Security Command Center service tiersStay organized with collectionsSave and categorize content based on your preferences.
Security Command Center is offered in three service tiers: Standard, Premium, and
Enterprise. Each tier determines the features and services that are available to
you in Security Command Center. A short description of each service tier follows:
Standard. Basic security posture management for Google Cloud only. The
Standard tier can be activated at the project or organization level. Best for
Google Cloud environments with minimal security requirements.
Premium. Everything in Standard, plus security posture management, attack
paths, threat detection, and compliance monitoring for Google Cloud only. The
Premium tier can be activated at the project or organization level. Best for
Google Cloud customers who need pay-as-you-go billing.
Enterprise. Complete multi-cloud CNAPP security that
helps you to triage and remediate your most critical issues. Includes most of
the services that are in Premium. The Enterprise tier can only be activated at
the organization level. Best for helping to protect Google Cloud, AWS, and
Azure.
The Standard tier is offered at no additional charge, while the Premium and
Enterprise tiers have different pricing structures. For more information, seeSecurity Command Center pricing.
Managed vulnerability assessment scanning for Google Cloud that can automatically detect
the highest severity vulnerabilities and misconfigurations for your Google Cloud assets.
Compliance monitoring.
Security Health Analytics detectors map to the controls of common security benchmarks like NIST, HIPAA,
PCI-DSS, and CIS.
Custom scans.
Schedule and run custom scans on deployed Compute Engine, Google Kubernetes Engine, or
App Engine web applications that have public URLs and IP addresses and aren't behind
firewalls.
Managed scans.
Scan public web endpoints for vulnerabilities weekly, with scans configured and managed by
Security Command Center.
Virtual red teaming
Virtual red teaming, performed by runningAttack Path Simulations, helps you to
identify and prioritize vulnerability and misconfiguration findings by identifying the paths
that a potential attacker could take to reach your high-value resources.
CVEassessments are grouped by
their exploitability and potential impact. You can query findings by CVE ID.
Other vulnerability services
Anomaly Detection.2Identifies security anomalies for your projects and virtual machine (VM) instances, like
potential leaked credentials and cryptocurrency mining.
Container image vulnerability findings.
Automatically write findings to Security Command Center from Artifact Registry scans that detect
vulnerable container images deployed to specific assets.
GKE security posture dashboard findings(Preview).
View findings about Kubernetes workload security misconfigurations, actionable security
bulletins, and vulnerabilities in the container operating system or in language packages.
Model Armor.
Screen LLM prompts and responses for security and safety risks.
Chokepoints.
Identifies resources or resource groups where multiple attack paths converge.
Notebook Security Scanner(Preview).
Detect and resolve vulnerabilities in Python packages that are used in
Colab Enterprise notebooks.
Toxic combinations.
Detects groups of risks that, when they occur together in a particular pattern, create a path
to one or more of your high-value resources that a determined attacker could potentially use
to reach and compromise those resources.
VM Manager vulnerability reports
(Preview).2If youenable VM Manager, it
automatically writes findings from its vulnerability reports to Security Command Center.
Mandiant Attack Surface Management.
Discovers and analyzes your internet assets across environments, while continually monitoring
the external ecosystem for exploitable exposures.
Vulnerability Assessment for AWS.
Detects vulnerabilities in AWS resources, including software installed on Amazon EC2 instances
and in Elastic Container Registry (ECR) images.
Threat detection and response
Google Cloud Armor.2Protects Google Cloud deployments against threats such as distributed denial-of-service
(DDoS) attacks, cross-site scripting (XSS), and SQL injection (SQLi).
Sensitive Actions Service.
Detects when actions are taken in your Google Cloud organization, folders, and projects
that could be damaging to your business if they are taken by a malicious actor.
Correlated Threats(Preview).
Helps you make more informed decisions about security incidents. This feature combines related
threat findings together by using the security graph, helping you to prioritize and respond to
active threats.
