Skip to main content

Table of Contents

 

134479i8153CB5F28621AB7.png

The Security Command Center Enterprise’s Vulnerabilities Dashboard allows you to find potential weaknesses in your Google Cloud resources.

 

Actions

134480i0A7D8828FE8453A9.png

Vulnerabilities Dashboard

It’s your go-to tool for identifying potential weaknesses in your Google Cloud environment. Let’s explore how it works:

 

 


Steps
  1. Users will see the Vulnerabilities Dashboard, with the Query Presets at the top of the dashboard.
  2. Below the Query Presets, users will see a Filters option, that will show the following Filter options when selected:
    1. Status
    2. Cloud Provider
    3. Last Scanned
    4. Category
    5. Module ID
    6. Recommendation
    7. Standards
  3. Those Filter Options are the columns in the Vulnerabilities Dashboard list.
  4. The Vulnerabilities Dashboard list columns also include the following columns:
    1. Active Findings 
      • Severity
      • Count
    2. Standards
  5. Users can click any highlighted links in the Vulnerabilities Dashboard list to view Vulnerabilities in the Google SCCE Cloud Platform’s Findings feature. This page will include Vulnerabilities Query Results.
Relevant Documentation Links
  • https://cloud.google.com/security-command-center/docs/vulnerabilities-prioritize-remediation

 

 

Next Step: Security Command Center Enterprise: Step 2.4 - Visualization | Compliance 

Previous Step: Security Command Center Enterprise: Step 2.2 - Visualization | Threats 

Be the first to reply!

Reply