Security Command Center 的 CIEM 功能可全面了解身份和访问权限配置的安全性。具体而言,以下 CIEM 功能可帮助您识别错误配置并遵循最小权限原则:
检测在多个云平台(包括 Google Cloud、Amazon Web Services (AWS) 和 Microsoft Azure [预览版])上部署的资源中潜在的身份和访问权限配置错误。
识别漏洞发现结果,以便深入了解在 Google Cloud、AWS 和 Microsoft Azure(预览版)环境中授予给主账号的角色。
这包括来自其他身份提供方(如 Entra ID (Azure AD)、Okta 和本地 Active Directory)的联合身份,适用于 Google Cloud和 AWS IAM Identity Center。
有关如何修正错误配置的指南,例如从拥有过多权限的主账号中移除权限。
案例管理:使用 Security Command Center Enterprise 或其他工单管理系统中的案例,高效跟踪错误配置修复工作。
使用 CIEM 管理身份和访问权限安全问题
以下部分介绍了可帮助您管理身份和访问权限错误配置的 CIEM 功能。
快速访问身份和访问权限发现结果
安全问题通常是由于未检测到身份和访问权限配置错误而引起的,例如高权限的主账号、休眠身份、未轮换的服务账号密钥以及缺少多重身份验证。CIEM 会生成检测结果,帮助您了解云环境中潜在的身份和访问安全问题。许多不同的 Security Command Center 检测服务(例如 IAM Recommender、Security Health Analytics 和 CIEM)都会生成身份和访问权限发现结果,这些结果被视为 Security Command Center 的 CIEM 功能的一部分。例如,CIEM 检测服务本身会针对 AWS 和 Microsoft Azure 生成一部分身份和访问权限发现结果(预览版),提醒您注意高权限角色、群组和用户。
借助 CIEM,Security Command Center 会在 风险概览页面的身份和访问权限发现结果卡片上,按类别显示 Google Cloud、AWS 和 Microsoft Azure(预览版)的身份和访问权限发现结果。此卡片可让您快速访问 Security Command Center 检测结果页面上经过过滤的身份和访问权限配置错误检测结果视图。在详细视图中,每项发现都会提供检测到的完整范围,以及有关如何解决错误配置以避免潜在攻击途径的指导。
CIEM 可提供对身份和访问权限配置安全性的更精细视图,方法是深入了解来自其他身份提供方(例如 Entra ID [Azure AD]、Okta 和本地 Active Directory)的联合身份的 Google Cloud 和 AWS 权限。CIEM 与 IAM Recommender 集成,可显示在Google Cloud 资源上拥有过多权限的角色所关联的联合身份。Cloud Infrastructure Entitlement Management 还可以与 AWS IAM Identity Center 搭配使用,以揭示 AWS 资源上联合身份中的漏洞。您可以直接在 Security Command Center 的发现结果页面中查看违规的访问权限授予情况和建议的补救措施。如需详细了解检测结果中的违规访问权限授予,请参阅违规访问权限授予。
此外, Google Cloud 借助 IAM,您可以在 Google Cloud 控制台的 IAM 页面上进一步调查来自其他身份提供方的主账号的权限。
[[["易于理解","easyToUnderstand","thumb-up"],["解决了我的问题","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["很难理解","hardToUnderstand","thumb-down"],["信息或示例代码不正确","incorrectInformationOrSampleCode","thumb-down"],["没有我需要的信息/示例","missingTheInformationSamplesINeed","thumb-down"],["翻译问题","translationIssue","thumb-down"],["其他","otherDown","thumb-down"]],["最后更新时间 (UTC):2025-08-01。"],[],[],null,["| Enterprise [service tier](/security-command-center/docs/service-tiers) (not available if [data residency controls](docs/data-residency-support) are enabled)\n\nWith Security Command Center's Cloud Infrastructure Entitlement Management (CIEM) capabilities, you can\nmanage which identities have access to which resources in your deployments on\nmultiple cloud platforms and mitigate potential\nvulnerabilities that result from misconfigurations.\n\nSecurity Command Center's CIEM capabilities provide a comprehensive\nview of the security of your identity and access configuration. Specifically,\nthe following CIEM features help you identify misconfigurations\nand enforce the principle of least privilege:\n\n- Detection of potential identity and access misconfigurations in your deployments on multiple cloud platforms, including Google Cloud, Amazon Web Services (AWS), and Microsoft Azure ([Preview](/products#product-launch-stages)).\n- Identification of vulnerability findings that provide insight into the roles that are granted to principals in your Google Cloud, AWS, and Microsoft Azure ([Preview](/products#product-launch-stages)) environments. This includes federated identities from other identity providers---like Entra ID (Azure AD), Okta, and on-premises Active Directory---for Google Cloud and AWS IAM Identity Center.\n- Guidance on how to remediate misconfigurations, such as removing permissions from a principal with excess permissions.\n- Case management to efficiently track misconfiguration remediation efforts using cases in Security Command Center Enterprise or other ticket management systems.\n\nManage identity and access security issues with CIEM\n\nThe following sections describe the CIEM capabilities\nthat help you manage identity and access misconfigurations.\n\nQuick access to identity and access findings\n\nSecurity issues often arise due to undetected identity and access\nmisconfigurations such as highly privileged principals, dormant identities,\nunrotated service account keys, and a lack of multifactor authentication.