Skip to main content

GCP

Overview

Visualize and analyze GCP resources across compute, networking, storage, security, serverless, messaging, observability, and DevOps services. Gain actionable insights into resource utilization, governance, and security posture. Monitor resource visibility, identify misconfigurations, ensure compliance with organizational policies, and detect vulnerabilities in infrastructure and data.

Configurations

ConfigurationDescription
Blueprint Account NameA human-readable name for your account that will be used to identify this account across the application.
Gcp Project IDThe unique identifier for your Google Cloud project.
Client IDThe ID of the client associated with the service account for authentication.
Client EmailThe email address associated with the service account used for authentication.
Private Key IDThe unique identifier for the private key associated with the service account.
Private KeyThe private key used to authenticate the service account.
RegionsThe GCP regions where resources will be discovered and monitored.
Billing Export Project(Optional) The GCP project that hosts the BigQuery billing export. Defaults to the main GCP Project ID if not specified. Required for cost enrichment lookups.
Billing Export Dataset(Optional) The BigQuery dataset containing the billing export. Required for cost enrichment lookups.
Billing Export Table(Optional) The BigQuery table name of the billing export (e.g., gcp_billing_export_v1_XXXXXX_XXXXXX). Required for cost enrichment lookups.
Data Crawl FrequencyThe frequency at which Kscope will crawl the account for resources.
Event Crawl FrequencyThe frequency at which Kscope will crawl for events and activity logs.

Permissions

The GCP blueprint requires a Service Account with appropriate IAM roles.

Use our Terraform configuration to automatically create the service account and assign all required roles.

Infrastructure Manager requires a service account to execute Terraform on your behalf. This service account needs the following roles:

RolePurpose
roles/config.agentRequired by Infrastructure Manager to manage deployments
roles/iam.serviceAccountAdminCreate the Kscope crawl service account and generate keys
roles/resourcemanager.projectIamAdminBind IAM roles to the crawl service account

Create the service account and assign the roles:

# Create the service account for Infrastructure Manager
gcloud iam service-accounts create infra-manager-sa \
--display-name="Infrastructure Manager SA" \
--project=YOUR_PROJECT_ID

# Assign required roles
gcloud projects add-iam-policy-binding YOUR_PROJECT_ID \
--member="serviceAccount:infra-manager-sa@YOUR_PROJECT_ID.iam.gserviceaccount.com" \
--role="roles/config.agent"

gcloud projects add-iam-policy-binding YOUR_PROJECT_ID \
--member="serviceAccount:infra-manager-sa@YOUR_PROJECT_ID.iam.gserviceaccount.com" \
--role="roles/iam.serviceAccountAdmin"

gcloud projects add-iam-policy-binding YOUR_PROJECT_ID \
--member="serviceAccount:infra-manager-sa@YOUR_PROJECT_ID.iam.gserviceaccount.com" \
--role="roles/resourcemanager.projectIamAdmin"

Then deploy (replace YOUR_REGION with your preferred Infrastructure Manager location, e.g. us-central1):

gcloud infra-manager deployments apply \
projects/YOUR_PROJECT_ID/locations/YOUR_REGION/deployments/kscope-crawl \
--service-account projects/YOUR_PROJECT_ID/serviceAccounts/infra-manager-sa@YOUR_PROJECT_ID.iam.gserviceaccount.com \
--gcs-source gs://kscope-blueprint-configs/gcp/gcp-latest.zip \
--tf-version-constraint="1.5.7" \
--input-values=project_id=YOUR_PROJECT_ID

[!NOTE] The region above is where Infrastructure Manager stores deployment metadata — it does not affect where resources are created. The Terraform configuration only creates project-level IAM resources, which are global.

After the deployment completes, retrieve the credentials from the Outputs tab:

  1. Open the Infrastructure Manager console
  2. Click on the kscope-crawl deployment
  3. Go to the Outputs tab

The outputs map directly to the Kscope blueprint configuration:

OutputKscope Configuration
project_idGcp Project ID
client_emailClient Email
client_idClient ID
private_key_idPrivate Key ID
private_keyPrivate Key

Manual Setup

Alternatively, you can create a service account manually by clicking here. Please ensure that you give the service account a descriptive name and assign the required IAM roles.

