Skip to content

Commit d8c3ac8

Browse files
committed
finished article and placed in TOC
1 parent 26db030 commit d8c3ac8

File tree

3 files changed

+51
-30
lines changed

3 files changed

+51
-30
lines changed

articles/defender-for-cloud/TOC.yml

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -102,6 +102,9 @@
102102
items:
103103
- name: The Defender for Cloud multicloud solution
104104
href: multicloud.yml
105+
- name: Protecting your GCP projects and organizations
106+
displayName: GCP, connector, project, organizations
107+
href: concept-gcp-connector.md
105108
- name: Planning multicloud security
106109
items:
107110
- name: Get started
Lines changed: 48 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -1,22 +1,22 @@
11
---
2-
title: GCP connector
2+
title: Protecting your GCP projects and organizations
33
description: Learn how
44
titleSuffix: Microsoft Defender for Cloud
55
ms.topic: conceptual
66
ms.date: 01/25/2023
77
---
88

9-
# Microsoft Defender for Cloud GCP connector
9+
# Microsoft Defender for Cloud's GCP connector
1010

11-
The Microsoft Defender for Cloud GCP (Google Cloud Platform) connector is a feature that allows an organizations to extend its cloud security posture management to their Google Cloud environments.
11+
The Microsoft Defender for Cloud GCP (Google Cloud Platform) connector is a feature that allows an organization to extend its cloud security posture management to their Google Cloud environments.
1212

1313
The GCP connector allows organizations to use Microsoft Defender for Cloud to monitor and assess the security state of their Google Cloud resources. The connector allows organizations to use Microsoft Defender for Cloud to apply security policies and receive security recommendations for their Google Cloud resources.
1414

1515
The GCP connector allows for continuous monitoring of Google Cloud resources for security risks, vulnerabilities, and misconfigurations. It also provides automated remediation capabilities to address identified risks and compliance issues. Additionally, it allows organizations to use the Microsoft Defender for Cloud's integrated threat protection capabilities to protect their Google Cloud resources from threats.
1616

1717
## GCP authorization design
1818

19-
The authentication process between Microsoft Defender for Cloud and GCP, is a federated authentication process.
19+
The authentication process between Microsoft Defender for Cloud and GCP is a federated authentication process.
2020

2121
When you onboard to Defender for Cloud, the GCloud template is used to create the following resources as part of the authentication process:
2222

@@ -26,45 +26,45 @@ When you onboard to Defender for Cloud, the GCloud template is used to create th
2626

2727
The authentication process works as follows:
2828

29-
:::image type="content" source="media/concept-gcp-connector/authentication-process.png" alt-text="A diagram of the Defender for Cloud GCP cpnnector authentication process.":::
29+
:::image type="content" source="media/concept-gcp-connector/authentication-process.png" alt-text="A diagram of the Defender for Cloud GCP connector authentication process.":::
3030

31-
(1) - Microsoft Defender for Cloud's CSPM service acquires an AAD token. The token is signed by AAD using the RS256 algorithm and is valid for 1 hour.
31+
(1) - Microsoft Defender for Cloud's CSPM service acquires an Azure AD token. The token is signed by Azure AD using the RS256 algorithm and is valid for 1 hour.
3232

33-
(2) - The AAD token is exchanged with Google's STS token.
33+
(2) - The Azure AD token is exchanged with Google's STS token.
3434

35-
(3) - Google STS validates the token with the workload identity provider. The AAD token is sent to Google's STS, which validates the token with the workload identity provider. Audience validation then occurs and the token is signed. A Google STS token is then returned to Defender for Cloud's CSPM service.
35+
(3) - Google STS validates the token with the workload identity provider. The Azure AD token is sent to Google's STS that validates the token with the workload identity provider. Audience validation then occurs and the token is signed. A Google STS token is then returned to Defender for Cloud's CSPM service.
3636

37-
(4) - Defender for Cloud's CSPM service uses the Google STS token to impersonate the service account. Defender for Cloud's CSPM receives service account credentials which will then be used to scan the project.
37+
(4) - Defender for Cloud's CSPM service uses the Google STS token to impersonate the service account. Defender for Cloud's CSPM receives service account credentials that will then be used to scan the project.
3838

3939
## What happens when you onboard a single project
4040

4141
There are four parts to the onboarding process that take place when you create the security connection between your GCP project and Microsoft Defender for Cloud.
4242

4343
### Organization details
4444

45-
In the first section you will need to add the basic properties of the connection between your GCP project and Defender for Cloud.
45+
In the first section, you'll need to add the basic properties of the connection between your GCP project and Defender for Cloud.
4646

4747
:::image type="content" source="media/concept-gcp-connector/single-project-details.png" alt-text="Screenshot of the organization details page of the GCP project onboarding process.":::
4848

49-
Here you will name your connector, select a subscription and resource group which will be used to create an ARM resource which is called security connector. The security connector represents a configuration resource that holds the projects settings.
49+
Here you'll name your connector, select a subscription and resource group, which will be used to create an ARM template resource that is called security connector. The security connector represents a configuration resource that holds the projects settings.
5050

51-
You will also select a location and add the organization ID for your project.
51+
You'll also select a location and add the organization ID for your project.
5252

5353
### Select plans
5454

55-
After entering your organization's details you will then be able to select which plans to enable.
55+
After entering your organization's details, you'll then be able to select which plans to enable.
5656

57-
:::image type="content" source="media/concept-gcp-connector/select-plans-gcp-project.png" alt-text="Screenshot of teh available plans you can enable for your GCP project.":::
57+
:::image type="content" source="media/concept-gcp-connector/select-plans-gcp-project.png" alt-text="Screenshot of the available plans you can enable for your GCP project.":::
5858

