Security Command Center service tiersStay organized with collectionsSave and categorize content based on your preferences.
Security Command Center is offered in three service tiers: Standard, Premium, and
Enterprise. Each tier determines the features and services that are available to
you in Security Command Center. A short description of each service tier follows:
Standard-legacy. Supports basic security and compliance posture
management for Google Cloud only. The Standard-legacy tier might
bemigrated to the Standard tierin some organizations.
Standard. Supports basic security and compliance posture management for
Google Cloud only. The Standard tier can be activated at the organization
level. Best for Google Cloud environments with minimal security requirements.
Premium. Everything in Standard, plus advanced security and compliance
posture management, attack paths, threat detection, and compliance monitoring
for Google Cloud only. The Premium tier can be activated at the project or
organization level. Premium is offered in two billing modalities:
Pay-as-you-go for customers who want flexibility.
Subscription for customers with more predictable needs.
Enterprise. Complete multi-cloud CNAPP security that
helps you to triage and remediate your most critical issues. Includes most of
the services that are in Premium. The Enterprise tier can only be activated at
the organization level. Best for helping to protect Google Cloud, AWS, and
Azure.
The Standard tier is offered at no additional charge, while the Premium and
Enterprise tiers have different pricing structures. For more information, seeSecurity Command Center pricing.
Anomaly Detection.1Identifies security anomalies for your projects and virtual machine (VM) instances, like
potential leaked credentials and cryptocurrency mining.
Artifact Registry vulnerability assessment.
Automatically write findings to Security Command Center from Artifact Registry scans that detect
vulnerable container images deployed to specific assets.
Vulnerability Assessment for Google Cloud(Preview).
Helps you discover critical and high severity software vulnerabilities in your
Compute Engine VM instances without installing agents. A limited set of capabilities
are available on the Standard tier.
Notebook Security Scanner(Preview).
Detect and resolve vulnerabilities in Python packages that are used in
Colab Enterprise notebooks.
VM Manager vulnerability reports
(Preview).1If youenable VM Manager, it
automatically writes findings from its vulnerability reports to Security Command Center.
Vulnerability Assessment for AWS.
Detects vulnerabilities in AWS resources, including software installed on Amazon EC2 instances
and in Elastic Container Registry (ECR) images.
Managed vulnerability assessment scanning for Google Cloud that can automatically detect
the highest severity vulnerabilities and misconfigurations for your Google Cloud assets.
Not supported with new Standard tier activations.
A subset of capabilities are available
in the Standard tier for organizations that were migrated from the Standard-legacy tier.
Compliance monitoring.
Security Health Analytics detectors map to the controls of common security benchmarks like NIST, HIPAA,
PCI-DSS, and CIS.
Custom scans.
Schedule and run custom scans on deployed Compute Engine, Google Kubernetes Engine, or
App Engine web applications that have public URLs and IP addresses and aren't behind
firewalls.
Managed scans.
Scan public web endpoints for vulnerabilities weekly, with scans configured and managed by
Security Command Center.
Virtual red teaming
Attack Path Simulations.
Helps you to identify and prioritize vulnerability and misconfiguration findings by identifying the paths
that a potential attacker could take to reach your high-value resources.
Chokepoints.
Identifies resources or resource groups where multiple attack paths converge.
Issues.
Identifies the most important security risks that Security Command Center has found in your cloud
environments. Issues are discovered using virtual red teaming, along with rule-based
detections that rely on the Security Command Center security graph.
Risk reports(Preview).
Risk reports help you understand the results of the attack path
simulations that Security Command Center runs. A risk report contains a high-level
overview, sample toxic combinations, and associated attack paths.
Toxic combinations.
Detects groups of risks that, when they occur together in a particular pattern, create a path
to one or more of your high-value resources that a determined attacker could potentially use
to reach and compromise those resources.
Other vulnerability services
GKE security posture dashboard findings(Preview).
View findings about Kubernetes workload security misconfigurations, actionable security
bulletins, and vulnerabilities in the container operating system or in language packages.
Model Armor.
Screen LLM prompts and responses for security and safety risks.
Model Armor provides a number of tokens per month at no
charge to all Google Cloud customers. For more information, seePricing.
Model Armor findings are published to Security Command Center on the Premium and Enterprise tiers.
Mandiant CVE assessments(Preview).