When creating the service account manually, you will need to:

  1. Create the service account
  2. Assign the required IAM roles (see table below)
  3. Generate and download a JSON key file
  4. Extract the Client ID, Client Email, Private Key ID, and Private Key from the JSON file

Required IAM Roles

RoleServices Covered
roles/viewerCompute Engine, Cloud DNS, Cloud Storage, Pub/Sub, Cloud Logging, Cloud Monitoring, Cloud Audit Logs, VPC, NAT, Load Balancer, Endpoints
roles/iam.securityReviewerIAM policies, service accounts, Identity Platform
roles/compute.securityAdminCloud Armor security policies and rules
roles/compute.viewerCompute Engine instances, disks, networks, Cloud CDN backend services
roles/container.viewerGKE clusters, node pools, workloads
roles/cloudsql.viewerCloud SQL instances, databases, users
roles/cloudfunctions.viewerCloud Functions (Gen 1 and Gen 2)
roles/run.viewerCloud Run services, jobs, revisions
roles/redis.viewerMemorystore for Redis instances
roles/firebase.viewerFirebase projects, databases, hosting, storage
roles/artifactregistry.readerArtifact Registry repositories and images
roles/cloudkms.viewerCloud KMS key rings, crypto keys, key versions
roles/secretmanager.viewerSecret Manager secret metadata (does not expose secret values)
roles/bigquery.dataViewerBigQuery datasets and tables (read-only metadata and schema)
roles/accesscontextmanager.policyReaderVPC Service Controls access policies, service perimeters, access levels
roles/cloudbuild.builds.viewerCloud Build triggers, worker pools, builds
roles/datastore.viewerFirestore databases, indexes, collection groups
roles/file.viewerCloud Filestore instances, snapshots, backups
roles/apigateway.viewerAPI Gateway APIs, gateways, configurations
roles/aiplatform.viewerVertex AI models, endpoints, training pipelines
roles/eventarc.viewerEventarc triggers, channels, channel connections
roles/workflows.viewerCloud Workflows definitions and executions
roles/dataproc.viewerDataproc clusters, jobs, workflow templates
roles/composer.viewerCloud Composer environments and configurations
roles/spanner.viewerCloud Spanner instances and databases
roles/cloudtasks.viewerCloud Tasks queues and task metadata
roles/deploymentmanager.viewerDeployment Manager deployments and resources
roles/config.viewerInfrastructure Manager deployments, revisions, and resources
roles/alloydb.viewerAlloyDB clusters and instances
roles/bigtable.viewerCloud Bigtable instances and clusters
roles/dataflow.viewerDataflow jobs and job metadata
roles/datacatalog.viewerData Catalog entry groups, entries, taxonomies, and policy tags

All roles are read-only. No write or admin access is required. Roles are only bound for services that are enabled in your project.

SBOM Generation

The GCP blueprint includes SBOM (Software Bill of Materials) generation for Docker container images stored in Google Artifact Registry. This provides comprehensive vulnerability scanning and dependency analysis for containerized applications.

Artifact Registry repositories with DOCKER format are automatically scanned. The scanner authenticates using OAuth2 access tokens derived from the configured service account credentials.

For information about supported languages and package managers for SBOM generation, see: SBOM

