Security Command Center documentation

Security Command Center is Google Cloud's centralized vulnerability and threat reporting service. Security Command Center helps you strengthen your security posture by evaluating your security and data attack surface; providing asset inventory and discovery; identifying misconfigurations, vulnerabilities and threats; and helping you mitigate and remediate risks.

Go to the Security Command Center product page for more.

Start your proof of concept with 300ドル in free credit

  • Get access to Gemini 2.0 Flash Thinking
  • Free monthly usage of popular products, including AI APIs and BigQuery
  • No automatic charges, no commitment

Keep exploring with 20+ always-free products

Access 20+ free products for common use cases, including AI APIs, VMs, data warehouses, and more.

Explore self-paced training, use cases, reference architectures, and code samples with examples of how to use and connect Google Cloud services.
Training
Training and tutorials

Enabling real-time email and chat notifications

Use Pub/Sub and Cloud Functions to send Security Command Center findings to email and messaging apps.

Training
Training and tutorials

Google Cloud Skills Boost for Security Command Center

View lectures, demos, and hands-on labs to learn about a variety of Security Command Center controls and techniques.

Training
Training and tutorials

Getting Started with Cloud Shell & gcloud

Learn how to use Cloud Shell and the Cloud SDK gcloud command.

Use case
Use cases

OWASP Top 10 mitigation options on Google Cloud

This guide helps you defend against common application-level attacks that are outlined in OWASP Top 10.

OWASP Security Cloud Threats Vulnerabilities

Use case
Use cases

Take control of security with Cloud Security Command Center

Watch a video to learn how you can quickly respond to threats and hear from a customer that is using Security Command Center in their workflow.

Security Cloud Threats

Use case
Use cases

Enterprise foundations guide

This comprehensive guide helps you build security into your Google Cloud deployments.

Security Cloud Threats

Use case
Use cases

Google Cloud Well-Architected Framework

The Well-Architected Framework provides recommendations and describes best practices to help architects, developers, administrators, and other cloud practitioners design and operate a cloud topology that's secure.

Security Cloud Enterprise

Code sample
Code Samples

Python API samples

Includes samples for managing assets, findings, notifications, and settings.

Code sample
Code Samples

Node.js API samples

Includes samples for managing assets, findings, notifications, and settings.

Code sample
Code Samples

Go API samples

Includes samples for managing assets, findings, notifications, and settings.

Code sample
Code Samples

Java API samples

Includes samples for managing assets, findings, notifications, and settings.

Related videos

Except as otherwise noted, the content of this page is licensed under the Creative Commons Attribution 4.0 License, and code samples are licensed under the Apache 2.0 License. For details, see the Google Developers Site Policies. Java is a registered trademark of Oracle and/or its affiliates.

Last updated 2025年10月13日 UTC.