Skip to content

Commit 9544de4

Browse files
authored
Update cloud-security-command-center.md
1 parent d3804f2 commit 9544de4

File tree

1 file changed

+10
-10
lines changed

1 file changed

+10
-10
lines changed

docs/integrations/google/cloud-security-command-center.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -360,7 +360,7 @@ This App uses [Findings](https://cloud.google.com/security-command-center/docs/f
360360
},
361361
"muteUpdateTime": "2025-06-25T16:27:20Z",
362362
"parentDisplayName": "Vulnerability Assessment",
363-
"description": "gRPC contains a vulnerability that allows hpack table accounting errors could lead to unwanted disconnects between clients and servers in exceptional cases/ Three vectors were found that allow the following DOS attacks:\n\n- Unbounded memory buffering in the HPACK parser\n- Unbounded CPU consumption in the HPACK parser\n\nThe unbounded CPU consumption is down to a copy that occurred per-input-block in the parser, and because that could be unbounded due to the memory copy bug we end up with an O(n^2) parsing loop, with n selected by the client.\n\nThe unbounded memory buffering bugs:\n\n- The header size limit check was behind the string reading code, so we needed to first buffer up to a 4 gigabyte string before rejecting it as longer than 8 or 16kb.\n- HPACK varints have an encoding quirk whereby an infinite number of 0\u2019s can be added at the start of an integer. gRPC\u2019s hpack parser needed to read all of them before concluding a parse.\n- gRPC\u2019s metadata overflow check was performed per frame, so that the following sequence of frames could cause infinite buffering: HEADERS: containing a: 1 CONTINUATION: containing a: 2 CONTINUATION: containing a: 3 etc\u2026",
363+
"description": "gRPC contains a vulnerability that allows hpack table accounting errors could lead to unwanted disconnects between clients and servers in exceptional cases/ Three vectors were found that allow the following DOS attacks:\n\n- Unbounded memory buffering in the HPACK parser\n- Unbounded CPU consumption in the HPACK parser\n\nThe unbounded CPU consumption is down to a copy that occurred per-input-block in the parser, and because that could be unbounded due to the memory copy bug we end up with an O(n^2) parsing loop, with n selected by the client.\n\nThe unbounded memory buffering bugs:\n\n- The header size limit check was behind the string reading code, so we needed to first buffer up to a 4-gigabyte string before rejecting it as longer than 8 or 16kb.\n- HPACK varints have an encoding quirk whereby an infinite number of 0\u2019s can be added at the start of an integer. gRPC\u2019s hpack parser needed to read all of them before concluding a parse.\n- gRPC\u2019s metadata overflow check was performed per frame, so that the following sequence of frames could cause infinite buffering: HEADERS: containing a: 1 CONTINUATION: containing a: 2 CONTINUATION: containing a: 3 etc\u2026",
364364
"files": [
365365
{
366366
"diskPath": {
@@ -431,7 +431,7 @@ This App uses [Findings](https://cloud.google.com/security-command-center/docs/f
431431

