Assess risk at a glance

The Risksection in the Google Cloud console helps you to manage the highest profile risks in your cloud environment.

The Overviewpage serves as your first contact security dashboard, highlighting the highest priority risks in your cloud environments. You can view multiple domains in Overviewby selecting one of the following views:

All risk dashboard

The All riskdashboard surfaces the following high-priority security risks across your cloud environments:

  • Riskiest issues, which shows at-a-glance information for your top issues , including simplified attack paths or evidence diagrams. This panel is not available with project-level activations.

  • Recent Google Cloud threatsthat are active in your cloud environments.

  • High-impact, exploitable vulnerabilities, prioritized by the resources impacted by them.

The dashboard also displays your progress in Compliance, like NIST, HIPAA, PCI-DSS, and CIS, reported as a percentage of how many controls are passing.

In most cases you can interact with individual high-priority risks for a brief summary, continue on to a more detailed view of each risk, or view all risks of a specific type.

Vulnerabilities dashboard

The Vulnerabilitiesdashboard gives insights into virtual machines and containers with exploitable vulnerabilities across your cloud environments. The dashboard displays the following information:

  • Top common vulnerabilities and exploits. Displays a clickable quadrant heatmap to help you filter vulnerabilities by exploitability and impact (risk rating) . The number of unique resources affected, and the findings related to those resources are shown in a table after the heatmap. Each unique resource might have more than one finding.

    To reset the heatmap, click a heatmap cell again.

  • Most common critical exploitable vulnerabilities. A list of highly exploitable vulnerabilities found in your cloud environments, prioritized by the total number of unique resources impacted by them.

    Expand a CVE section to view its descriptions, which are findings related to the CVE and the resources they affect. Because different findings can affect the same resource, the sum of all resource counts in the expanded description might be greater than the unique resource count in the heading row.

  • Containers with exploitable vulnerabilities. A list of containers with exploitable vulnerabilities, where the vulnerability exploitation activity rating is available , confirmed , or wide and the risk rating is critical , based on the assessment of Google Threat Intelligence. The list is ordered by attack exposure score , then by largest number of impacted resources.

  • Latest compute vulnerabilities with known exploits. A list of Compute Engine virtual machine instances that have exploitable vulnerabilities with findings that belong to the OS_VULNERABILITY or SOFTWARE_VULNERABILITY category.

    From here you can check the following:

    • The attack exposure score of the exploit. Click the score to see the attack paths to your exposed high-value resources .
      • How many configured high-value resources have been exposed due to the vulnerability, that have a priority of HIGH , MEDIUM , or LOW .
      • The Exploit release date, which is when the vulnerability was announced.
      • The First available date, which is when an exploit was first observed.
      • The level of exploitability of the vulnerability.

Data dashboard

The Datadashboard ( Preview ) in the Google Cloud console lets you see how your organization's data aligns with your data security and compliance requirements.

The data map explorer on the data security dashboard shows the geographic locations where your data is stored and lets you filter information about your data by geographic location, how sensitive the data is, the associated project, and which Google Cloud services store the data. The circles on the data map represent the relative count of data resources and data resources with alerts in the region. For more information, see Data Security Posture Management overview .

Code dashboard

The Codedashboard shows code vulnerabilities in your cloud environments found by Snyk. To use it, you need to set up the Snyk integration .

You can also view code vulnerabilities in the Google Cloud console .

AI Security dashboard

The AI Securitydashboard ( Preview ) provides a high-level view of your AI security posture.

The dashboard displays the following sections:

  • Riskiest AI Issues: View top risks in your AI inventory, prioritized by the highest attack exposure scores . Click any issue to see details.
  • AI Inventory: Get an overview of projects with generative AI activity, models used, and datasets. Click nodes for details. If Sensitive Data Protection is enabled, the dashboard indicates if datasets contain sensitive data.
  • Findings: Assess and manage findings generated by AI security and data security policies.
  • Sensitive data in Vertex AI datasets: Assess and manage findings of sensitive data in Vertex AI datasets.
  • Model Armor Findings: View a graph of prompts and responses that are scanned by Model Armor, with detected issues such as prompt injection and sensitive data detection.

Identity dashboard

The Identitydashboard shows misconfiguration findings related to principal accounts ( identities ) that are misconfigured or are granted excessive or sensitive permissions.

Threats dashboard

The Threatsdashboard helps you review potentially harmful events in your Google Cloud resources in the past seven days. You can view findings in the following panels:

  • Top Threatspanel shows the following:

    • Threats by severityshows the number of threats in each severity level.
    • Threats by categoryshows the number of findings in each category across all projects.
  • Threats by projectpanel shows the number of findings for each project in your organization.

Create a Mobile Website
View Site in Mobile | Classic
Share by: