![](https://cdn.qwiklabs.com/assets/labs/start_lab-f45aca49782d4033c3ff688160387ac98c66941d.png)
Before you begin
- Labs create a Google Cloud project and resources for a fixed time
- Labs have a time limit and no pause feature. If you end the lab, you'll have to restart from the beginning.
- On the top left of your screen, click Start lab to begin
Create a continuous export pipeline to Pub/Sub
/ 20
Export findings to a BigQuery dataset
/ 50
Export findings to a Cloud Storage bucket and create a BigQuery table
/ 30
Security Command Center (SCC) is a security monitoring platform that helps users accomplish the following:
In this lab, you learn about Security Command Center by exploring the service’s analyzed assets and export features.
In this lab, you learn how to perform the following tasks:
It is recommended that you're familiar with the following before starting this lab:
Read these instructions. Labs are timed and you cannot pause them. The timer, which starts when you click Start Lab, shows how long Google Cloud resources are made available to you.
This hands-on lab lets you do the lab activities in a real cloud environment, not in a simulation or demo environment. It does so by giving you new, temporary credentials you use to sign in and access Google Cloud for the duration of the lab.
To complete this lab, you need:
Click the Start Lab button. If you need to pay for the lab, a dialog opens for you to select your payment method. On the left is the Lab Details pane with the following:
Click Open Google Cloud console (or right-click and select Open Link in Incognito Window if you are running the Chrome browser).
The lab spins up resources, and then opens another tab that shows the Sign in page.
Tip: Arrange the tabs in separate windows, side-by-side.
If necessary, copy the Username below and paste it into the Sign in dialog.
You can also find the Username in the Lab Details pane.
Click Next.
Copy the Password below and paste it into the Welcome dialog.
You can also find the Password in the Lab Details pane.
Click Next.
Click through the subsequent pages:
After a few moments, the Google Cloud console opens in this tab.
Cloud Shell is a virtual machine that is loaded with development tools. It offers a persistent 5GB home directory and runs on the Google Cloud. Cloud Shell provides command-line access to your Google Cloud resources.
Click Activate Cloud Shell at the top of the Google Cloud console.
Click through the following windows:
When you are connected, you are already authenticated, and the project is set to your Project_ID,
gcloud
is the command-line tool for Google Cloud. It comes pre-installed on Cloud Shell and supports tab-completion.
Output:
Output:
gcloud
, in Google Cloud, refer to the gcloud CLI overview guide.
Cymbal Bank is an American retail bank with over 2,000 branches in all 50 states. It offers comprehensive debit and credit services that are built on top of a robust payments platform. Cymbal Bank is a digitally transforming legacy financial services institution.
Cymbal Bank was founded in 1920 under the name Troxler. Cymbal Group acquired the company in 1975 after it had been investing heavily in Cymbal Group's proprietary ATMs. As the bank grew into a national leader, they put strategic emphasis on modernizing the customer experience both in-person at their branches and digitally through an app they released in 2014. Cymbal Bank employs 42,000 people nationwide and, in 2019, reported $24 billion in revenue.
Cymbal Bank is interested in integrating a centralized security monitoring platform to help monitor threats and remediate vulnerabilities across their Google Cloud resources in their corporate banking applications. As a Cloud Security Engineer, you are tasked with learning about Security Command Center's export and analytics features so you can deliver a presentation to the CTO on the services' benefits.
Security Command Center can export security findings to external resources using several methods, including the following:
In this task, you explore how to configure continuous exports of findings to Pub/Sub.
Continuous exports to Pub/Sub are typically used for forwarding findings to external security management systems such as Splunk or QRadar.
For the purposes of this lab, you export your findings to a Pub/Sub topic and then simulate an application by fetching the messages from a Pub/Sub subscription.
Before you can start configuring an SCC export, you first need to create a Pub/Sub topic and subscription.
Pub/Sub
in the search field and press Enter. Then click on the uppermost search result, Pub/Sub.export-findings-pubsub-topic
for the Topic ID.This automatically kicks off the creation process for both a Pub/Sub topic and an associated subscription.
Click Subscriptions in the left-hand menu.
Click on export-findings-pubsub-topic-sub. If you don't see the subscription listed, refresh the browser page.
This provides you with a dashboard of statistics and metrics related to the messages published in this subscription.
In the Cloud console, on the Navigation menu (), click Security > Risk Overview and then click Settings at the top of the page.
Click on the Continuous Exports tab.
Click the Create Pub/Sub Export button.
For the Continuous export name, enter in export-findings-pubsub
.
For the Continuous export description, enter in Continuous exports of Findings to Pub/Sub and BigQuery
.
For the Project name, select
In the Select a Cloud Pub/Sub topic field, select the projects/
Set the findings query to the following:
This query ensures that all new ACTIVE
and NOT MUTED
findings are forwarded to the newly created Pub/Sub topic.
