- 27 Mar 2025
- 5 Minutes to read
- Print
- DarkLight
Google Security Command Center
- Updated on 27 Mar 2025
- 5 Minutes to read
- Print
- DarkLight
Security Command Center is Google Cloud's centralized vulnerability and threat reporting service. Security Command Center helps you strengthen your security posture by evaluating your security and data attack surface; providing asset inventory and discovery; identifying misconfigurations, vulnerabilities and threats; and helping you mitigate and remediate risks.
For more information refer to Google Cloud Command Center official documentation.
Integration Method: API
Tables: Compliance Finding (2003), Detection Finding (2004), Vulnerability Finding (2002)
This integration supports the following events.
Event | Description |
---|---|
Findings | Retrieves a collection of findings that have been detected across all sources within an organization in Google Security Command Center (SCC). |
This integration supports the following versions.
Google Security Command Center API Version | v2 |
Note:
As of this document preparation, latest release was on March 14, 2025.
Prerequisites
The user should have access to the Google Cloud Platform (GCP) console and ensure Google Security Command Center (SCC) is activated at the organization level.
The user should generate or access service account credentials to authenticate REST API calls. To create a service account, open the Service accounts page in GCP, select or create a project, and click Create service account.
The user should have access to the DataBee console.
Configuration Overview
Generate a service account with the required scopes and its private key.
Add the Security Command Center (SCC) data feed in the DataBee console with the below parameters.
DataBee Parameter
Security Command Center (SCC) Parameter
Client Email
Service account email id
Admin Email
Domain admin email id
Private Key
Google Security Command Center Configuration
Setting Up the New Project
Login to your Google Cloud Platform console.
On your console, click on your organization name in the Navigation bar.
On “Select a resource” window click on NEW PROJECT.
On the “New Project” window, enter your project name and click on Create.
Setting Up the service account
Perform the following steps to set up Google Workspace credentials on your Google console:
Navigate to console.cloud.google.com, and log into the Google account where you want to set up your Google Workspace credentials.
Navigate to APIs & Services > Enabled APIs & services.
Click on the search bar.
Search for the Admin SDK API. Select the Admin SDK API.
In “Admin SDK API”, select the ENABLE button to enable the Admin SDK API. Making calls to this API lets you view and manage resources such as user, groups, and audit and usage reports of your domain.
Navigate to IAM & Admin > Service Accounts.
In the Service Accounts page, select CREATE SERVICE ACCOUNT > Service Accounts.
In “Create service account” page, perform the following steps:
Name your service account and select CREATE AND CONTINUE.
Grant your service account access to a project.
Select Continue.
Grant users access to your service account.
Select DONE.
Plan activation of Google Security Command Center
Login to your Google Cloud Platform console.
Select the organization that you want to enable Security Command Center for, and then click Select.
Click on Security > Risk Overview.
In Select tier, select a tier. Click Next.
Click On UPDATE YOUR TIER.
After ensuring that the Google SCC service is activated on an organization-level, we need to get the service account's credentials for accessing the service via REST calls.
Getting Client ID and Private Key
In Credentials, navigate to your new service account name, and select your new service account name.
In the “Service account details” page for your new service account, perform the following steps:
Navigate to the Unique ID, and copy the contents of the Unique ID.
This is also your Client ID.
Navigate to the KEYS tab.
Select ADD KEY > Create new key.
Select the JSON key type and click CREATE.
Save the key type as JSON file to your selected directory. Below is the sample private key.
Note:
Your new public/private key pair is generated and downloaded to your machine, and it serves as the only copy of this key. Kindly store it in a secure place.
Setting Up Domain Wide Delegation
Navigate to admin.google.com.
Navigate to Security > Access and data control > API controls.
In “API Controls” page, navigate to Domain wide delegation, and select MANAGE DOMAIN WIDE DELEGATION.
In “Domain-wide Delegation” page, select Add new to add a new client ID.
In the “Add a new client ID” window, perform the following steps:
In the ‘Client ID’ field, paste the Client ID that is present under client_id key of the private key file of the service account.
In the ‘OAuth scopes (comma-delimited)’ field, add the following read-only scope to fetch users, deleted users, roles, and mobile devices data:
https://www.googleapis.com/auth/cloud-platform
Assign IAM Roles to Service Account
To assign roles to the newly created service account, follow below steps:
Go to the Google Cloud Console and open Google Cloud Console.
In the left-hand navigation pane, click on IAM & Admin.
Then select IAM.
Ensure you have selected the correct organization from the project/organization selector at the top of the page.
Click on the Add button at the top of the IAM page.
Click on GRANT ACCESS.
In the ‘New members’ field, enter the email address of the service account you created.
In the ‘Select a role’ dropdown, choose the appropriate role(s) you want to assign to the service account. You can search for roles or browse through the categories. The roles mentioned below are the minimum required roles for accessing Google SCC API.
Organization Admin
Security Center Admin Viewer
Click the SAVE button to apply the role to the service account.
DataBee Configuration
Login to the DataBee UI, navigate to Data > Data Feeds and click the Add New Data Feed button.
Search for the Google Security Command Center option using the search bar in the “Add new data feed” page.
Click on the API Ingest option for the collection method.
Enter feed contact information and click Next.
In the configuration details dialog, enter the following:
Authorization Method: Google OAuth2
API Base URL: replace the <instance> placeholder with value based on the location of your GCP account as listed below.
global: securitycenter
me-central-2: securitycenter.me-central2.rep
Organization ID: enter the org id. Refer to link for more information.
Token URL: enter https://oauth2.googleapis.com/token
Private Key: paste the private key inside the Service Account JSON file downloaded earlier.
Client Email: enter the email address during the service account creation process.
Example:
Correct Format: MIIEvQIBADANBgkqhkiG9w0BAQEFAASCBKcwggSjAgEAA
Incorrect Format: -----BEGIN PRIVATE KEY----\nMIIEvQIBADANBgkqhkiG9w0BAQEFAASCBKcwggSjAgEAA\n-----END PRIVATE KEY-----\n
Admin Email: enter the email address of the user for which the application is requesting delegated access. If there is no domain-wide authority delegated to the service account, enter the same email as entered in the Client Email field.
Click Submit.
Troubleshooting Tips
If you’re facing invalid_client or unauthorized_client issues, this might be due to incorrect service account credentials. Ensure the private key is pasted correctly. Since you cannot view the key after the first time, re-create the service account key, paste it into a text editor to verify there are no spaces or unexpected characters, and reconfigure the DataBee feed.
If you are facing a 403 response code, this might be due to missing permissions. Ensure that the service account has the required Google Security Command Center roles and permissions as per the steps mentioned above.