🔧 Tools in GCP Security Tools

Google Cloud Security Command Center

Unified security and risk management for Google Cloud.

Centralized visibility and control over your cloud security posture.

For more tool information ➜

Google Cloud Armor

DDoS protection and Web Application Firewall (WAF) service.

Protects Google Cloud applications and websites from denial of service and web attacks.

For more tool information ➜

Chronicle Security Operations

Cloud-native SIEM and SOAR platform.

A security operations suite that ingests and analyzes security telemetry to detect and respond to threats.

For more tool information ➜

BeyondCorp Enterprise

A zero trust, secure access platform.

Enables secure access to applications and resources based on user and device trust, regardless of network location.

For more tool information ➜

Cloud Data Loss Prevention (DLP)

Discover, classify, and protect your sensitive data.

A fully managed service to help you manage sensitive data.

For more tool information ➜

Cloud IDS

Cloud-native intrusion detection system.

Detects malware, spyware, command-and-control attacks, and other network threats.

For more tool information ➜

Cloud Key Management Service (KMS)

Manage encryption keys on Google Cloud.

A centralized cloud service for managing cryptographic keys.

For more tool information ➜

Secret Manager

Store, manage, and access secrets securely.

A secure storage system for API keys, passwords, certificates, and other sensitive data.

For more tool information ➜

Identity and Access Management (IAM)

The right access for the right people.

Defines who can do what on which Google Cloud resources.

For more tool information ➜

Identity-Aware Proxy (IAP)

Secure access to your applications.

Uses identity and context to guard access to your applications and VMs.

For more tool information ➜

VPC Service Controls

Mitigate data exfiltration risks.

Creates a service perimeter to protect data in Google Cloud services.

For more tool information ➜

Binary Authorization

Deploy only trusted containers.

A deploy-time security control that ensures only trusted container images are deployed on GKE or Cloud Run.

For more tool information ➜

Cloud Audit Logs

Who did what, where, and when?

Provides detailed audit trails for activity in your Google Cloud environment.

For more tool information ➜

Access Transparency

Visibility into Google Cloud administrator access.

Provides logs of actions taken by Google staff when they access your data.

For more tool information ➜

Assured Workloads

Compliance without compromise.

Helps you meet compliance requirements for your regulated workloads.

For more tool information ➜

Certificate Authority Service

A highly available, scalable, and private CA.

A managed service to simplify the deployment and management of private certificate authorities.

For more tool information ➜

Confidential Computing

Encrypt your data in use.

Encrypts data while it is being processed.

For more tool information ➜

Cloud Firewall

Globally distributed firewall service.

A fully distributed, stateful firewall service that protects your VPC networks.

For more tool information ➜

Security Key Enforcement

Protect your accounts with phishing-resistant 2FA.

Enforces the use of security keys for 2-Step Verification.

For more tool information ➜

Resource Manager

Manage resources hierarchically.

Provides tools to organize, manage, and govern your Google Cloud resources.

For more tool information ➜