Schema Model

ResourcesSource EntityNormalized EntityDescription
Attached Diskgcp.compute.AttachedDiskStorageA disk attached to a GCP compute instance.
Compute Attributesgcp.compute.ComputeAttributesAttributesAttributes of a GCP compute resource.
Diskgcp.compute.DiskStorageA persistent disk in GCP compute.
Firewallgcp.compute.FirewallFirewallA firewall for controlling network traffic.
Firewall Rulegcp.compute.FirewallRuleRuleA rule defining firewall behavior.
IP Rangegcp.compute.IPRangeIPRangeA range of IPs defined for a network.
Instancegcp.compute.InstanceInstanceA virtual machine instance in GCP.
Networkgcp.compute.NetworkNetworkA virtual network in GCP.
Network Interfacegcp.compute.NetworkInterfaceInterfaceA network interface for compute resources.
Subnetworkgcp.compute.SubnetworkSubnetworkA subnetwork within a GCP virtual network.
DNS Attributesgcp.dns.DNSAttributesAttributesAttributes of a DNS resource in GCP.
DNS Key Specgcp.dns.DnsKeySpecKeySpecSpecification of a DNS key in GCP.
Managed Zonegcp.dns.ManagedZoneZoneA managed DNS zone in GCP.
Managed Zone Cloud Logging Configgcp.dns.ManagedZoneCloudLoggingConfigLoggingConfigLogging configuration for a DNS zone.
Managed Zone DNS Sec Configgcp.dns.ManagedZoneDnsSecConfigDNSConfigDNS security configuration for a zone.
Managed Zone Forwarding Configgcp.dns.ManagedZoneForwardingConfigForwardingConfigForwarding configuration for a DNS zone.
Managed Zone Forwarding Config NameServergcp.dns.ManagedZoneForwardingConfigNameServerTargetNameServerTargetA target name server for forwarding config.
Managed Zone Peering Configgcp.dns.ManagedZonePeeringConfigPeeringConfigPeering configuration for a DNS zone.
Managed Zone Peering Config Target Networkgcp.dns.ManagedZonePeeringConfigTargetNetworkTargetNetworkA target network for peering config.
Managed Zone Private Visibility Configgcp.dns.ManagedZonePrivateVisibilityConfigVisibilityConfigConfiguration for private visibility.
Managed Zone Private Visibility Config GKEgcp.dns.ManagedZonePrivateVisibilityConfigGKEClusterGKEVisibilityGKE cluster configuration for visibility.
Managed Zone Private Visibility Config Networkgcp.dns.ManagedZonePrivateVisibilityConfigNetworkNetworkVisibilityNetwork visibility configuration.
Managed Zone Reverse Lookup Configgcp.dns.ManagedZoneReverseLookupConfigReverseLookupConfiguration for reverse DNS lookup.
Managed Zone Service Directory Configgcp.dns.ManagedZoneServiceDirectoryConfigServiceDirectoryService directory configuration for a zone.
Resource Record Setgcp.dns.ResourceRecordSetRecordSetA set of DNS resource records.
GKE Attributesgcp.gke.GKEAttributesAttributesAttributes of a GKE resource.
GKE Clustergcp.gke.GKEClusterClusterA Kubernetes cluster in GCP.
GKE Node Configgcp.gke.GKENodeConfigNodeConfigConfiguration for a GKE node.
GKE Node Poolgcp.gke.GKENodePoolNodePoolA node pool in a GKE cluster.
ACL Rulegcp.storage.ACLRuleRuleAccess control list rule for storage.
Autoclassgcp.storage.AutoclassClassAutoclass configuration for storage.
Bucketgcp.storage.BucketStorageA storage bucket in GCP.
Bucket Encryptiongcp.storage.BucketEncryptionEncryptionEncryption settings for a bucket.
Bucket Logginggcp.storage.BucketLoggingLoggingLogging settings for a bucket.
Bucket Policy Onlygcp.storage.BucketPolicyOnlyPolicyPolicy configuration for a bucket.
CORSgcp.storage.CORSCORSCross-origin resource sharing configuration.
Custom Placement Configgcp.storage.CustomPlacementConfigPlacementConfigCustom placement configuration.
Lifecyclegcp.storage.LifecycleLifecycleLifecycle rules for storage.
Lifecycle Actiongcp.storage.LifecycleActionActionAn action defined in a lifecycle rule.
Lifecycle Conditiongcp.storage.LifecycleConditionConditionA condition defined in a lifecycle rule.
Lifecycle Rulegcp.storage.LifecycleRuleRuleA rule in a storage lifecycle policy.
Objectgcp.storage.ObjectObjectAn object stored in a GCP bucket.
Project Teamgcp.storage.ProjectTeamTeamA project team configuration.
Retention Policygcp.storage.RetentionPolicyRetentionPolicyRetention policy for a storage bucket.
Soft Delete Policygcp.storage.SoftDeletePolicySoftDeletePolicySoft delete policy for storage.
Storage Attributesgcp.storage.StorageAttributesAttributesAttributes of a storage resource.
Firebase Attributesgcp.firebase.FirebaseAttributesAttributesAttributes of a Firebase project.
Firebase Storage Bucketgcp.firebase.StorageBucketStorageA Firebase storage bucket.
Firebase Database Instancegcp.firebase.DatabaseInstanceDatabaseA Firebase Realtime Database instance.
