Some Security Command Center features—detection services and finding categories—require access to logs, data, resources, or even other services outside of the scope of a single project, so are not available with project-level activations.
Many such features can be enabled by activating the Standard tier of Security Command Center (Security Command Center Standard) in the parent organization. However, a few of the listed features are not available at all with project-level activations.
Activating Security Command Center Standard, which is free of charge , enables the Standard-tier features for your entire organization, including all projects.
The following sections list the Security Command Center services and finding categories that require organization-level activations by service tier.
Features you can enable by activating the Standard tier in the parent organization
This section lists the features that you can enable for a project-level activation of Security Command Center by activating Security Command Center Standard in the parent organization.
Security Health Analytics findings
To enable the following Standard-tier finding categories for a project-level activation of Security Command Center Premium, activate Security Command Center Standard in the parent organization, which enables the finding for all projects in the organization:
-
MFA not enforced
-
Public log bucket
You can enable the following Premium-tier finding categories in project-level activations of Security Command Center Premium by activating Security Command Center Standard in the parent organization:
-
Audit config not monitored
-
Bucket IAM not monitored
-
Cluster private Google access disabled
-
CUSTOM_ORG_POLICY_VIOLATION
-
Custom role not monitored
-
Default network
-
DNS logging disabled
-
Egress deny rule not set
-
Firewall not monitored
-
HTTP load balancer
-
KMS project has owner
-
Legacy network
-
Locked retention policy not set
-
Log not exported
-
Network not monitored
-
Object versioning disabled
-
Org policy Confidential VM policy
-
Org policy location restriction
-
OS login disabled
-
Owner not monitored
-
Pod security policy disabled
-
Route not monitored
-
SQL instance not monitored
-
Too many KMS users
-
Weak SSL policy
For the complete list of Security Health Analytics findings, see Vulnerabilities findings .
Event Threat Detection findings
You can enable the following Premium-tier finding categories in project-level activations of Security Command Center Premium by activating Security Command Center Standard in the parent organization:
-
Exfiltration: BigQuery data extraction
-
Exfiltration: CloudSQL data exfiltration
For a complete list of Event Threat Detection finding categories, see Event Threat Detection rules .
Integrated Google Cloud services
To enable the publication of findings from the following integrated Google Cloud services in a project-level activation of Security Command Center Premium, activate Security Command Center Standard in the parent organization, which enables the services for all projects in the organization:
You can enable the publication of findings from the following integrated Premium-tier Google Cloud service in project-level Premium-tier activations by activating Security Command Center Standard in the parent organization:
Integrations with third party services
You can enable the publication of findings from third-party services in project-level activations by activating Security Command Center Standard in the parent organization.
Features unavailable with project-level Premium-tier activations
Features listed in this section are Premium-tier features that require an organization-level activation of Security Command Center Premium. These features are not available with project-level Premium-tier activations.
Security Health Analytics finding categories unavailable with project-level activations
The following Security Health Analytics findings require organization-level activations of Security Command Center Premium:
-
Audit logging disabled
-
KMS role separation
-
Redis role used on org
-
Service account role separation
For the complete list of Security Health Analytics findings, see Vulnerabilities findings .
Event Threat Detection finding categories unavailable with project-level activations
The following Event Threat Detection findings require organization-level activations of Security Command Center Premium:
-
Defense evasion: modify VPC service control
-
Initial access: account disabled hijacked
-
Initial access: disabled password leak
-
Initial access: government based attack
-
Initial access: suspicious login blocked
-
Persistence: new geography
-
Persistence: new user agent
-
Persistence: SSO enablement toggle
-
Persistence: SSO settings changed
-
Persistence: strong authentication disabled
-
Persistence: two step verification disabled
-
Privilege escalation: external member added to privileged group
-
Privilege escalation: privileged group opened to public
-
Privilege escalation: sensitive role granted to hybrid group
-
Privilege escalation: suspicious cross-project permission use
-
Privilege escalation: suspicious token generation
For a complete list of Event Threat Detection finding categories, see Event Threat Detection rules .
Sensitive Actions Service finding categories unavailable with project-level activations
The following Sensitive Actions Service findings require organization-level activations of Security Command Center Premium:
-
Defense Evasion: Organization Policy Changed
-
Defense Evasion: Remove Billing Admin
-
Persistence: Add Sensitive Role
For a complete list of Sensitive Actions Service finding categories, see Sensitive Actions Service findings .
Attack path simulations
Attack path simulations, a Premium-tier feature, are not available with project-level activations of Security Command Center. Attack path simulations generate attack exposure scores and attack paths for vulnerability and misconfiguration findings.
Security posture
Security posture management, a Premium-tier feature, isn't available with project-level activations of Security Command Center. The security posture service lets you define, assess, and monitor the overall status of your security in Google Cloud.