\nCIEM generates findings that help alert you to\npotential identity and access security issues across your cloud environments.\nMany different Security Command Center detection services (such as IAM recommender,\nSecurity Health Analytics, and CIEM) produce the identity and access findings\nthat are considered part of Security Command Center's CIEM capabilities. For\nexample, the CIEM detection service itself produces a subset of\nidentity and access findings for AWS and Microsoft Azure ([Preview](/products#product-launch-stages))\nthat alert you to highly privileged roles, groups, and users.\n\nWith CIEM, Security Command Center presents Google Cloud, AWS, and\nMicrosoft Azure ([Preview](/products#product-launch-stages))\nidentity and access findings categorically on the **Identity and access\nfindings** card of the Security Command Center **Risk Overview** page. This card\nprovides quick access to a filtered view of identity and access misconfiguration\nfindings on the Security Command Center **Findings** page. When viewed in detail,\neach finding provides a full scope of what was detected as well as guidance on\nhow to address the misconfigurations to avoid potential attack vectors.\n\nTo learn how to investigate identity and access findings to understand your\nidentity and access security, see\n[Investigate identity and access findings](/security-command-center/docs/ciem-identity-access-findings).\n\nRemediation guidance and tracking for identity and access findings\n\nSecurity teams working with multicloud infrastructure often struggle to\nremediate identity and access misconfigurations at scale. Security Command Center\nprovides you with remediation guidance, as well as security operations\ncapabilities, such as case management and response playbooks.\n\nTo learn more about reviewing findings cases, see\n[Review cases for identity and access issues](/security-command-center/docs/ciem-identity-access-cases).\n\nDiscovery of federated identities' permissions\n\nCIEM helps to provide a more granular view of the security of\nyour identity and\naccess configurations by providing insight into the Google Cloud and AWS\npermissions of federated identities from other identity providers, such as Entra\nID (Azure AD), Okta, and on-premises Active Directory. CIEM integrates with IAM recommender to\nexpose federated identities with roles that have excess permissions on your\nGoogle Cloud resources. Cloud Infrastructure Entitlement Management can also be used with AWS IAM Identity Center to expose vulnerabilities in federated identities on AWS resources. You can view offending access grants and\nrecommended remediations directly from the Security Command Center **Findings** page.\nFor more information on offending access grants in findings, see\n[Offending access grants](/security-command-center/docs/ciem-identity-access-findings#offending-access).\n\nIn addition, Google Cloud IAM lets you further investigate\nthe permissions of principals from other identity providers on the\n[IAM page](https://console.cloud.google.com/iam-admin) in the Google Cloud console.\n\nWhat's next\n\n- Learn how to [enable the CIEM detection service for AWS findings](/security-command-center/docs/ciem-enable-service).\n- Learn how to [enable the CIEM detection service for Microsoft Azure findings](/security-command-center/docs/ciem-enable-service).\n- Learn how to [investigate identity and access findings](/security-command-center/docs/ciem-identity-access-findings).\n- Learn how to [review cases for identity and access issues](/security-command-center/docs/ciem-identity-access-cases).\n- Learn more about the [IAM recommender functionality](/policy-intelligence/docs/role-recommendations-overview) that powers CIEM."]]