Firebase Hosting Sitegcp.firebase.HostingSiteHostingSiteA Firebase Hosting site.
Firebase Auth Configgcp.firebase.AuthConfigAuthConfigAuthentication configuration for Firebase.
Firebase Auth Settingsgcp.firebase.AuthSettingsAuthSettingsAuthentication settings for Firebase.
Firebase Functions Configgcp.firebase.FunctionsConfigFunctionsConfigCloud Functions configuration for Firebase.
Firebase Lifecyclegcp.firebase.LifecycleLifecycleLifecycle rules for Firebase storage.
Firebase Lifecycle Rulegcp.firebase.LifecycleRuleRuleA rule in a Firebase storage lifecycle.
Firebase Lifecycle Actiongcp.firebase.LifecycleActionActionAn action in a Firebase lifecycle rule.
Firebase Lifecycle Conditiongcp.firebase.LifecycleConditionConditionA condition in a Firebase lifecycle rule.
Firebase CORSgcp.firebase.CORSCORSCORS configuration for Firebase storage.
Firebase Uniform Bucket Level Accessgcp.firebase.UniformBucketLevelAccessBucketAccessUniform bucket-level access for Firebase.
Identity Attributesgcp.identity.IdentityAttributesAttributesAttributes of an Identity Platform resource.
Identity Tenant Configgcp.identity.TenantConfigTenantConfigIdentity Platform tenant configuration.
Identity Email Configgcp.identity.EmailConfigEmailConfigIdentity Platform email configuration.
Identity Active Usergcp.identity.ActiveUserUserAn active user in Identity Platform.
Identity User Activity Statsgcp.identity.UserActivityStatsUserStatsUser activity statistics.
IAM Service Accountgcp.iam.ServiceAccountServiceAccountA GCP IAM service account.
IAM Policygcp.iam.IAMPolicyPolicyAn IAM policy.
IAM Policy Bindinggcp.iam.IAMPolicyBindingPolicyBindingAn IAM policy binding associating members with roles.
IAM Attributesgcp.iam.IAMAttributesAttributesAttributes of IAM resources.
Cloud Functions Attributesgcp.cloudfunctions.CloudFunctionsAttributesAttributesAttributes of Cloud Functions resources.
Cloud Functiongcp.cloudfunctions.FunctionFunctionA Cloud Function (Gen 1 or Gen 2).
Cloud Function Build Configgcp.cloudfunctions.BuildConfigBuildConfigBuild configuration for a Cloud Function.
Cloud Function Service Configgcp.cloudfunctions.ServiceConfigServiceConfigService configuration for a Cloud Function.
Cloud Run Attributesgcp.cloudrun.CloudRunAttributesAttributesAttributes of Cloud Run resources.
Cloud Run Servicegcp.cloudrun.CloudRunServiceResourceServiceA Cloud Run service.
Cloud Run Revision Templategcp.cloudrun.RevisionTemplateRevisionTemplateA revision template for a Cloud Run service.
Cloud Run Traffic Targetgcp.cloudrun.TrafficTargetTrafficTargetA traffic routing target for Cloud Run.
Cloud Run Containergcp.cloudrun.ContainerContainerA container in a Cloud Run service.
Pub/Sub Attributesgcp.pubsub.PubSubAttributesAttributesAttributes of Pub/Sub resources.
Pub/Sub Topicgcp.pubsub.TopicTopicA Pub/Sub topic.
Pub/Sub Subscriptiongcp.pubsub.SubscriptionSubscriptionA Pub/Sub subscription.
KMS Attributesgcp.kms.KMSAttributesAttributesAttributes of Cloud KMS resources.
KMS Key Ringgcp.kms.KeyRingKeyRingA Cloud KMS key ring.
KMS Crypto Keygcp.kms.CryptoKeyCryptoKeyA cryptographic key in Cloud KMS.
KMS Crypto Key Versiongcp.kms.CryptoKeyVersionKeyVersionA version of a Cloud KMS crypto key.
Secret Manager Attributesgcp.secretmanager.SecretManagerAttributesAttributesAttributes of Secret Manager resources.
Secretgcp.secretmanager.SecretSecretA secret in Secret Manager.
Secret Versiongcp.secretmanager.SecretVersionSecretVersionA version of a secret in Secret Manager.
Logging Attributesgcp.logging.LoggingAttributesAttributesAttributes of Cloud Logging resources.
Log Sinkgcp.logging.LogSinkLogSinkA Cloud Logging log sink.
Log Metricgcp.logging.LogMetricLogMetricA Cloud Logging log-based metric.
Monitoring Attributesgcp.monitoring.MonitoringAttributesAttributesAttributes of Cloud Monitoring resources.
Alert Policygcp.monitoring.AlertPolicyAlertPolicyA Cloud Monitoring alert policy.
Alert Conditiongcp.monitoring.AlertConditionAlertConditionA condition within an alert policy.
Notification Channelgcp.monitoring.NotificationChannelNotificationChannelA Cloud Monitoring notification channel.
Uptime Check Configgcp.monitoring.UptimeCheckConfigUptimeCheckAn uptime check configuration.
Artifact Registry Attributesgcp.artifactregistry.ArtifactRegistryAttributesAttributesAttributes of Artifact Registry resources.
Artifact Registry Repositorygcp.artifactregistry.RepositoryRepositoryAn Artifact Registry repository.
