Table of Contents
The Security Command Center Enterprise’s Vulnerabilities Dashboard allows you to find potential weaknesses in your Google Cloud resources.
Actions
Vulnerabilities Dashboard
It’s your go-to tool for identifying potential weaknesses in your Google Cloud environment. Let’s explore how it works:
Steps
- Users will see the Vulnerabilities Dashboard, with the Query Presets at the top of the dashboard.
- Below the Query Presets, users will see a Filters option, that will show the following Filter options when selected:
- Status
- Cloud Provider
- Last Scanned
- Category
- Module ID
- Recommendation
- Standards
- Those Filter Options are the columns in the Vulnerabilities Dashboard list.
- The Vulnerabilities Dashboard list columns also include the following columns:
- Active Findings
- Severity
- Count
- Standards
- Active Findings
- Users can click any highlighted links in the Vulnerabilities Dashboard list to view Vulnerabilities in the Google SCCE Cloud Platform’s Findings feature. This page will include Vulnerabilities Query Results.
Relevant Documentation Links
https://cloud.google.com/security-command-center/docs/vulnerabilities-prioritize-remediation
Next Step: Security Command Center Enterprise: Step 2.4 - Visualization | Compliance
Previous Step: Security Command Center Enterprise: Step 2.2 - Visualization | Threats