Security configuration for Google Cloud Platform

Note

Microsoft Defender for Cloud Apps (previously known as Microsoft Cloud App Security) is now part of Microsoft 365 Defender. The Microsoft 365 Defender portal allows security admins to perform their security tasks in one location. This will simplify workflows, and add the functionality of the other Microsoft 365 Defender services. Microsoft 365 Defender will be the home for monitoring and managing security across your Microsoft identities, data, devices, apps, and infrastructure. For more information about these changes, see Microsoft Defender for Cloud Apps in Microsoft 365 Defender.

Microsoft Defender for Cloud Apps provides you with a security configuration assessment of your Google Cloud Platform (GCP) environment. This assessment provides fundamental security recommendations based on the Center for Internet Security (CIS) benchmark for GCP, version 1.1.0.

This assessment provides an organizational view of security configuration recommendations of all GCP projects and enables security admins to investigate of security configuration gaps and initiate remediation by the resource owners.

Prerequisites

How to view GCP security recommendations

  1. In Defender for Cloud Apps, browse to Investigate > Security configuration, and then select the Google Cloud Platform tab.

    Note

    It might take up to 15 minutes before your changes take effect.

    security configuration menu.

  2. You can filter the recommendations by type, by resource, and by subscription. Additionally, you can click on the security configuration icon GCP Security Command Center icon. to open the recommendation in GCP Security Command Center for more information and to deep dive into the recommendation.

    Note

    To make investigation even simpler, you can create custom queries and save them for later use. After you've finished building your query, click the Save as button in the top right corner of the filters. In the Save query pop-up, name your query.

    security configuration.

  3. Select a recommendation to view additional information about the recommendation including a description and detailed remediation guidelines.

    security configuration recommendation.

Next steps

If you run into any problems, we're here to help. To get assistance or support for your product issue, please open a support ticket.