Security Command Center service tiers

Security Command Center is offered in three service tiers: Standard, Premium, and Enterprise. Each tier determines the features and services that are available to you in Security Command Center. A short description of each service tier follows:

  • Standard. Basic security posture management for Google Cloud only. The Standard tier can be activated at the project or organization level. Best for Google Cloud environments with minimal security requirements.
  • Premium. Everything in Standard, plus security posture management, attack paths, threat detection, and compliance monitoring for Google Cloud only. The Premium tier can be activated at the project or organization level. Best for Google Cloud customers who need pay-as-you-go billing.
  • Enterprise. Complete multi-cloud CNAPP security that helps you to triage and remediate your most critical issues. Includes most of the services that are in Premium. The Enterprise tier can only be activated at the organization level. Best for helping to protect Google Cloud, AWS, and Azure.

The Standard tier is offered at no additional charge, while the Premium and Enterprise tiers have different pricing structures. For more information, see Security Command Center pricing.

For a list of services included in each tier, see the service tier comparison.

For the Google SecOps features supported with the Security Command Center Enterprise tier, see Google Security Operations limits in Security Command Center Enterprise.

Service Service tier
Standard Premium Enterprise
Vulnerability detection
Security Health Analytics
Managed vulnerability assessment scanning for Google Cloud that can automatically detect the highest severity vulnerabilities and misconfigurations for your Google Cloud assets.
Compliance monitoring. Security Health Analytics detectors map to the controls of common security benchmarks like NIST, HIPAA, PCI-DSS, and CIS.
Custom module support. Create your own custom Security Health Analytics detectors.
Web Security Scanner
Custom scans. Schedule and run custom scans on deployed Compute Engine, Google Kubernetes Engine, or App Engine web applications that have public URLs and IP addresses and aren't behind firewalls.
Additional OWASP Top Ten detectors
Managed scans. Scan public web endpoints for vulnerabilities weekly, with scans configured and managed by Security Command Center.
Virtual red teaming
Virtual red teaming, performed by running Attack Path Simulations, helps you to identify and prioritize vulnerability and misconfiguration findings by identifying the paths that a potential attacker could take to reach your high-value resources. 1
Mandiant CVE assessments
CVE assessments are grouped by their exploitability and potential impact. You can query findings by CVE ID.
Other vulnerability services
Anomaly Detection.2 Identifies security anomalies for your projects and virtual machine (VM) instances, like potential leaked credentials and cryptocurrency mining. 11
Container image vulnerability findings. Automatically write findings to Security Command Center from Artifact Registry scans that detect vulnerable container images deployed to specific assets.
GKE security posture dashboard findings (Preview). View findings about Kubernetes workload security misconfigurations, actionable security bulletins, and vulnerabilities in the container operating system or in language packages.
Model Armor. Screen LLM prompts and responses for security and safety risks.
Sensitive Data Protection discovery.2 Discovers, classifies, and helps protect sensitive data. 33
Chokepoints. Identifies resources or resource groups where multiple attack paths converge.
Notebook Security Scanner (Preview). Detect and resolve vulnerabilities in Python packages that are used in Colab Enterprise notebooks.
Toxic combinations. Detects groups of risks that, when they occur together in a particular pattern, create a path to one or more of your high-value resources that a determined attacker could potentially use to reach and compromise those resources.
VM Manager vulnerability reports (Preview).2 If you enable VM Manager, it automatically writes findings from its vulnerability reports to Security Command Center. 1
Vulnerability Assessment for Google Cloud (Preview). Helps you discover critical and high severity software vulnerabilities in your Compute Engine VM instances without installing agents.
Mandiant Attack Surface Management. Discovers and analyzes your internet assets across environments, while continually monitoring the external ecosystem for exploitable exposures. 4
Vulnerability Assessment for AWS. Detects vulnerabilities in AWS resources, including software installed on Amazon EC2 instances and in Elastic Container Registry (ECR) images.
Threat detection and response
Google Cloud Armor.2 Protects Google Cloud deployments against threats such as distributed denial-of-service (DDoS) attacks, cross-site scripting (XSS), and SQL injection (SQLi). 11
Sensitive Actions Service. Detects when actions are taken in your Google Cloud organization, folders, and projects that could be damaging to your business if they are taken by a malicious actor.
Agent Engine Threat Detection (Preview). Detects runtime attacks on agents that are deployed and managed through Vertex AI Agent Engine.
Cloud Run Threat Detection. Detects runtime attacks in Cloud Run containers.
Container Threat Detection. Detects runtime attacks in Container-Optimized OS node images.
Correlated Threats (Preview). Helps you make more informed decisions about security incidents. This feature combines related threat findings together by using the security graph, helping you to prioritize and respond to active threats.
Event Threat Detection. Monitors Cloud Logging and Google Workspace, using threat intelligence, machine learning, and other advanced methods to detect threats such as malware, cryptocurrency mining, and data exfiltration.
Graph Search (Preview). Query the security graph to identify potential security vulnerabilities that you want to monitor in your environment. 1
Issues. Identifies the most important security risks that Security Command Center has found in your cloud environments. Issues are discovered using virtual red teaming, along with rule-based detections that rely on the Security Command Center security graph. 1
Virtual Machine Threat Detection. Detects potentially malicious applications running in VM instances.

