Google Cloud (GCP)
Google Cloud provides enterprise-grade services like compute, data analytics, AI, and networking, designed for scalability and innovation across industries.
Understand security responsibilities
See how security tasks are shared between you and Google Cloud to ensure your cloud environment is protected.
Native security products
- Google Security Operations
- Analytics platform for threat detection, investigation, and response. Aggregates and analyzes enterprise security data, enabling rapid insights and automated actions.
Open-source projects
- Cartography
- Multi-cloud asset mapping tool for visualizing relationships and supporting security assessments across services.
- Chainloop
- Supply chain security platform managing artifacts and verifying policies throughout the software development lifecycle.
- Checkov
- Static analysis tool scanning IaC frameworks like Terraform and Kubernetes to identify security misconfigurations.
- Cilium
- Cloud-native networking and security platform using eBPF for high-performance policy enforcement and observability.
- Cloudbeat
- Cloud asset and security posture monitoring tool providing visibility and alerting to enhance cloud security.
- CloudQuery
- SQL-based cloud asset inventory querying tool for security checks, compliance management, and cost analysis.
- CloudSploit
- Cloud security scanner identifying misconfigurations and permission risks across multiple cloud services.
- DefectDojo
- Vulnerability management platform for tracking security findings and streamlining remediation processes across environments.
- Falco
- Runtime security monitor for Kubernetes and containers, detecting abnormal behaviors and enforcing policies.
- Fix Inventory
- Compliance and asset inventory tool identifying misconfigurations and security risks in cloud environments.
- Gapps
- Google Workspace security analyzer focusing on permissions and potential security issues within cloud environments.
- KubeArmor
- Kubernetes runtime security enforcer monitoring and enforcing policies on system calls, network, and file operations.
- Kubescape
- Kubernetes security posture management tool scanning clusters against compliance frameworks and best practices.
- Magpie
- Cloud data discovery tool identifying, classifying, and securing data assets across cloud storage services.
- OpenVAS Scanner
- Comprehensive vulnerability scanner assessing network security and generating detailed risk reports.
- Prowler
- Multi-cloud security assessment tool for auditing best practices, compliance, and threat monitoring.
- S3Scanner
- Amazon S3 bucket security assessment tool identifying publicly accessible or misconfigured buckets.
- Scout Suite
- Multi-cloud security auditing tool analyzing configurations to find weaknesses across major cloud platforms.
- Steampipe
- SQL-based query tool for cloud services and APIs, aiding in infrastructure analysis and security assessments.
- ThreatMapper
- Runtime vulnerability scanner for cloud workloads, identifying and prioritizing risks in active services.
- Trivy
- Multi-platform security scanner for container images, file systems, and Git repositories, detecting vulnerabilities.
- Wazuh
- Comprehensive security monitoring platform for log analysis, threat detection, and compliance management.
- ZeusCloud
- Cloud security posture management platform offering visibility, compliance checks, and security recommendations.