432432
```sql title="Misconfiguration"
433433
_sourceCategory=Labs/googleCloudSCC MISCONFIGURATION
434-
| json field=_raw "message.data.finding.name", "message.data.resource", "message.data.finding.resourceName" , "message.data.finding.parentDisplayName", "message.data.finding.sourceProperties.Explanation", "message.data.finding.sourceProperties.ExceptionInstructions", "message.data.finding.sourceProperties.Recommendation", "message.data.resource.displayName", "message.data.resource.type", "message.data.finding.description", "message.data.finding.findingClass", "message.data.finding.mute", "message.data.finding.severity", "message.data.finding.state", "message.data.finding.category" as findingName,resource ,resourceName, ParentDisplayName, explanation, ExceptionInstructions, Recommendation, displayName, type, description, findingClass, mute, severity, state, category nodrop
434+
| json field=_raw "message.data.finding.name", "message.data.resource", "message.data.finding.resourceName", "message.data.finding.parentDisplayName", "message.data.finding.sourceProperties.Explanation", "message.data.finding.sourceProperties.ExceptionInstructions", "message.data.finding.sourceProperties.Recommendation", "message.data.resource.displayName", "message.data.resource.type", "message.data.finding.description", "message.data.finding.findingClass", "message.data.finding.mute", "message.data.finding.severity", "message.data.finding.state", "message.data.finding.category" as findingName, resource,resourceName, ParentDisplayName, explanation, ExceptionInstructions, Recommendation, displayName, type, description, findingClass, mute, severity, state, category nodrop
435435
| parse regex field = findingName "organizations\/(?<org_id>\d+)\/sources\/\d+\/locations\/global\/findings\/(?<finding_id>[a-f0-9]+)"
436436
| dedup 1 by finding_id
437437
| json field=resource "service", "displayName", "location", "type", "gcpMetadata.projectDisplayName", "gcpMetadata.folders[0].resourceFolderDisplayName" as service, resource_name, location, type, project_name, folder_name
@@ -441,7 +441,7 @@ _sourceCategory=Labs/googleCloudSCC MISCONFIGURATION
441441

442442
```sql title="Threat"
443443
sourceCategory=Labs/googleCloudSCC THREAT
444-
| json field=_raw "message.data.finding.name", "message.data.resource", "message.data.finding.resourceName" , "message.data.finding.parentDisplayName", "message.data.finding.sourceProperties.Explanation", "message.data.finding.sourceProperties.ExceptionInstructions", "message.data.finding.sourceProperties.Recommendation", "message.data.resource.displayName", "message.data.resource.type", "message.data.finding.description", "message.data.finding.findingClass", "message.data.finding.mute", "message.data.finding.severity", "message.data.finding.state", "message.data.finding.category" as findingName,resource ,resourceName, ParentDisplayName, explanation, ExceptionInstructions, Recommendation, displayName, type, description, findingClass, mute, severity, state, category nodrop
444+
| json field=_raw "message.data.finding.name", "message.data.resource", "message.data.finding.resourceName", "message.data.finding.parentDisplayName", "message.data.finding.sourceProperties.Explanation", "message.data.finding.sourceProperties.ExceptionInstructions", "message.data.finding.sourceProperties.Recommendation", "message.data.resource.displayName", "message.data.resource.type", "message.data.finding.description", "message.data.finding.findingClass", "message.data.finding.mute", "message.data.finding.severity", "message.data.finding.state", "message.data.finding.category" as findingName, resource,resourceName, ParentDisplayName, explanation, ExceptionInstructions, Recommendation, displayName, type, description, findingClass, mute, severity, state, category nodrop
445445
| parse regex field = findingName "organizations\/(?<org_id>\d+)\/sources\/\d+\/locations\/global\/findings\/(?<finding_id>[a-f0-9]+)"
446446
| dedup 1 by finding_id
447447
| json field=resource "service", "displayName", "location", "type", "gcpMetadata.projectDisplayName", "gcpMetadata.folders[0].resourceFolderDisplayName" as service, resource_name, location, type, project_name, folder_name
@@ -451,7 +451,7 @@ sourceCategory=Labs/googleCloudSCC THREAT
451451

