GCP Security Command Center (SCC)
Set up the GCP Security Command Center data connector.
In this guide, you'll configure the integration between Radiant and Google Cloud Security Command Center (SCC). This setup allows Radiant Security to continuously monitor for vulnerabilities, misconfigurations, and threats, offering visibility into the security posture of your GCP resources. SCC aggregates data from various GCP services, helping Radiant Security quickly triage and investigate potential security incidents.
There are two visibility scenarios when it comes to SCC scope: organization-wide and project-wide. We support data collection for both cases, but they require different steps. This guide outlines the specific actions needed for each visibility scenario.
At the end of this configuration, you will provide Radiant Security with these values:
ADC Credentials (json file)
ADC Credentials (json file)
Organization ID
Organization ID
-
Project ID
Prerequisites
Enable the SCC API
In Google Cloud console, go to Enable access to API by following this link: Enable access to API.
Make sure you are in the right project:
If SCC is set up within a project, select this project.
If SCC is domain-wide, select a project where you will later be able to create a service account. The location of this service account is an organizational decision and does not impact the connector
Click Next and Enable.
Create a service account
You’ll need to create a service account on a project that can retrieve logs from the API, regardless of your SCC visibility.
In the Google Cloud console, navigate to IAM & Admin > Service Accounts.
Select the project where you enabled the API in the previous step.
Click + Create service account and add the following information:
Service account name:
Radiant-Connector
Service account ID:
radiant-connector
(This is an auto-generated field.)Service account description:
Account used to retrieve security logs from SCC
Copy the Email address, you’ll need it later. Click Create and Continue.
In the Grant this service account access to project section, click the drop-down for Select a role, search for and select the Security Center Admin Viewer role.
Skip the third step and click Done.
Create a service account key
While still in the Service Accounts page in the Google Cloud console, click the newly created account.
Click the Keys tab and click Add Key > Create new Key.
For Key type, select JSON and click Create.
The JSON file will download automatically, be sure to save it in a secure place.
Grant access for a domain-wide SCC
In the Google Cloud console, navigate to IAM & Admin, make sure that you are are in the organization scope.
Click + Grant Access.
In the Add principals section in the New principals field, enter the principal of the service account that you copied in the Create a service account step.
In the Assign roles section, click the Role drop-down, search for and select the Security Center Admin Viewer role.
Click Save.
Add the data connector in Radiant Security
Log in to Radiant Security.
From the navigation menu, click Settings > Data Connectors and click + Add Connector.
Search for and select the GCP Security Command Center (SCC) option and then click Data Feeds.
Under Select your data feeds, select the GCP Security Command Center (SCC) data feed and click Credentials.
Under Credential Name, give the credential an identifiable name (e.g.
GCP Radiant Credentials
).Enter the GCP organization ID.
If applicable, enter the GCP project ID.
For Upload JSON File, upload the GCP credentials JSON file you downloaded in the Create a service account step.
Click Add Connector.
Last updated