Artifact Registry Docker Imagegcp.artifactregistry.DockerImageDockerImageA Docker image in Artifact Registry.
Artifact Registry Packagegcp.artifactregistry.PackagePackageA package in Artifact Registry.
Audit Logs Attributesgcp.auditlogs.AuditLogsAttributesAttributesAttributes of Cloud Audit Logs resources.
Audit Configgcp.auditlogs.AuditConfigAuditConfigAn audit configuration for a GCP service.
Audit Log Configgcp.auditlogs.AuditLogConfigAuditLogConfigAn audit log type configuration.
Memorystore Attributesgcp.memorystore.MemorystoreAttributesAttributesAttributes of Memorystore resources.
Memorystore Redis Instancegcp.memorystore.RedisInstanceRedisInstanceA Memorystore for Redis instance.
Memorystore Persistence Configgcp.memorystore.PersistenceConfigPersistenceConfigPersistence configuration for Redis.
Memorystore Maintenance Policygcp.memorystore.MaintenancePolicyMaintenancePolicyMaintenance policy for a Redis instance.
Cloud SQL Instancegcp.cloudsql.InstanceInstanceA Cloud SQL database instance.
Cloud SQL Databasegcp.cloudsql.DatabaseDatabaseA database within a Cloud SQL instance.
Cloud SQL Usergcp.cloudsql.UserUserA user account for a Cloud SQL instance.
Cloud SQL Settingsgcp.cloudsql.SettingsSettingsConfiguration settings for a Cloud SQL instance.
Cloud SQL Backup Configurationgcp.cloudsql.BackupConfigurationBackupConfigBackup configuration for a Cloud SQL instance.
Cloud SQL IP Configurationgcp.cloudsql.IPConfigurationIPConfigIP and SSL configuration for Cloud SQL.
Cloud SQL IP Addressgcp.cloudsql.IPAddressIPAddressAn IP address assigned to a Cloud SQL instance.
Cloud SQL Maintenance Windowgcp.cloudsql.MaintenanceWindowMaintenanceWindowMaintenance window for a Cloud SQL instance.
Cloud SQL Authorized Networkgcp.cloudsql.AuthorizedNetworkAuthorizedNetworkAn authorized network for Cloud SQL access.
Cloud SQL Location Preferencegcp.cloudsql.LocationPreferenceLocationPreferencePreferred zone for a Cloud SQL instance.
Cloud SQL Attributesgcp.cloudsql.CloudSQLAttributesAttributesAttributes of Cloud SQL resources.
VPC Subnetworkgcp.vpc.SubnetworkSubnetworkA VPC subnetwork.
VPC Routegcp.vpc.RouteRouteA VPC network route.
VPC Networkgcp.vpc.NetworkNetworkA VPC network.
VPC Firewall Rulegcp.vpc.FirewallRuleFirewallRuleA VPC firewall rule.
VPC Firewall Allowedgcp.vpc.FirewallAllowedFirewallAllowedAllowed protocols/ports in a firewall rule.
VPC Firewall Deniedgcp.vpc.FirewallDeniedFirewallDeniedDenied protocols/ports in a firewall rule.
VPC Firewall Log Configgcp.vpc.FirewallLogConfigLogConfigLogging configuration for a firewall rule.
VPC Subnetwork Secondary Rangegcp.vpc.SubnetworkSecondaryRangeSecondaryRangeA secondary IP range for a VPC subnetwork.
VPC Network Routing Configgcp.vpc.NetworkRoutingConfigRoutingConfigRouting configuration for a VPC network.
VPC Attributesgcp.vpc.VPCAttributesAttributesAttributes of VPC resources.
Cloud Run Container Portgcp.cloudrun.ContainerPortContainerPortA port exposed by a Cloud Run container.
Cloud Run Scalinggcp.cloudrun.ScalingScalingScaling configuration for a Cloud Run service.
KMS Key Version Templategcp.kms.KeyVersionTemplateKeyVersionTemplateTemplate for Cloud KMS key version settings.
Pub/Sub Expiration Policygcp.pubsub.ExpirationPolicyExpirationPolicyExpiration policy for a Pub/Sub subscription.
Secret Manager Replicationgcp.secretmanager.ReplicationReplicationReplication configuration for a secret.
NAT Attributesgcp.nat.NATAttributesAttributesAttributes of Cloud NAT resources.
Endpoints Attributesgcp.endpoint.EndpointsAttributesAttributesAttributes of Cloud Endpoints resources.
BigQuery Attributesgcp.bigquery.BigQueryAttributesAttributesAttributes of BigQuery resources.
BigQuery Datasetgcp.bigquery.DatasetDatasetA BigQuery dataset.
BigQuery Tablegcp.bigquery.TableTableA BigQuery table.
BigQuery Encryption Configurationgcp.bigquery.EncryptionConfigurationEncryptionConfigDefault encryption configuration for a dataset.
Cloud Armor Attributesgcp.cloudarmor.CloudArmorAttributesAttributesAttributes of Cloud Armor resources.
Cloud Armor Security Policygcp.cloudarmor.SecurityPolicySecurityPolicyA Cloud Armor security policy.
Cloud Armor Security Policy Rulegcp.cloudarmor.SecurityPolicyRulePolicyRuleA rule within a Cloud Armor security policy.
Cloud Build Attributesgcp.cloudbuild.CloudBuildAttributesAttributesAttributes of Cloud Build resources.
Cloud Build Triggergcp.cloudbuild.BuildTriggerBuildTriggerA Cloud Build trigger.
Cloud Build Worker Poolgcp.cloudbuild.WorkerPoolWorkerPoolA Cloud Build private worker pool.
