Tetap teratur dengan koleksi
Simpan dan kategorikan konten berdasarkan preferensi Anda.
Security Command Center adalah solusi pengelolaan risiko berbasis cloud yang membantu profesional keamanan mencegah, mendeteksi, dan merespons masalah keamanan. Layanan ini membantu menjaga keamanan lingkungan cloud Anda dengan menyediakan alat untuk memantau dan mengelola area berikut:
Deteksi kerentanan: Temukan dan perbaiki masalah seperti kesalahan konfigurasi, resource yang terekspos secara publik, kredensial yang bocor, dan resource dengan risiko yang diketahui. Memantau kepatuhan terhadap tolok ukur keamanan umum seperti NIST, HIPAA, PCI-DSS, dan CIS.
Deteksi dan mitigasi ancaman: Mendeteksi dan menanggapi ancaman aktif seperti malware, penambang mata uang kripto, serangan runtime container, dan serangan distributed denial-of-service (DDoS).
Postur dan kebijakan: Tentukan dan deploy postur keamanan untuk memantau status resource Anda, dan atasi penyimpangan postur saat terjadi. Google Cloud Periksa dan perbaiki akun yang memiliki terlalu banyak izin.
Framework kepatuhan dan keamanan data (Pratinjau): Tentukan
dan deploy framework serta kontrol cloud untuk memantau status
Google Cloud resource, menerapkan keamanan data, dan mengatasi penyimpangan saat
terjadi.
Ekspor data: Mengekspor temuan ke BigQuery dan Pub/Sub untuk
analisis lebih lanjut.
Layanan yang beroperasi di setiap area ini dapat menghasilkan temuan. Temuan
adalah catatan ancaman atau masalah lain yang ditemukan layanan di lingkungan cloud Anda. Temuan dihasilkan oleh sumber berikut:
Bawaan: Layanan keamanan yang merupakan bagian dari Security Command Center.
Terintegrasi: Google Cloud layanan keamanan yang terintegrasi dengan
aktivasi tingkat organisasi Security Command Center. Misalnya, Google Cloud Armor dan Sensitive Data Protection.
Pihak ketiga: Layanan keamanan yang telah terdaftar sebagai partner Cloud Marketplace, seperti Snyk dan CrowdStrike Falcon, yang berfungsi dengan aktivasi Security Command Center tingkat organisasi.
Lihat semua layanan keamanan pihak ketiga.
Untuk mengetahui daftar layanan keamanan bawaan, terintegrasi, dan pihak ketiga yang tersedia, serta petunjuk cara mengonfigurasinya, lihat Mengonfigurasi layanan Security Command Center.
Tingkat layanan
Security Command Center ditawarkan dalam tiga paket layanan: Standard, Premium, dan Enterprise. Setiap paket menentukan fitur dan layanan yang tersedia untuk Anda di Security Command Center.
Untuk mengetahui informasi selengkapnya tentang apa yang disertakan dalam setiap paket, lihat
Paket layanan.
Tingkat aktivasi
Anda dapat mengaktifkan Security Command Center
di project individual, yang dikenal sebagai aktivasi level project, atau di
seluruh organisasi, yang dikenal sebagai aktivasi level organisasi.
Paket Enterprise memerlukan aktivasi tingkat organisasi.
[[["Mudah dipahami","easyToUnderstand","thumb-up"],["Memecahkan masalah saya","solvedMyProblem","thumb-up"],["Lainnya","otherUp","thumb-up"]],[["Sulit dipahami","hardToUnderstand","thumb-down"],["Informasi atau kode contoh salah","incorrectInformationOrSampleCode","thumb-down"],["Informasi/contoh yang saya butuhkan tidak ada","missingTheInformationSamplesINeed","thumb-down"],["Masalah terjemahan","translationIssue","thumb-down"],["Lainnya","otherDown","thumb-down"]],["Terakhir diperbarui pada 2025-08-21 UTC."],[],[],null,["| Standard, Premium, and Enterprise [service tiers](/security-command-center/docs/service-tiers)\n\nSecurity Command Center is a cloud-based risk management solution that helps security\nprofessionals to prevent, detect, and respond to security issues. It helps to\nkeep your cloud environment secure by providing tools to monitor and manage the\nfollowing areas:\n\n- **Vulnerability detection**: Discover and remediate problems such as misconfigurations, publicly exposed resources, leaked credentials, and resources with known risks. Monitor compliance against common security benchmarks like NIST, HIPAA, PCI-DSS, and CIS.\n- **Threat detection and mitigation**: Detect and respond to active threats such as malware, cryptocurrency miners, container runtime attacks, and distributed denial-of-service (DDoS) attacks.\n- **Postures and policies**: Define and deploy a security posture to monitor the status of your Google Cloud resources, and address posture drift when it happens. Check for and correct over-permissioned accounts.\n- **Compliance and data security frameworks ([Preview](/products#product-launch-stages))**: Define and deploy frameworks and cloud controls to monitor the status of your Google Cloud resources, enforce data security, and address drift when it happens.\n- **Data export**: Export findings to BigQuery and Pub/Sub for further analysis.\n\nFor a complete list of services, see\n[Service tier comparison](/security-command-center/docs/service-tiers).\n\nServices that operate in each of these areas can generate *findings*. Findings\nare records of threats or other issues that a service has found in your cloud\nenvironments. Findings are generated by the following sources:\n\n- **Built-in**: Security services that are part of Security Command Center.\n- **Integrated** : Google Cloud security services that integrate with [organization-level activations](#activation-levels) of Security Command Center. For example, Google Cloud Armor and Sensitive Data Protection.\n- **Third party** : Security services that have registered as Cloud Marketplace partners, such as [Snyk](/security-command-center/docs/how-to-configure-snyk-for-scc) and CrowdStrike Falcon, that work with organization-level activations of Security Command Center. [See all third party security services](https://console.cloud.google.com/marketplace/browse?filter=category%3Asecurity-command-center-services).\n\nFor a list of available built-in, integrated, and third party security services,\nand instructions for how to configure them, see\n[Configure Security Command Center services](/security-command-center/docs/how-to-configure-security-command-center).\n\nService tiers\n\nSecurity Command Center is offered in three service tiers: Standard, Premium, and\nEnterprise. Each tier determines the features and services that are available to\nyou in Security Command Center.\n\nFor more information on what each tier includes, see\n[Service tiers](/security-command-center/docs/service-tiers).\n\nActivation levels\n\nYou can [activate Security Command Center](/security-command-center/docs/activate-scc-overview)\non an individual project, which is known as *project-level activation* , or an\nentire organization, which is known as *organization-level activation*.\n\nThe Enterprise tier requires an organization-level activation.\n\nWhat's next\n\n- Learn about [service tiers](/security-command-center/docs/service-tiers).\n- [Activate Security Command Center](/security-command-center/docs/activate-scc-overview).\n- Learn about Security Command Center [detection services](/security-command-center/docs/concepts-security-sources).\n- Learn how to [use Security Command Center in the Google Cloud console](/security-command-center/docs/how-to-use-security-command-center).\n- [Configure your security services](/security-command-center/docs/how-to-configure-security-command-center)."]]