Google SecOps. Integrates with Security Command Center to help you detect, investigate, and respond to threats. Google SecOps includes the following:

Mandiant Threat Defense. Rely on Mandiant experts to provide continual threat hunting to expose attacker activity and reduce impact to your business.

Mandiant Threat Defense is not activated by default. For more information and pricing details, contact your sales representative or Google Cloud partner.

Postures and policies
Binary Authorization.2 Implement software supply-chain security measures when you develop and deploy container-based applications. Monitor and limit the deployment of container images. 11
Cyber Insurance Hub.2 Profile and generate reports for your organization's technical risk posture. 11
Policy Controller.2 Enables the application and enforcement of programmable policies for your Kubernetes clusters. 11

Policy Intelligence. Provides tools that help you understand and manage your access policies to proactively improve your security configuration.

Policy Intelligence provides some features to Google Cloud customers at no charge, such as recommendations for basic roles and a limited number of queries per month. Advanced features are available for Security Command Center Premium and Enterprise users. For details, see Pricing.

Compliance Manager. Define, deploy, monitor, and audit controls and frameworks that are designed to help you meet the security and compliance obligations for your Google Cloud environment. 1, 5, 66
Data security posture management (DSPM). Evaluate, deploy, and audit data security frameworks and cloud controls to govern access and use of sensitive data. 1
Security posture. Define and deploy a security posture to monitor the security status of your Google Cloud resources. Address posture drift and unauthorized changes to the posture. On the Enterprise tier, you can also monitor your AWS environment. 1
Cloud Infrastructure Entitlement Management (CIEM). Identify principal accounts (identities) that are misconfigured or that are granted excessive or sensitive IAM permissions to your cloud resources. 7
Data management
Data residency and encryption
Customer-managed encryption keys (CMEK). Use Cloud Key Management Service keys that you create to encrypt selected Security Command Center data. By default, Security Command Center data is encrypted at rest with Google-owned and Google-managed encryption keys. 11
Data residency. Controls that restrict the storage and processing of Security Command Center findings, mute rules, continuous exports, and BigQuery exports to one of the data residency multi-regions that Security Command Center supports. 11
Findings export
BigQuery exports. Export findings from Security Command Center to BigQuery, either as a one-time bulk export or by enabling continuous exports.
Pub/Sub continuous exports
Cloud Logging continuous exports1
Other features
Infrastructure as code (IaC) validation. Validate against organization policies and Security Health Analytics detectors. 1

Privileged Access Manager. Privileged Access Manager helps you control just-in-time, temporary privilege elevation for specific principals and provides audit logs to track who had access to which resources, and when.

The following features are available with Security Command Center:

  • Multi-level and multi-party approvals (Preview). Administrators can mandate more than one approval level per entitlement, allowing up to two levels of sequential approvals for each entitlement.
  • Scope customization (Preview). Requesters can customize the scope of their grant requests to include only the specific roles and resources that they need within the scope of their entitlement.
1
Query assets with SQL in Cloud Asset Inventory
Request more Cloud Asset Inventory quota
Risk reports (Preview). Risk reports help you understand the results of the attack path simulations that Security Command Center runs. A risk report contains a high-level overview, sample toxic combinations, and associated attack paths. 1
AI Protection (Preview). AI Protection helps you manage the security posture of your AI workloads by detecting threats and mitigate risks to your AI asset inventory.
Assured Open Source Software. Take advantage of the security and experience that Google applies to open source software by incorporating the same packages that Google secures and uses into your own developer workflows.
Audit Manager. A compliance audit solution that evaluates your resources against select controls from multiple compliance frameworks. Security Command Center Enterprise users get access to the Premium tier of Audit Manager at no extra cost.
Multicloud support. Connect Security Command Center to other cloud providers to detect threats, vulnerabilities, and misconfigurations. Assess attack exposure scores and attack paths on external cloud high-value resources. Supported cloud providers: AWS, Azure.
Snyk Integration. View and manage issues identified by Snyk as security findings.

  1. Requires an organization-level activation.
  2. This is a Google Cloud service that integrates with organization-level activations of Security Command Center to provide findings. One or more features of this service might be priced separately from Security Command Center.
  3. Not activated by default. For more information and pricing details, contact your sales representative or Google Cloud partner.
  4. If data residency controls are enabled, then this feature is not supported.
  5. This feature doesn't support customer-managed encryption keys (CMEK).
  6. Doesn't support data residency.
  7. If data residency controls are enabled, then this feature is supported only for Google Cloud.