Security Command Center Findings
Security threats and compliance violations
Security findings from Google Cloud Security Command Center V2, including custom threats, vulnerabilities, and policy violations detected across GCP resources and projects.
Overview
Security findings generated by Google Cloud Security Command Center V2, providing centralized visibility into security threats, misconfigurations, and compliance violations across Google Cloud Platform resources.
When Generated:
- When Security Command Center detects a custom threat pattern
- When security policies are violated
- When anomalous activity is detected on GCP resources
- When vulnerability scanners identify security issues
- When compliance violations are detected
Security Relevance:
HighCompliance:
Frequency Notes:
Security findings are generated based on continuous monitoring of GCP resources. Frequency varies based on security posture, with more findings during active development periods and fewer during stable operations. Business hours typically see higher finding rates due to increased resource changes and deployments.
Resources
Documentation
- Security Command Center Documentation official
- Finding Schema Reference official
- Security Command Center Best Practices official
Tools
-
Google Cloud Console - Security Command Center
Web interface for viewing and managing Security Command Center findings
-
gcloud CLI - SCC Commands
Command-line tool for interacting with Security Command Center
Generation Configuration
Field Definitions
Complete field reference for this event type with data types, descriptions, and example values.
| Field Name | Type | Required | Format | Description | Example | Possible Values |
|---|---|---|---|---|---|---|
|
timestamp
Source: now() | iso8601
|
DateTime | Required |
ISO 8601
|
ISO 8601 timestamp when the log was generated |
2025-08-22T15:17:36.446Z
|
— |
|
product
Source: Static string
|
String | Required | — | Product identifier for Security Command Center |
GOOGLE_SECURITY_COMMAND_CENTER_V2
|
— |
|
type
Source: Static string
|
String | Required | — | Type of security source (Security Graph, Security Health Analytics, etc.) |
Security Graph
|
— |
|
severity
Source: random_choice(['Critical', 'High', 'Medium', 'Low'])
|
String | Required | — | Overall severity level of the finding |
High
|
Critical
— Critical severity requiring immediate attention
High
— High severity requiring prompt attention
Medium
— Medium severity requiring attention
Low
— Low severity for informational purposes
|
|
title
Source: random_choice of common threat titles
|
String | Required | — | Human-readable title describing the security finding |
Custom Threat
|
— |
|
source_json.finding.canonicalName
Source: Constructed from random project ID, source ID, and finding hash
|
String | Required | — | Canonical resource name of the finding in the project scope |
projects/224068114279/sources/9732761411165682985/locations/global/findings/0c686e1c1add482f88aa11e637e1938a
|
— |
|
source_json.finding.category
Source: random_choice of security categories
|
String | Required | — | Category classification of the security finding |
Custom Threat
|
Custom Threat
— Custom threat pattern detected
Malware
— Malware detected on resources
Data Exfiltration
— Suspicious data transfer patterns
Unauthorized Access
— Unauthorized access attempts or breaches
Privilege Escalation
— Privilege escalation detected
|
|
source_json.finding.createTime
Source: now() | iso8601
|
DateTime | Required |
ISO 8601
|
Timestamp when the finding was first created |
2025-08-22T15:17:36.446Z
|
— |
|
source_json.finding.eventTime
Source: now().subtract(seconds=random_int(1, 300)) | iso8601
|
DateTime | Required |
ISO 8601
|
Timestamp when the security event occurred |
2025-08-22T15:17:34.570Z
|
— |
|
source_json.finding.externalUri
Source: Constructed GCP console URL with organization ID
|
String | Optional | — | External URI for additional details about the finding |
https://console.cloud.google.com/security/command-center/findings
|
— |
|
source_json.finding.mute
Source: random_choice(['UNDEFINED', 'MUTED', 'UNMUTED'])
|
String | Required | — | Mute status of the finding |
UNDEFINED
|
UNDEFINED
— Mute status not defined
MUTED
— Finding is muted and won't trigger alerts
UNMUTED
— Finding is active and will trigger alerts
|
|
source_json.finding.severity
Source: random_choice(['CRITICAL', 'HIGH', 'MEDIUM', 'LOW'])
|
String | Required | — | Severity level in uppercase format |
HIGH
|
CRITICAL
— Critical severity
HIGH
— High severity
MEDIUM
— Medium severity
LOW
— Low severity
|
|
source_json.finding.state
Source: random_choice(['ACTIVE', 'INACTIVE'])
|
String | Required | — | Current state of the security finding |
ACTIVE
|
ACTIVE
— Finding is currently active
INACTIVE
— Finding has been resolved or is no longer active
|
|
source_json.resource.cloudProvider
Source: Static string
|
String | Required | — | Cloud provider identifier |
GOOGLE_CLOUD_PLATFORM
|
— |
|
source_json.resource.displayName
Source: registry.get_organization_field('gcp_project_name') or random_string
|
String | Required | — | Human-readable display name for the GCP project |
komand-211617
|
— |
|
source_json.resource.gcpMetadata.organization
Source: Constructed from organization ID
|
String | Required | — | GCP organization resource path |
organizations/635513451221
|
— |
|
source_json.resource.gcpMetadata.parentDisplayName
Source: registry.get_organization().name
|
String | Required | — | Display name of the parent organization |
komandops.org
|
— |
|
source_json.resource.service
Source: random_choice of common GCP services
|
String | Required | — | GCP service that owns the resource |
cloudresourcemanager.googleapis.com
|
— |
|
source_json.resource.type
Source: random_choice of common GCP resource types
|
String | Required | — | GCP resource type identifier |
google.cloud.resourcemanager.Project
|
— |