You have now created a continuous export from Security Command Center to Pub/Sub.
In this section, you create new findings and check how they are exported to Pub/Sub.
Open a new Cloud Shell session ().
Run the following command to create a new virtual machine:
Output:
ERROR: (gcloud.compute.instances.create) You do not currently have an active account selected
, re-run the command again.This command creates a new VM instance with a public IP address and a default service account attached.
Performing this activity immediately generates three new vulnerability findings:
On the Google Cloud console title bar, type Pub/Sub
in the search field and press Enter. Then click on the uppermost search result, Pub/Sub. Then click Subscriptions in the left-hand menu.
Select the export-findings-pubsub-topic-sub subscription.
Click the Messages tab.
Select the Enable ack messages checkbox.
Click the Pull button.
You should receive a list of messages in this subscription. These relate to the public IP address, default service account used, and compute secure boot disabled vulnerabilities.
By pulling the messages from the Pub/Sub subscription, you have simulated the behavior of an application that can forward these messages to another security monitoring system such as Splunk.
Click Check my progress to verify the objective.
SCC findings can also be exported to a BigQuery dataset. This might be useful for building analytical dashboards that you can use to check what type of findings appear in your organization most often.
As of now, configuring continuous exports can only be set using commands (i.e. not in the console).
Ensure you receive a similar output message to the following.
Output:
Once new findings are exported to BigQuery, SCC creates a new table. You can now initiate new SCC findings.
Once new findings are created in SCC, they are exported to BigQuery. For storing them, the export pipeline creates a new table called findings
.
Soon after you should receive output similar to the following.
Output:
Click Check my progress to verify the objective.
Security Command Center is typically enabled in pre-existing and mature Google Cloud infrastructures. As soon as the SCC is enabled, it starts scanning existing vulnerabilities and eventually might report thousands of findings on existing infrastructure.
The SCC interface might not provide the best way to sort and filter such findings, so exporting these findings to a BigQuery database is a common practice for running analytics against findings.
Direct exporting of findings to BigQuery is not supported yet. Instead, you can use a Google Cloud Storage bucket as an interim storage solution.
To export existing findings to a BigQuery interface, you need to export them first to a Cloud Storage bucket. In this section, you create the storage bucket.
In the Cloud console, on the Navigation menu (), click Cloud Storage > Buckets.
Click the Create button.
Every bucket name in Google Cloud must be unique. Set the bucket name to scc-export-bucket-
Click Continue.
Set the Location type to Region.
Choose
Do not change any other settings. Scroll down the page and click Create.
Click the Confirm button when asked whether to "Enforce public access prevention" on this bucket.
In this section, you export your findings for use in a BigQuery database.
In the Cloud console, on the Navigation menu (), click Security > Findings.
Click the Export button.
From the dropdown list, select Cloud Storage.
For the project name, Select the Project ID as
Then select the Export path by clicking the Browse button.
Click the arrow next to the scc-export-bucket-
Set the filename to findings.jsonl
and click Select.
In the Format drop-down list, select JSONL.
Change the Time Range to All time.
Do not modify the default findings query.
The final "Export to" form should look similar to the following.
In this section, you use the exported findings data to create a table in BigQuery.
In the Cloud console, on the Navigation menu (), click BigQuery > BigQuery Studio.
From the left-hand Explore menu, click on the Add button.
In a new Add window, click on Google Cloud Storage and set the following parameters:
Setting | Value |
---|---|
Create table from | Google Cloud Storage |
Select the file from GCS bucket | scc-export-bucket- |
File format | JSONL |
Dataset | continuous_export_dataset |
Table | old_findings |
Schema | Enable the "Edit as text" toggle |
Click the Create table button.
Once the new table is created, click the link in the notification that says, Go to table.
Click the Preview tab and confirm you can view your existing findings.
Click Check my progress to verify the objective.
In this lab, you have learned about Security Command Center and analyzed assets as well as exported findings to BigQuery.
...helps you make the most of Google Cloud technologies. Our classes include technical skills and best practices to help you get up to speed quickly and continue your learning journey. We offer fundamental to advanced level training, with on-demand, live, and virtual options to suit your busy schedule. Certifications help you validate and prove your skill and expertise in Google Cloud technologies.
Manual Last Updated November 27, 2024
Lab Last Tested March 18, 2024
Copyright 2025 Google LLC All rights reserved. Google and the Google logo are trademarks of Google LLC. All other company and product names may be trademarks of the respective companies with which they are associated.
Questi contenuti non sono al momento disponibili
Ti invieremo una notifica via email quando sarà disponibile
Bene.
Ti contatteremo via email non appena sarà disponibile
One lab at a time
Confirm to end all existing labs and start this one