Findings are enriched withCVEassessments from Mandiant threat intelligence analysts, including the CVE exploitability
and potential impact. You can query findings by CVE ID. A limited set of
capabilities are available in the Standard tier.
Mandiant Attack Surface Management.
Discovers and analyzes your internet assets across environments, while continually monitoring
the external ecosystem for exploitable exposures.
Binary Authorization.1Implement software supply-chain security measures when you develop and deploy container-based
applications. Monitor and limit the deployment of container images.
Policy Intelligence.
Provides tools that help you understand and manage your access policies to proactively
improve your security configuration.
Policy Intelligence provides some features to Google Cloud customers at no
charge, such as recommendations for basic roles and a limited number of queries per month.
Advanced features are available for Security Command Center Premium and Enterprise
users. For details, seePricing.
Compliance Manager.
Define, deploy, monitor, and audit controls and frameworks that are designed to help you meet the security
and compliance obligations for your Google Cloud environment. A limited set of capabilities
are available on the Standard tier.
Data security posture management (DSPM).
Evaluate, deploy, and audit data security frameworks and cloud controls to govern access and
use of sensitive data. A limited set of capabilities are available in the Standard tier.
AI Protection.
AI Protection helps you manage the security posture of your AI workloads by detecting threats
and helping you to mitigate risks to your AI asset inventory. A limited set of capabilities
are available on the Standard tier.
Security posture.
Define and deploy a security posture to monitor the security status of your Google Cloud
resources. Address posture drift and unauthorized changes to the posture. On the Enterprise
tier, you can alsomonitor your AWS
environment.
Google Cloud Armor.1Protects Google Cloud deployments against threats such as distributed denial-of-service
(DDoS) attacks, cross-site scripting (XSS), and SQL injection (SQLi).
Sensitive Actions Service.
Detects when actions are taken in your Google Cloud organization, folders, and projects
that could be damaging to your business if they are taken by a malicious actor.
Correlated Threats(Preview).
Helps you make more informed decisions about security incidents. This feature combines related
threat findings together by using the security graph, helping you to prioritize and respond to
active threats.
Event Threat Detection.
Monitors Cloud Logging and Google Workspace, using threat intelligence, machine learning,
and other advanced methods to detect threats such as malware, cryptocurrency mining, and data
exfiltration.
Mandiant Threat Defense.
Rely on Mandiant experts to provide continual threat hunting to expose attacker activity
and reduce impact to your business.
Mandiant Threat Defense is not activated by default. For more information and pricing
details, contact your sales representative or Google Cloud partner.
Data management
Data residency and encryption
Customer-managed encryption keys (CMEK).
Use Cloud Key Management Service keys that you create to encrypt selected Security Command Center data. By default,
Security Command Center data is encrypted at rest with Google-owned and Google-managed encryption keys.
Data residency.
Controls that restrict the storage and processing of Security Command Center findings, mute rules,
continuous exports, and BigQuery exports to one of the data residency multi-regions
that Security Command Center supports.
Privileged Access Manager.
Privileged Access Manager helps you control just-in-time, temporary privilege elevation for specific
principals and provides audit logs to track who had access to which resources, and when.
The following features are available with Security Command Center:
Multi-level and multi-party approvals(Preview).
Administrators can mandate more than one approval level per entitlement, allowing up to
two levels of sequential approvals for each entitlement.
Scope customization(Preview). Requesters can
customize the scope of their grant requests to include only the specific roles and
resources that they need within the scope of their entitlement.
Assured Open Source Software.
Take advantage of the security and experience that Google applies to open source software by
incorporating the same packages that Google secures and uses into your own developer
workflows.
Audit Manager.
A compliance audit solution that evaluates your resources against select controls from
multiple compliance frameworks. Security Command Center Enterprise users get access to thePremium tierof Audit Manager at no extra cost.
Multicloud support.
Connect Security Command Center to other cloud providers to detect threats, vulnerabilities, and
misconfigurations. Assess attack exposure scores and attack paths on external cloud high-value
resources. Supported cloud providers: AWS, Azure.
Snyk Integration.
View and manage issues identified by Snyk as security findings.
This is a Google Cloud service that integrates with organization-level activations of
Security Command Center to provide findings. One or more features of this service might be priced
separately from Security Command Center.
Requires an organization-level activation.
Not activated by default. For more information and pricing details, contact your sales
representative or Google Cloud partner.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2026-02-20 UTC."],[],[]]