452452
```sql title="Vulnerability"
453453
_sourceCategory=Labs/googleCloudSCC VULNERABILITY
454-
| json field=_raw "message.data.finding.name", "message.data.resource", "message.data.finding.resourceName" , "message.data.finding.parentDisplayName", "message.data.finding.sourceProperties.Explanation", "message.data.finding.sourceProperties.ExceptionInstructions", "message.data.finding.sourceProperties.Recommendation", "message.data.resource.displayName", "message.data.resource.type", "message.data.finding.description", "message.data.finding.findingClass", "message.data.finding.mute", "message.data.finding.severity", "message.data.finding.state", "message.data.finding.category" as findingName,resource ,resourceName, ParentDisplayName, explanation, ExceptionInstructions, Recommendation, displayName, type, description, findingClass, mute, severity, state, category nodrop
454+
| json field=_raw "message.data.finding.name", "message.data.resource", "message.data.finding.resourceName", "message.data.finding.parentDisplayName", "message.data.finding.sourceProperties.Explanation", "message.data.finding.sourceProperties.ExceptionInstructions", "message.data.finding.sourceProperties.Recommendation", "message.data.resource.displayName", "message.data.resource.type", "message.data.finding.description", "message.data.finding.findingClass", "message.data.finding.mute", "message.data.finding.severity", "message.data.finding.state", "message.data.finding.category" as findingName, resource,resourceName, ParentDisplayName, explanation, ExceptionInstructions, Recommendation, displayName, type, description, findingClass, mute, severity, state, category nodrop
455455
| parse regex field = findingName "organizations\/(?<org_id>\d+)\/sources\/\d+\/locations\/global\/findings\/(?<finding_id>[a-f0-9]+)"
456456
| dedup 1 by finding_id
457457
| json field=resource "service", "displayName", "location", "type", "gcpMetadata.projectDisplayName", "gcpMetadata.folders[0].resourceFolderDisplayName" as service, resource_name, location, type, project_name, folder_name
@@ -493,19 +493,19 @@ import ViewDashboards from '../../reuse/apps/view-dashboards.md';
493493

494494
### Misconfigurations
495495

496-
The **Google Cloud - Security Command Center - Misconfigurations** dashboard provides you with a comprehensive view of misconfigurations across Google Cloud. It shows the total numner of misconfigurations by severity, category, project, and resource type, helping identify high-risk issues like over-privileged accounts or insecure Kubernetes settings. You can quickly identify high-risk issues like over-privileged accounts or insecure Kubernetes settings and pinpoint the most affected resources. The dashboard supports rapid investigation and proactive remediation, enhancing overall cloud security posture.
496+
The **Google Cloud - Security Command Center - Misconfigurations** dashboard provides you with a comprehensive view of misconfigurations across Google Cloud. It shows the total number of misconfigurations by severity, category, project, and resource type, helping identify high-risk issues like over-privileged accounts or insecure Kubernetes settings. You can quickly identify high-risk issues like over-privileged accounts or insecure Kubernetes settings and pinpoint the most affected resources. The dashboard supports rapid investigation and proactive remediation, enhancing overall cloud security posture.
497497

498498
<img src={useBaseUrl('https://sumologic-app-data-v2.s3.us-east-1.amazonaws.com/dashboards/Google+Cloud+-+Security+Command+Center/Google+Cloud+-+Security+Command+Center+-+Misconfigurations.png')} alt="Google Cloud Storage dashboards" />
499499

500500
### Threats
501501

502-
The **Google Cloud - Security Command Center - Threats** dashboard provides you real-time visibility into threats in the Google Cloud environments. It displays threat counts by severity and type, identifies affected projects and resources, and offers detailed findings for incident investigation. The dashboard aids in prioritizing responses, detecting suspicious activity early, and improving overall cloud threat detection and response.
502+
The **Google Cloud - Security Command Center - Threats** dashboard provides you with real-time visibility into threats in the Google Cloud environments. It displays threat counts by severity and type, identifies affected projects and resources, and offers detailed findings for incident investigation. The dashboard aids in prioritizing responses, detecting suspicious activity early, and improving overall cloud threat detection and response.
503503

504504
<img src={useBaseUrl('https://sumologic-app-data-v2.s3.us-east-1.amazonaws.com/dashboards/Google+Cloud+-+Security+Command+Center/Google+Cloud+-+Security+Command+Center+-+Threats.png')} alt="Google Cloud Storage dashboards" />
505505

506506
### Vulnerabilities
507507

508-
The **Google Cloud - Security Command Center - Vulnerabilities** dashboard provides you insights into known vulnerabilities across cloud resources for effective risk assessment and remediation. The dashboard displays the total count of vulnerabilities detected, categorized by severity and type (e.g., GKE Security Bulletin, Software, OS), helping prioritize critical and high-severity issues. Analysts can drill into project-specific data and detailed findings like CVEs or SQL injection risks, making this dashboard key to reducing exposure and maintaining a secure cloud environment.
508+
The **Google Cloud - Security Command Center - Vulnerabilities** dashboard provides you with insights into known vulnerabilities across cloud resources for effective risk assessment and remediation. The dashboard displays the total count of vulnerabilities detected, categorized by severity and type (e.g., GKE Security Bulletin, Software, OS), helping prioritize critical and high-severity issues. Analysts can drill into project-specific data and detailed findings like CVEs or SQL injection risks, making this dashboard key to reducing exposure and maintaining a secure cloud environment.
509509

510510
<img src={useBaseUrl('https://sumologic-app-data-v2.s3.us-east-1.amazonaws.com/dashboards/Google+Cloud+-+Security+Command+Center/Google+Cloud+-+Security+Command+Center+-+Vulnerabilities.png')} alt="Google Cloud Storage dashboards" />
511511

@@ -519,9 +519,9 @@ import CreateMonitors from '../../reuse/apps/create-monitors.md';
519519

520520
| Name | Description | Alert Condition | Trigger Type |
521521
|:--|:--|:--|:--|
522-
| `Critical Misconfigurations` | This alert is triggered when critical misconfiguration findings, such as insecure default settings or overly permissive roles are detected, indicating security vulnerabilities or compliance violations. It helps security analysts quickly identify and address high-risk configuration issues. | Count > 0 | Critical |
522+
| `Critical Misconfigurations` | This alert is triggered when critical misconfiguration findings, such as insecure default settings or overly permissive roles, are detected, indicating security vulnerabilities or compliance violations. It helps security analysts quickly identify and address high-risk configuration issues. | Count > 0 | Critical |
523523
| `Critical Threats` | This alert is triggered when critical threat detections are logged in the environment, indicating potential active attacks or malicious behavior. It serves as an early warning system for high-severity incidents requiring immediate investigation and response. | Count > 0 | Critical |
524-
| `Critical Vulnerabilities` | This alert is triggered when critical vulnerabilities, such as unpatched software or exposed components, are detected that pose significant risk to cloud infrastructure. It allows analysts to prioritize remediation efforts on the most impactful security weaknesses. | Count > 0 | Critical |
524+
| `Critical Vulnerabilities` | This alert is triggered when critical vulnerabilities, such as unpatched software or exposed components, are detected that pose a significant risk to cloud infrastructure. It allows analysts to prioritize remediation efforts on the most impactful security weaknesses. | Count > 0 | Critical |
525525

526526
## Upgrade/Downgrade the Google Cloud Security Command Center app (Optional)
527527

@@ -533,4 +533,4 @@ import AppUpdate from '../../reuse/apps/app-update.md';
533533

534534
import AppUninstall from '../../reuse/apps/app-uninstall.md';
535535

536-
<AppUninstall/>
536+
<AppUninstall/>

0 commit comments

Comments
 (0)