Google Cloud (GCP)

Google Cloud provides enterprise-grade services like compute, data analytics, AI, and networking, designed for scalability and innovation across industries.

Understand security responsibilities

See how security tasks are shared between you and Google Cloud to ensure your cloud environment is protected.

Native security products

Google Security Operations
Analytics platform for threat detection, investigation, and response. Aggregates and analyzes enterprise security data, enabling rapid insights and automated actions.

Product vendors

AccuKnox
Aikido
AlgoSec
Aqua Security
ARMO
Astrix Security
Bright Security
Chainloop
Check Point
Cisco
Cloudflare
CloudQuery
Clutch
CrowdStrike
Curity
CyberArk
Cyera
Cyscale
Cyware
Darktrace
Datadog
Deepfence
Deepsource
DefectDojo
Elastic
Endor Labs
Entro
Fix Security
Fortinet
GitGuardian
Google
Greenbone
HashiCorp
Hunters
JupiterOne
Lineaje
Matano
Netwrix
Noq
Normalyze
OASIS Security
Okta
Open Raven
OpsHelm
Orca Security
Palo Alto Networks
Pangea
Plerion
Prowler
Qualys
Query
Radware
Rapid7
Red Canary
Runecast
RunReveal
Salt Security
Seemplicity
SentinelOne
Sentra
Skyflow
Slauth.io
Snyk
Sonar
Sonrai Security
Sophos
Soveren
SpecterOps
Spyderbat
Stream Security
StrongDM
Sweet Security
Sysdig
Tenable
Tigera
Tines
Torq
Trellix
Turbot
Twingate
UpGuard
Upwind
Varonis
Wazuh
Wiz
X1F
Zscaler

Open-source projects

Cartography
Multi-cloud asset mapping tool for visualizing relationships and supporting security assessments across services.
Chainloop
Supply chain security platform managing artifacts and verifying policies throughout the software development lifecycle.
Checkov
Static analysis tool scanning IaC frameworks like Terraform and Kubernetes to identify security misconfigurations.
Cilium
Cloud-native networking and security platform using eBPF for high-performance policy enforcement and observability.
Cloudbeat
Cloud asset and security posture monitoring tool providing visibility and alerting to enhance cloud security.
CloudQuery
SQL-based cloud asset inventory querying tool for security checks, compliance management, and cost analysis.
CloudSploit
Cloud security scanner identifying misconfigurations and permission risks across multiple cloud services.
DefectDojo
Vulnerability management platform for tracking security findings and streamlining remediation processes across environments.
Falco
Runtime security monitor for Kubernetes and containers, detecting abnormal behaviors and enforcing policies.
Fix Inventory
Compliance and asset inventory tool identifying misconfigurations and security risks in cloud environments.
Gapps
Google Workspace security analyzer focusing on permissions and potential security issues within cloud environments.
KubeArmor
Kubernetes runtime security enforcer monitoring and enforcing policies on system calls, network, and file operations.
Kubescape
Kubernetes security posture management tool scanning clusters against compliance frameworks and best practices.
Magpie
Cloud data discovery tool identifying, classifying, and securing data assets across cloud storage services.
OpenVAS Scanner
Comprehensive vulnerability scanner assessing network security and generating detailed risk reports.
Prowler
Multi-cloud security assessment tool for auditing best practices, compliance, and threat monitoring.
S3Scanner
Amazon S3 bucket security assessment tool identifying publicly accessible or misconfigured buckets.
Scout Suite
Multi-cloud security auditing tool analyzing configurations to find weaknesses across major cloud platforms.
Steampipe
SQL-based query tool for cloud services and APIs, aiding in infrastructure analysis and security assessments.
ThreatMapper
Runtime vulnerability scanner for cloud workloads, identifying and prioritizing risks in active services.
Trivy
Multi-platform security scanner for container images, file systems, and Git repositories, detecting vulnerabilities.
Wazuh
Comprehensive security monitoring platform for log analysis, threat detection, and compliance management.
ZeusCloud
Cloud security posture management platform offering visibility, compliance checks, and security recommendations.