Represents an access event.
Represents an application associated with a finding.
An attack exposure contains the results of an attack path simulation run.
A path that an attacker could take to reach an exposed resource.
Information related to Google Cloud Backup and DR Service findings.
Request message to create multiple resource value configs
Response message for BatchCreateResourceValueConfigs
Configures how to deliver Findings to BigQuery Instance.
Request message for bulk findings update.
The response to a BulkMute request. Contains the LRO information.
Details about the Cloud Data Loss Prevention (Cloud DLP)
inspection
job that produced
the finding.
Contains compliance information about a security standard indicating unmet
recommendations.
Contains information about the IP connection associated with the finding.
The email address of a contact.
Details about specific contacts
Container associated with the finding.
Request message for creating a BigQuery export.
Request message for creating a finding.
Request message for creating a mute config.
Request message for creating a notification config.
Request message to create single resource value config
Request message for creating a source.
CVE stands for Common Vulnerabilities and Exposures.
Information from the
CVE
record that describes this
vulnerability.
Common Vulnerability Scoring System version 3.
Represents database access information, such as queries. A database may be a
sub-resource of an instance (as in the case of Cloud SQL instances or Cloud
Spanner instances), or the database instance itself. Some database resources
might not have the
full resource
name populated because these
resource types, such as Cloud SQL databases, are not yet supported by Cloud
Asset Inventory. In these cases only the display name is provided.
Request message for deleting a BigQuery export.
Request message for deleting a mute config. If no location is specified,
default is global.
Request message for deleting a notification config.
Request message to delete resource value config
A name-value pair representing an environment variable used in an operating
system process.
Resource where data was exfiltrated from or exfiltrated to.
Exfiltration represents a data exfiltration attempt from one or more sources
to one or more targets. The sources
attribute lists the sources of the
exfiltrated data. The targets
attribute lists the destinations the data was
copied to.
Representation of third party SIEM/SOAR fields within SCC.
File information about the related binary/library used by an executable, or
the script used by a script interpreter
Security Command Center finding.
Represents a geographical location for a given access.
Request message for retrieving a BigQuery export.
Request message for retrieving a mute config. If no location is specified,
default is global.
Request message for getting a notification config.
Request message to get resource value config
Request message for getting simulation.
Simulation name can include “latest” to retrieve the latest simulation
For example, “organizations/123/simulations/latest”
Request message for getting a source.
Request message for getting a valued resource.
Request message for grouping by findings.
Response message for group by findings.
Result containing the properties and count of a groupBy request.
Represents a particular IAM binding, which captures a member’s role addition,
removal, or state.
Represents what’s commonly known as an
indicator of compromise (IoC) in
computer forensics. This is an artifact observed on a network or in an
operating system that, with high confidence, indicates a computer intrusion.
For more information, see
Indicator of
compromise.
Kernel mode rootkit signatures.
Kubernetes-related attributes.
Represents a generic name-value label. A label has separate name and value
fields to support filtering with the
contains()
function. For more
information, see
Filtering on array-type
fields.
Request message for listing the attack paths for a given simulation or valued
resource.
Response message for listing the attack paths for a given simulation or
valued resource.
Request message for listing BigQuery exports at a given scope e.g.
organization, folder or project.
Response message for listing BigQuery exports.
Request message for listing findings.
Response message for listing findings.
Request message for listing mute configs at a given scope e.g. organization,
folder or project. If no location is specified, default is
global.
Response message for listing mute configs.
Request message for listing notification configs.
Response message for listing notification configs.
Request message to list resource value configs of a parent
Response message to list resource value configs
Request message for listing sources.
Response message for listing sources.
Request message for listing the valued resources for a given simulation.
Response message for listing the valued resources for a given simulation.
Contains information related to the load balancer associated with the
finding.
An individual entry in a log.
A mute config is a Cloud SCC resource that contains the configuration
to mute create/update events of findings.
Cloud Security Command Center (Cloud SCC) notification configs.
Cloud SCC’s Notification
Contains information about the org policies associated with the finding.
Package is a generic definition of a package.
Represents an operating system process.
Additional Links
Information related to the Google Cloud resource.
A resource value config (RVC) is a mapping configuration of user’s resources
to resource values. Used in Attack path simulations.
Metadata about a ResourceValueConfig. For example, id and name.
SecurityBulletin are notifications of vulnerabilities of Google products.
User specified security marks that are attached to the parent Security
Command Center resource. Security marks are scoped within a Security Command
Center organization – they can be modified and viewed by all users who have
proper permissions on the organization.
Represents a posture that is deployed on Google Cloud by the
Security Command Center Posture Management service.
A posture contains one or more policy sets. A policy set is a
group of policies that enforce a set of security rules on Google
Cloud.
Identity delegation history of an authenticated service account.
Request message for updating a finding’s state.
Request message for updating a finding’s mute status.
Attack path simulation
Security Command Center finding source. A finding source
is an entity or a mechanism that can produce a finding. A source is like a
container of findings that come from the same scanner, logger, monitor, and
other tools.
Request message for updating a BigQuery export.
Request message for updating a ExternalSystem resource.
Request message for updating or creating a finding.
Request message for updating a mute config.
Request message for updating a notification config.
Request message to update resource value config
Request message for updating a SecurityMarks resource.
Request message for updating a source.
A resource that is determined to have value to a user’s system
Refers to common vulnerability fields e.g. cve, cvss, cwe etc.