Skip to content

Commit 0ae9dbd

Browse files
authored
Merge pull request #224990 from ElazarK/WI60225-conceptual-gcp-connector
conceptual GCP connector article
2 parents f87a764 + 31dd788 commit 0ae9dbd

12 files changed

+149
-3
lines changed

articles/defender-for-cloud/TOC.yml

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -105,7 +105,11 @@
105105
items:
106106
- name: The Defender for Cloud multicloud solution
107107
href: multicloud.yml
108+
- name: Protecting your GCP projects and organizations
109+
displayName: GCP, connector, project, organizations
110+
href: concept-gcp-connector.md
108111
- name: Zero Trust infrastructure and integrations
112+
displayName: zero trust, zero, trust
109113
href: zero-trust.md
110114
- name: Planning multicloud security
111115
items:
Lines changed: 142 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,142 @@
1+
---
2+
title: Protecting your GCP projects and organizations
3+
description: Learn how the GCP connector works on Microsoft Defender for Cloud.
4+
titleSuffix: Microsoft Defender for Cloud
5+
ms.topic: conceptual
6+
ms.service: defender-for-cloud
7+
ms.date: 02/09/2023
8+
---
9+
10+
# Microsoft Defender for Cloud's GCP connector
11+
12+
The Microsoft Defender for Cloud GCP (Google Cloud Platform) connector is a feature that allows an organization to extend its cloud security posture management to their Google Cloud environments.
13+
14+
The GCP connector allows organizations to use Microsoft Defender for Cloud to monitor and assess the security state of their Google Cloud resources. The connector allows organizations to use Microsoft Defender for Cloud to apply security policies and receive security recommendations for their Google Cloud resources.
15+
16+
The GCP connector allows for continuous monitoring of Google Cloud resources for security risks, vulnerabilities, and misconfigurations. It also provides automated remediation capabilities to address identified risks and compliance issues. Additionally, it allows organizations to use the Microsoft Defender for Cloud's integrated threat protection capabilities to protect their Google Cloud resources from threats.
17+
18+
## GCP authorization design
19+
20+
The authentication process between Microsoft Defender for Cloud and GCP is a federated authentication process.
21+
22+
When you onboard to Defender for Cloud, the GCloud template is used to create the following resources as part of the authentication process:
23+
24+
- Workload identity pool and providers
25+
26+
- Service accounts and policy bindings
27+
28+
The authentication process works as follows:
29+
30+
:::image type="content" source="media/concept-gcp-connector/authentication-process.png" alt-text="A diagram of the Defender for Cloud GCP connector authentication process." lightbox="media/concept-gcp-connector/authentication-process.png":::
31+
32+
(1) - Microsoft Defender for Cloud's CSPM service acquires an Azure AD token. The token is signed by Azure AD using the RS256 algorithm and is valid for 1 hour.
33+
34+
(2) - The Azure AD token is exchanged with Google's STS token.
35+
36+
(3) - Google STS validates the token with the workload identity provider. The Azure AD token is sent to Google's STS that validates the token with the workload identity provider. Audience validation then occurs and the token is signed. A Google STS token is then returned to Defender for Cloud's CSPM service.
37+
38+
(4) - Defender for Cloud's CSPM service uses the Google STS token to impersonate the service account. Defender for Cloud's CSPM receives service account credentials that will then be used to scan the project.
39+
40+
## What happens when you onboard a single project
41+
42+
There are four parts to the onboarding process that take place when you create the security connection between your GCP project and Microsoft Defender for Cloud.
43+
44+
### Organization details
45+
46+
In the first section, you'll need to add the basic properties of the connection between your GCP project and Defender for Cloud.
47+
48+
:::image type="content" source="media/concept-gcp-connector/single-project-details.png" alt-text="Screenshot of the organization details page of the GCP project onboarding process." lightbox="media/concept-gcp-connector/single-project-details.png":::
49+
50+
Here you'll name your connector, select a subscription and resource group, which will be used to create an ARM template resource that is called security connector. The security connector represents a configuration resource that holds the projects settings.
51+
52+
You'll also select a location and add the organization ID for your project.
53+
54+
### Select plans
55+
56+
After entering your organization's details, you'll then be able to select which plans to enable.
57+
58+
:::image type="content" source="media/concept-gcp-connector/select-plans-gcp-project.png" alt-text="Screenshot of the available plans you can enable for your GCP project." lightbox="media/concept-gcp-connector/select-plans-gcp-project.png":::
59+
60+
From here, you can decide which resources you want to protect based on the security value you want to receive.
61+
62+
### Configure access
63+
64+
Once you've selected the plans, you want to enable and the resources you want to protect you'll then have to configure access between Defender for Cloud and your GCP project.
65+
66+
:::image type="content" source="media/concept-gcp-connector/configure-access-gcp-connector.png" alt-text="Screenshot of the configure access screen between Defender for Cloud and your GCP project." lightbox="media/concept-gcp-connector/configure-access-gcp-connector.png":::
67+
68+
In this step, you'll find the GCloud script that needs to be run on the GCP project that is going to onboarded. The GCloud script is generated based on the plans you selected to onboard.