59-
From here you can decide which resources you want to protect based on the security value you want to receive.
59+
From here, you can decide which resources you want to protect based on the security value you want to receive.
6060

6161
### Configure access
6262

63-
Once you have selected the plans you want to enable and the resources you want to protect you will then have to configure access between Defender for Cloud and your GCP project.
63+
Once you've selected the plans, you want to enable and the resources you want to protect you'll then have to configure access between Defender for Cloud and your GCP project.
6464

6565
:::image type="content" source="media/concept-gcp-connector/configure-access-gcp-connector.png" alt-text="Screenshot of the configure access screen between Defender for Cloud and your GCP project.":::
6666

67-
In this step you'll find the GCLoud script that needs to be run on the GCP project that is going to onboarded. The GCloud script is generated based on the plans you selected to onboard.
67+
In this step, you'll find the GCloud script that needs to be run on the GCP project that is going to onboarded. The GCloud script is generated based on the plans you selected to onboard.
6868

6969
The GCloud script creates all of the required resources on your GCP environment so that Defender for Cloud can operate and provide the following security values:
7070

@@ -85,39 +85,57 @@ Similar to onboarding a single project, When onboarding a GCP organization, Defe
8585

8686
### Organization details
8787

88-
In the first section you will need to add the basic properties of the connection between your GCP organization and Defender for Cloud.
88+
In the first section, you'll need to add the basic properties of the connection between your GCP organization and Defender for Cloud.
8989

9090
:::image type="content" source="media/concept-gcp-connector/organization-details.png" alt-text="Screenshot of the organization details page of the GCP project onboarding process.":::
9191

92-
Here you will name your connector, select a subscription and resource group which will be used to create an ARM resource which is called security connector. The security connector represents a configuration resource that holds the projects settings.
92+
Here you'll name your connector, select a subscription and resource group that will be used to create an ARM template resource that is called security connector. The security connector represents a configuration resource that holds the projects settings.
9393

94-
You will also select a location and add the organization ID for your project.
94+
You'll also select a location and add the organization ID for your project.
95+
96+
When you onboard an organization, you can also choose to exclude project numbers and folder IDs.
9597

9698
### Select plans
9799

98-
After entering your organization's details you will then be able to select which plans to enable.
100+
After entering your organization's details, you'll then be able to select which plans to enable.
99101

100-
:::image type="content" source="media/concept-gcp-connector/select-plans-gcp-project.png" alt-text="Screenshot of teh available plans you can enable for your GCP project.":::
102+
:::image type="content" source="media/concept-gcp-connector/select-plans-gcp-project.png" alt-text="Screenshot of the available plans you can enable for your GCP project.":::
101103

102-
From here you can decide which resources you want to protect based on the security value you want to receive.
104+
From here, you can decide which resources you want to protect based on the security value you want to receive.
103105

104106
### Configure access
105107

106-
Once you have selected the plans you want to enable and the resources you want to protect you will then have to configure access between Defender for Cloud and your GCP project.
108+
Once you've selected the plans, you want to enable and the resources you want to protect you'll then have to configure access between Defender for Cloud and your GCP project.
107109

108-
:::image type="content" source="media/concept-gcp-connector/configure-access-gcp-connector.png" alt-text="Screenshot of the configure access screen between Defender for Cloud and your GCP project.":::
110+
:::image type="content" source="media/concept-gcp-connector/configure-access-organization.png" alt-text="Screenshot of the configure access screen between Defender for Cloud and your GCP project.":::
109111

110-
In this step you'll find the GCLoud script that needs to be run on the GCP project that is going to onboarded. The GCloud script is generated based on the plans you selected to onboard.
112+
When you onboard an organization, there's a section to include management project details. Similar to other GCP projects, the organization is also considered a project and will be utilized by Defender for Cloud to create all of the required resources needed to connect the organization to Defender for Cloud.
111113

112-
The GCloud script creates all of the required resources on your GCP environment so that Defender for Cloud can operate and provide the following security values:
114+
In the management project details section, you have the choice of:
115+
116+
- Dedicating a management project for Defender for Cloud to include in the GCloud script.
117+
- Provide the details of an already existing project to be used as the management project with Defender for Cloud.
118+
119+
You need to decide what is your best option for your organization's architecture. We recommend creating a dedicated project for Defender for Cloud.
120+
121+
The GCloud script is generated based on the plans you selected to onboard, and will create all of the required resources on your GCP environment so that Defender for Cloud can operate and provide the following security benefits:
113122

114123
- Workload identity pool
115-
- Workload identity provider (per plan)
116-
- Service accounts
117-
- Project level policy bindings (service account will have access only to the specific project)
124+
- Workload identity provider for each plan
125+
- Custom role to grant Defender for Cloud access to discover and get the project under the onboarded organization
126+
- A service account for each plan
127+
- A service account for the auto-provisioning service
128+
- Organization level policy bindings for each service account
129+
- API enablement(s) at the management project level.
130+
131+
Some of the APIs won't be in direct use with the management project. Instead the APIs will authenticate through this project and use one of the API(s) from another project. The API must be enabled on the management project.
118132

119133
### Review and generate
120134

121135
The final step for onboarding is to review all of your selections and to create the connector.
122136

123137
:::image type="content" source="media/concept-gcp-connector/review-and-generate.png" alt-text="Screenshot of the review and generate screen with all of your selections listed.":::
138+
139+
## Next steps
140+
141+
[Quickstart: Connect your GCP projects to Microsoft Defender for Cloud](quickstart-onboard-gcp.md)
69.4 KB
Loading

0 commit comments

Comments
 (0)