not exported
  • Network not monitored
  • Object versioning disabled
  • Org policy Confidential VM policy
  • Org policy location restriction
  • OS login disabled
  • Owner not monitored
  • Pod security policy disabled
  • Route not monitored
  • SQL instance not monitored
  • Too many KMS users
  • Weak SSL policy

For the complete list of Security Health Analytics findings, see Vulnerabilities findings .

Event Threat Detection findings

You can enable the following Premium-tier finding categories in project-level activations of Security Command Center Premium by activating Security Command Center Standard in the parent organization:

  • Exfiltration: BigQuery data extraction
  • Exfiltration: CloudSQL data exfiltration

For a complete list of Event Threat Detection finding categories, see Event Threat Detection rules .

Integrated Google Cloud services

To enable the publication of findings from the following integrated Google Cloud services in a project-level activation of Security Command Center Premium, activate Security Command Center Standard in the parent organization, which enables the services for all projects in the organization:

You can enable the publication of findings from the following integrated Premium-tier Google Cloud service in project-level Premium-tier activations by activating Security Command Center Standard in the parent organization:

Integrations with third party services

You can enable the publication of findings from third-party services in project-level activations by activating Security Command Center Standard in the parent organization.

Features unavailable with project-level Premium-tier activations

Features listed in this section are Premium-tier features that require an organization-level activation of Security Command Center Premium. These features are not available with project-level Premium-tier activations.

Security Health Analytics finding categories unavailable with project-level activations

The following Security Health Analytics findings require organization-level activations of Security Command Center Premium:

  • Audit logging disabled
  • KMS role separation
  • Redis role used on org
  • Service account role separation

For the complete list of Security Health Analytics findings, see Vulnerabilities findings .

Event Threat Detection finding categories unavailable with project-level activations

The following Event Threat Detection findings require organization-level activations of Security Command Center Premium:

  • Defense evasion: modify VPC service control
  • Initial access: account disabled hijacked
  • Initial access: disabled password leak
  • Initial access: government based attack
  • Initial access: suspicious login blocked
  • Persistence: new geography
  • Persistence: new user agent
  • Persistence: SSO enablement toggle
  • Persistence: SSO settings changed
  • Persistence: strong authentication disabled
  • Persistence: two step verification disabled
  • Privilege escalation: external member added to privileged group
  • Privilege escalation: privileged group opened to public
  • Privilege escalation: sensitive role granted to hybrid group
  • Privilege escalation: suspicious cross-project permission use
  • Privilege escalation: suspicious token generation

For a complete list of Event Threat Detection finding categories, see Event Threat Detection rules .

Sensitive Actions Service finding categories unavailable with project-level activations

The following Sensitive Actions Service findings require organization-level activations of Security Command Center Premium:

  • Defense Evasion: Organization Policy Changed
  • Defense Evasion: Remove Billing Admin
  • Persistence: Add Sensitive Role

For a complete list of Sensitive Actions Service finding categories, see Sensitive Actions Service findings .

Attack path simulations

Attack path simulations, a Premium-tier feature, are not available with project-level activations of Security Command Center. Attack path simulations generate attack exposure scores and attack paths for vulnerability and misconfiguration findings.

Security posture

Security posture management, a Premium-tier feature, isn't available with project-level activations of Security Command Center. The security posture service lets you define, assess, and monitor the overall status of your security in Google Cloud.

Create a Mobile Website
View Site in Mobile | Classic
Share by: