Skip to main content
Solved

SCCP Toxic Combination Findings in SOAR Cases

  • October 22, 2025
  • 8 replies
  • 107 views

ar3diu
Forum|alt.badge.img+8

For SCCE customers, there’s a a SOAR SCC Enterprise Response Integration that can be used for ingesting Toxic Combination findings and syncing their status. What should I use if I have SCCP and SecOps? I can’t find the SCC Enterprise integration on the Marketplace. I can’t also import it from another instance. 

A detection rule in SIEM would be the easiest way to go but it looks like a new log is written in SIEM every time the toxic combination finding is updated by SCC engine. 

Any suggestions?

Best answer by kentphelps

@ar3diu Take a look at Google SecOps Response Integrations release notes

Google Security Command Center: Version 14.0

  • Added the ability to ingest Toxic Combinations and Chokepoints in the following connector:

    • Google Security Command Center - Findings Connector

8 replies

kentphelps
Staff
Forum|alt.badge.img+11
  • Staff
  • October 24, 2025

ar3diu
Forum|alt.badge.img+8
  • Author
  • Silver 2
  • October 27, 2025

@kentphelps But the Google Security Command Center doesn’t support collection of the Toxic Combination findings

 


kentphelps
Staff
Forum|alt.badge.img+11
  • Staff
  • October 27, 2025

If you go under Findings do you see Toxic Combinations and Chokepoints under Quick Filters for Finding Class?
 

 


ar3diu
Forum|alt.badge.img+8
  • Author
  • Silver 2
  • October 27, 2025

Yes. 


kentphelps
Staff
Forum|alt.badge.img+11
  • Staff
  • October 27, 2025

The SOAR connector had not been updated to include the new classes.  I opened a ticket to get the product team to update the connector.  I am afraid I do not have a time frame for that.


kentphelps
Staff
Forum|alt.badge.img+11
  • Staff
  • Answer
  • November 13, 2025

@ar3diu Take a look at Google SecOps Response Integrations release notes

Google Security Command Center: Version 14.0

  • Added the ability to ingest Toxic Combinations and Chokepoints in the following connector:

    • Google Security Command Center - Findings Connector

_K_O
Forum|alt.badge.img+12
  • Bronze 5
  • November 13, 2025

With the update you should see all of the categories flowing into SecOps now. Here’s a basic query to show the different log types that are being ingested for SCC:
 

metadata.product_name = "Security Command Center"
match:
metadata.log_type
outcome:
$event_count = count(metadata.id)

 

YMMV:

 


ar3diu
Forum|alt.badge.img+8
  • Author
  • Silver 2
  • November 17, 2025

Thanks ​@kentphelps ! 🙌