Event Threat Detection.
Monitors Cloud Logging and Google Workspace, using threat intelligence, machine learning,
and other advanced methods to detect threats such as malware, cryptocurrency mining, and data
exfiltration.
Graph Search(Preview).
Query the security graph to identify potential security vulnerabilities that you want to
monitor in your environment.
Issues.
Identifies the most important security risks that Security Command Center has found in your cloud
environments. Issues are discovered using virtual red teaming, along with rule-based
detections that rely on the Security Command Center security graph.
Mandiant Threat Defense.
Rely on Mandiant experts to provide continual threat hunting to expose attacker activity
and reduce impact to your business.
Mandiant Threat Defense is not activated by default. For more information and pricing
details, contact your sales representative or Google Cloud partner.
Postures and policies
Binary Authorization.2Implement software supply-chain security measures when you develop and deploy container-based
applications. Monitor and limit the deployment of container images.
Policy Intelligence.
Provides tools that help you understand and manage your access policies to proactively
improve your security configuration.
Policy Intelligence provides some features to Google Cloud customers at no
charge, such as recommendations for basic roles and a limited number of queries per month.
Advanced features are available for Security Command Center Premium and Enterprise
users. For details, seePricing.
Compliance Manager.
Define, deploy, monitor, and audit controls and frameworks that are designed to help you meet the security
and compliance obligations for your Google Cloud environment.
Data security posture management (DSPM).
Evaluate, deploy, and audit data security frameworks and cloud controls to govern access and
use of sensitive data.
Security posture.
Define and deploy a security posture to monitor the security status of your Google Cloud
resources. Address posture drift and unauthorized changes to the posture. On the Enterprise
tier, you can alsomonitor your AWS
environment.
Customer-managed encryption keys (CMEK).
Use Cloud Key Management Service keys that you create to encrypt selected Security Command Center data. By default,
Security Command Center data is encrypted at rest with Google-owned and Google-managed encryption keys.
Data residency.
Controls that restrict the storage and processing of Security Command Center findings, mute rules,
continuous exports, and BigQuery exports to one of the data residency multi-regions
that Security Command Center supports.
AI Protection.
AI Protection helps you manage the security posture of your AI workloads by detecting threats
and helping you to mitigate risks to your AI asset inventory.
Privileged Access Manager.
Privileged Access Manager helps you control just-in-time, temporary privilege elevation for specific
principals and provides audit logs to track who had access to which resources, and when.
The following features are available with Security Command Center:
Multi-level and multi-party approvals(Preview).
Administrators can mandate more than one approval level per entitlement, allowing up to
two levels of sequential approvals for each entitlement.
Scope customization(Preview). Requesters can
customize the scope of their grant requests to include only the specific roles and
resources that they need within the scope of their entitlement.
Risk reports(Preview).
Risk reports help you understand the results of the attack path
simulations that Security Command Center runs. A risk report contains a high-level
overview, sample toxic combinations, and associated attack paths.
Assured Open Source Software.
Take advantage of the security and experience that Google applies to open source software by
incorporating the same packages that Google secures and uses into your own developer
workflows.
Audit Manager.
A compliance audit solution that evaluates your resources against select controls from
multiple compliance frameworks. Security Command Center Enterprise users get access to thePremium tierof Audit Manager at no extra cost.
Multicloud support.
Connect Security Command Center to other cloud providers to detect threats, vulnerabilities, and
misconfigurations. Assess attack exposure scores and attack paths on external cloud high-value
resources. Supported cloud providers: AWS, Azure.
Snyk Integration.
View and manage issues identified by Snyk as security findings.
Requires an organization-level activation.
This is a Google Cloud service that integrates with organization-level activations of
Security Command Center to provide findings. One or more features of this service might be priced
separately from Security Command Center.
Not activated by default. For more information and pricing details, contact your sales
representative or Google Cloud partner.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-12-15 UTC."],[],[]]