Firestore Attributesgcp.firestore.FirestoreAttributesAttributesAttributes of Firestore resources.
Firestore Databasegcp.firestore.FirestoreDatabaseDatabaseA Firestore database instance.
Cloud Filestore Attributesgcp.filestore.FilestoreAttributesAttributesAttributes of Cloud Filestore resources.
Cloud Filestore Instancegcp.filestore.FilestoreInstanceInstanceA Cloud Filestore managed file share.
API Gateway Attributesgcp.apigateway.APIGatewayAttributesAttributesAttributes of API Gateway resources.
API Gateway APIgcp.apigateway.APIGatewayAPIAPIAn API Gateway API definition.
API Gateway Gatewaygcp.apigateway.APIGatewayGatewayGatewayAn API Gateway deployment.
Vertex AI Attributesgcp.vertexai.VertexAIAttributesAttributesAttributes of Vertex AI resources.
Vertex AI Modelgcp.vertexai.VertexAIModelModelA Vertex AI model.
Vertex AI Endpointgcp.vertexai.VertexAIEndpointEndpointA Vertex AI model serving endpoint.
Eventarc Attributesgcp.eventarc.EventarcAttributesAttributesAttributes of Eventarc resources.
Eventarc Triggergcp.eventarc.EventarcTriggerTriggerAn Eventarc event trigger.
Eventarc Channelgcp.eventarc.EventarcChannelChannelAn Eventarc event channel.
Cloud Workflows Attributesgcp.workflows.WorkflowsAttributesAttributesAttributes of Cloud Workflows resources.
Cloud Workflowgcp.workflows.WorkflowResourceWorkflowA Cloud Workflows workflow definition.
Dataproc Attributesgcp.dataproc.DataprocAttributesAttributesAttributes of Dataproc resources.
Dataproc Clustergcp.dataproc.DataprocClusterClusterA Dataproc cluster.
Dataproc Jobgcp.dataproc.DataprocJobJobA Dataproc job.
Cloud Composer Attributesgcp.composer.ComposerAttributesAttributesAttributes of Cloud Composer resources.
Cloud Composer Environmentgcp.composer.EnvironmentEnvironmentA Cloud Composer (Airflow) environment.
Cloud Spanner Attributesgcp.spanner.SpannerAttributesAttributesAttributes of Cloud Spanner resources.
Cloud Spanner Instancegcp.spanner.InstanceInstanceA Cloud Spanner instance.
Cloud Spanner Databasegcp.spanner.DatabaseDatabaseA database within a Cloud Spanner instance.
Cloud Tasks Attributesgcp.cloudtasks.CloudTasksAttributesAttributesAttributes of Cloud Tasks resources.
Cloud Tasks Queuegcp.cloudtasks.QueueQueueA Cloud Tasks queue.
Cloud CDN Attributesgcp.cloudcdn.CloudCDNAttributesAttributesAttributes of Cloud CDN resources.
Cloud CDN Backend Servicegcp.cloudcdn.CDNBackendServiceBackendServiceA CDN-enabled backend service.
Cloud CDN Policygcp.cloudcdn.CDNPolicyCDNPolicyA CDN caching policy configuration.
Deployment Manager Attributesgcp.deploymentmanager.DeploymentManagerAttributesAttributesAttributes of Deployment Manager resources.
Deployment Manager Deploymentgcp.deploymentmanager.DeploymentDeploymentA Deployment Manager deployment.
Deployment Manager Resourcegcp.deploymentmanager.ResourceResourceA resource within a Deployment Manager deployment.
Infrastructure Manager Attributesgcp.infrastructuremanager.InfrastructureManagerAttributesAttributesAttributes of Infrastructure Manager resources.
Infrastructure Manager Deploymentgcp.infrastructuremanager.DeploymentDeploymentA Terraform-based Infrastructure Manager deployment.
Infrastructure Manager Resourcegcp.infrastructuremanager.ResourceResourceA Terraform resource managed by Infrastructure Manager.
AlloyDB Attributesgcp.alloydb.AlloyDBAttributesAttributesAttributes of AlloyDB resources.
AlloyDB Clustergcp.alloydb.ClusterClusterAn AlloyDB cluster.
AlloyDB Instancegcp.alloydb.InstanceInstanceAn instance within an AlloyDB cluster.
Cloud Bigtable Attributesgcp.bigtable.BigtableAttributesAttributesAttributes of Cloud Bigtable resources.
Cloud Bigtable Instancegcp.bigtable.InstanceInstanceA Cloud Bigtable instance.
Cloud Bigtable Clustergcp.bigtable.ClusterClusterA cluster within a Cloud Bigtable instance.
Dataflow Attributesgcp.dataflow.DataflowAttributesAttributesAttributes of Dataflow resources.
Dataflow Jobgcp.dataflow.JobJobA Cloud Dataflow job.
Data Catalog Attributesgcp.datacatalog.DataCatalogAttributesAttributesAttributes of Data Catalog resources.
Data Catalog Entry Groupgcp.datacatalog.EntryGroupEntryGroupA Data Catalog entry group.
Data Catalog Entrygcp.datacatalog.EntryEntryAn entry within a Data Catalog entry group.
Data Catalog Policy Taxonomygcp.datacatalog.PolicyTaxonomyPolicyTaxonomyA Data Catalog policy taxonomy for data governance.
Data Catalog Policy Taggcp.datacatalog.PolicyTagPolicyTagA policy tag within a Data Catalog taxonomy.