69+
70+
The GCloud script creates all of the required resources on your GCP environment so that Defender for Cloud can operate and provide the following security values:
71+
72+
- Workload identity pool
73+
- Workload identity provider (per plan)
74+
- Service accounts
75+
- Project level policy bindings (service account will have access only to the specific project)
76+
77+
### Review and generate
78+
79+
The final step for onboarding is to review all of your selections and to create the connector.
80+
81+
:::image type="content" source="media/concept-gcp-connector/review-and-generate.png" alt-text="Screenshot of the review and generate screen with all of your selections listed." lightbox="media/concept-gcp-connector/review-and-generate.png":::
82+
83+
## What happens when you onboard an organization
84+
85+
Similar to onboarding a single project, When onboarding a GCP organization, Defender for Cloud creates a security connector for each project under the organization (unless specific projects were excluded).
86+
87+
### Organization details
88+
89+
In the first section, you'll need to add the basic properties of the connection between your GCP organization and Defender for Cloud.
90+
91+
:::image type="content" source="media/concept-gcp-connector/organization-details.png" alt-text="Screenshot of the organization details page of the GCP organization onboarding process." lightbox="media/concept-gcp-connector/organization-details.png":::
92+
93+
Here you'll name your connector, select a subscription and resource group that will be used to create an ARM template resource that is called security connector. The security connector represents a configuration resource that holds the projects settings.
94+
95+
You'll also select a location and add the organization ID for your project.
96+
97+
When you onboard an organization, you can also choose to exclude project numbers and folder IDs.
98+
99+
### Select plans
100+
101+
After entering your organization's details, you'll then be able to select which plans to enable.
102+
103+
:::image type="content" source="media/concept-gcp-connector/select-plans-gcp-project.png" alt-text="Screenshot of the available plans you can enable for your GCP project." lightbox="media/concept-gcp-connector/select-plans-gcp-project.png":::
104+
105+
From here, you can decide which resources you want to protect based on the security value you want to receive.
106+
107+
### Configure access
108+
109+
Once you've selected the plans, you want to enable and the resources you want to protect you'll then have to configure access between Defender for Cloud and your GCP project.
110+
111+
:::image type="content" source="media/concept-gcp-connector/configure-access-organization.png" alt-text="Screenshot of the configure access screen between Defender for Cloud and your GCP organization." lightbox="media/concept-gcp-connector/configure-access-organization.png":::
112+
113+
When you onboard an organization, there's a section to include management project details. Similar to other GCP projects, the organization is also considered a project and will be utilized by Defender for Cloud to create all of the required resources needed to connect the organization to Defender for Cloud.
114+
115+
In the management project details section, you have the choice of:
116+
117+
- Dedicating a management project for Defender for Cloud to include in the GCloud script.
118+
- Provide the details of an already existing project to be used as the management project with Defender for Cloud.
119+
120+
You need to decide what is your best option for your organization's architecture. We recommend creating a dedicated project for Defender for Cloud.
121+
122+
The GCloud script is generated based on the plans you selected to onboard. The script will create all of the required resources on your GCP environment so that Defender for Cloud can operate and provide the following security benefits:
123+
124+
- Workload identity pool
125+
- Workload identity provider for each plan
126+
- Custom role to grant Defender for Cloud access to discover and get the project under the onboarded organization
127+
- A service account for each plan
128+
- A service account for the auto-provisioning service
129+
- Organization level policy bindings for each service account
130+
- API enablement(s) at the management project level.
131+
132+
Some of the APIs won't be in direct use with the management project. Instead the APIs will authenticate through this project and use one of the API(s) from another project. The API must be enabled on the management project.
133+
134+
### Review and generate
135+
136+
The final step for onboarding is to review all of your selections and to create the connector.
137+
138+
:::image type="content" source="media/concept-gcp-connector/review-and-generate-organization.png" alt-text="Screenshot of the review and generate screen with all of your selections listed for your organization." lightbox="media/concept-gcp-connector/review-and-generate-organization.png":::
139+
140+
## Next steps
141+
142+
[Quickstart: Connect your GCP projects to Microsoft Defender for Cloud](quickstart-onboard-gcp.md)

articles/defender-for-cloud/custom-dashboards-azure-workbooks.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,8 @@ title: Workbooks gallery in Microsoft Defender for Cloud
33
description: Learn how to create rich, interactive reports of your Microsoft Defender for Cloud data with the integrated Azure Monitor Workbooks gallery
44
ms.topic: conceptual
55
ms.custom: ignite-2022
6+
ms.author: benmansheim
7+
author: bmansheim
68
ms.date: 02/02/2023
79
---
810

173 KB
Loading
108 KB
Loading
96.4 KB
Loading
52.1 KB
Loading
72.7 KB
Loading
90 KB
Loading
82.2 KB
Loading

0 commit comments

Comments
 (0)