IaC Resource Relationships

The blueprint automatically correlates Infrastructure as Code (IaC) resources with the actual cloud resources they manage:

  • iac.DeployedAs — Links Terraform source code resources (scanned from repositories) to their deployed Infrastructure Manager resources, matching by resource type.
  • iac.ManagesResource — Links Infrastructure Manager resources to the actual GCP cloud resources they provision (Compute instances, Cloud SQL databases, GKE clusters, etc.), matching by TerraformID.

Security Insights (CSPM)

The GCP blueprint includes Cloud Security Posture Management (CSPM) insights that automatically detect misconfigurations across your GCP environment.

InsightSeverityDescription
GCS Buckets Without VersioningMediumDetects Cloud Storage buckets with object versioning disabled, risking permanent data loss from accidental overwrites or deletions.
GCS Buckets Without Public Access PreventionHighDetects Cloud Storage buckets that do not enforce public access prevention, relying on individual ACLs which may allow unintended public access.
VPC Firewall Rules Allowing All IngressHighDetects VPC firewall rules that allow ingress traffic from any source (0.0.0.0/0), exposing services to the internet.
VPC Subnets Without Flow LogsMediumDetects VPC subnets with VPC Flow Logs disabled, limiting network traffic visibility and forensic capabilities.
Cloud DNS Zones Without LoggingMediumDetects Cloud DNS managed zones with DNS query logging disabled, reducing visibility into DNS resolution activity.
Cloud Run Services With Public IngressMediumDetects Cloud Run services configured to allow ingress from all traffic sources, exposing them to the public internet.
Cloud Functions With Public IngressMediumDetects Cloud Functions configured to allow ingress from all traffic sources, exposing them to the public internet.
Cloud SQL Instances Without SSL EnforcementHighDetects Cloud SQL instances that do not require SSL/TLS for connections, allowing unencrypted database traffic.
Cloud SQL Instances Without Automated BackupsHighDetects Cloud SQL instances with automated backups disabled, risking permanent data loss.
Cloud Logging Sinks DisabledMediumDetects Cloud Logging sinks that are disabled, potentially breaking log routing and compliance-required log retention.
Cloud KMS Keys Without Automatic RotationMediumDetects Cloud KMS cryptographic keys without automatic rotation configured, using the same key material indefinitely.
VPC Firewall Rules Allowing SSH from InternetHighDetects VPC firewall rules that allow SSH (port 22) ingress from 0.0.0.0/0, exposing instances to brute-force attacks.
VPC Firewall Rules Allowing RDP from InternetHighDetects VPC firewall rules that allow RDP (port 3389) ingress from 0.0.0.0/0, exposing instances to remote desktop attacks.
Default VPC Network In UseMediumDetects projects using the default VPC network, which has overly permissive pre-configured firewall rules.
VPC Subnets Without Private Google AccessMediumDetects VPC subnets with Private Google Access disabled, requiring external IPs to reach Google APIs and services.
Cloud SQL Instances Publicly AccessibleHighDetects Cloud SQL instances with authorized networks allowing access from 0.0.0.0/0, exposing databases to the internet.
GCS Buckets Without Retention PolicyMediumDetects Cloud Storage buckets without a retention policy, risking data loss from accidental or malicious deletion.
VPC Firewall Rules Without LoggingMediumDetects VPC firewall rules with logging disabled, creating blind spots in network traffic auditing and incident investigation.
Cloud SQL Instances With Public IPHighDetects Cloud SQL instances with IPv4 public IP enabled, exposing databases directly to the internet.
GKE Node Configurations Using Default Service AccountHighDetects GKE node configurations using the default Compute Engine service account, which grants overly broad Editor-level permissions.
GKE Clusters Without Master Authorized NetworksHighDetects GKE clusters without master authorized networks enabled, leaving the Kubernetes API server accessible from any IP address.
GCS Buckets Without Uniform Bucket-Level AccessMediumDetects Cloud Storage buckets without uniform bucket-level access, relying on fine-grained ACLs that are harder to audit and error-prone.
GCS Buckets Without Access LoggingMediumDetects Cloud Storage buckets without access logging enabled, leaving no audit trail for data access monitoring.
GCS Buckets Without Customer-Managed Encryption KeysMediumDetects Cloud Storage buckets not encrypted with CMEK, relying entirely on Google-managed keys without independent key lifecycle control.
GCS Buckets With Public ACL RulesCriticalDetects Cloud Storage bucket ACL rules granting access to allUsers or allAuthenticatedUsers, making data publicly accessible.
GKE Clusters Not Configured as PrivateHighDetects GKE clusters without private cluster configuration, exposing nodes with public IPs and API server to the internet.
Cloud Run Services Using Default Service AccountMediumDetects Cloud Run services using the default Compute Engine service account with broad Editor-level permissions.
Cloud Functions Using Default Service AccountMediumDetects Cloud Functions using the default Compute Engine service account with broad Editor-level permissions.
Service Accounts With Admin PrivilegesHighDetects IAM policy bindings granting Editor or Owner roles to service accounts, violating least privilege.
Audit Logging Not Configured for All ServicesHighDetects projects without Cloud Audit Logging configured for all services, creating visibility gaps.
Secrets Without Rotation ConfiguredMediumDetects Secret Manager secrets without automatic rotation, leaving compromised secrets valid indefinitely.
Memorystore Redis Without AUTHHighDetects Memorystore Redis instances without AUTH enabled, allowing unauthenticated client connections.
Memorystore Redis Without Transit EncryptionHighDetects Memorystore Redis instances without transit encryption, transmitting data in plaintext.
BigQuery Datasets Without CMEKMediumDetects BigQuery datasets without customer-managed encryption keys, relying on Google-managed encryption without independent key lifecycle control.
Cloud Armor Policies Without Adaptive ProtectionMediumDetects Cloud Armor security policies without adaptive DDoS defense enabled, leaving applications vulnerable to L7 DDoS attacks.
Cloud Armor Rules in Preview ModeLowDetects Cloud Armor security policy rules in preview mode that log but do not enforce actions, creating gaps between perceived and actual protection.
Firestore Databases Without Point-in-Time RecoveryMediumDetects Firestore databases without PITR enabled, limiting recovery options after data corruption or accidental deletions.
Firestore Databases Without Delete ProtectionMediumDetects Firestore databases without delete protection, allowing accidental or unauthorized database deletion.
Cloud Spanner Databases Without Version RetentionMediumDetects Cloud Spanner databases without version retention configured, limiting point-in-time recovery capabilities.
Cloud Build Disabled TriggersLowDetects disabled Cloud Build triggers that may indicate abandoned CI/CD pipelines with potentially stale configurations.
Vertex AI Endpoints Without VPC NetworkMediumDetects Vertex AI endpoints without VPC network isolation, exposing prediction traffic to the public internet.
Cloud Composer Environments Not PrivateMediumDetects Cloud Composer environments without private configuration, exposing the Airflow web server and GKE nodes to the internet.
Deployment Manager Deployments With Failed StatusMediumDetects GCP Deployment Manager deployments with a FAILED status, indicating infrastructure provisioning issues that may leave resources in an inconsistent state.
Infrastructure Manager Deployments With Failed StatusMediumDetects GCP Infrastructure Manager (Terraform) deployments with a FAILED status, indicating Terraform-based infrastructure provisioning issues that may leave resources in an inconsistent state.
AlloyDB Clusters Without CMEKMediumDetects AlloyDB clusters not encrypted with customer-managed encryption keys (CMEK), relying on Google-managed keys without independent key lifecycle control.
AlloyDB Clusters Without Continuous BackupHighDetects AlloyDB clusters without continuous backup enabled, limiting point-in-time recovery capabilities and increasing potential data loss during incidents.
AlloyDB Clusters With Low Backup RetentionMediumDetects AlloyDB clusters with continuous backup retention configured for fewer than 7 days, limiting the recovery window for data corruption or security incidents.
Cloud Bigtable Clusters Without CMEKMediumDetects Cloud Bigtable clusters not encrypted with customer-managed encryption keys (CMEK), relying on Google-managed keys without independent key lifecycle control.
Dataflow Jobs Using Default Service AccountMediumDetects Dataflow jobs using the default Compute Engine service account with broad Editor-level permissions instead of a dedicated, least-privilege service account.
Dataflow Jobs Using Public IPsMediumDetects Dataflow jobs configured to use public IP addresses on worker VMs, increasing the attack surface by exposing workers to the internet.
Data Catalog Taxonomies Without Policy TagsMediumDetects Data Catalog taxonomies with no policy tags configured, limiting data governance and fine-grained access control capabilities on BigQuery columns and other data assets.

Events

EventDescription
k8s_containerMonitors and manages Kubernetes containers running in GKE clusters.
k8s_clusterRepresents a Google Kubernetes Engine (GKE) cluster.
cloud_composer_environmentRefers to an instance of Cloud Composer, used for workflow orchestration.
k8s_nodeRepresents a node in a Kubernetes cluster.
dns_managed_zoneRefers to a DNS managed zone in Google Cloud DNS.
k8s_podTracks and manages individual pods in a Kubernetes cluster.
cloudsql_databaseRepresents a Cloud SQL database instance.
apigateway.googleapis.com/GatewayRepresents an API Gateway deployment in Google Cloud.
cloud_run_revisionRepresents a specific revision of a Cloud Run service.
gce_instanceRefers to a Compute Engine virtual machine instance.
gce_instance_group_managerManages instance groups in Compute Engine.
gke_nodepoolRefers to a group of nodes within a GKE cluster.
gce_instance_templateDefines a template for Compute Engine instances.
gce_instance_groupRepresents a managed or unmanaged instance group in Compute Engine.
networking.googleapis.com/LocationProvides networking details based on geographic location.
audited_resourceTracks resources audited in Google Cloud's Audit Logs.