In a previous blog post, Understanding Google Cloud Platform (GCP) Concepts, we discussed the basics of the Google Cloud Platform (Identity and Access Management, Networking, Securing data) and how these core features and systems apply towards securing your cloud workloads. In this three-part series, we’ve provided an in-depth look at three Google Cloud Service Providers (CSPs):
In this post, we will cover Google Cloud Security Scanner, but be sure to check out the other blog posts: The 5 Key Features of Google Stackdriver & How to Configure Google Cloud Armor.
All Cloud Service Providers (CSPs) have specific unique functionality for securing and monitoring environments. Cloud Security Scanner checks for security vulnerabilities in your App Engine and Compute Engine web applications.
It is designed to complement your existing secure design and development processes. The scanner currently detects the following:
It performs these checks by automatically simulating use of your web applications. This includes populating fields, simulating clicks, etc.
Because the Cloud Security Scanner populates fields, pushes buttons, clicks links, and so on, it should be used with caution. Cloud Security Scanner could potentially activate features that change the state of your data or system, with undesirable results. Here are five techniques which can be used to avoid unwanted outcomes:
If you are using Google Cloud Platforms or strongly considering it and have not looked at or tried any of the technologies discussed here, then I encourage you to do so. Whether you are a developer, SysOps or DevOps, these tools provide addition capability for your use cases that can lower efforts and result in secure robust applications.
To learn more about Google Stackdriver’s powerful features that can support your production and also assist in development, read our blog post: The 5 Key Features of Google Stackdriver. In addition you can read about how Cloud Armor works as a multi-layer firewall for your GCP resources in this blog post: How to Configure Google Cloud Armor.
Use of public cloud infrastructure is now commonplace with nearly $60 billion spent annually. Important benefits are time to implement, scalability, availability, and a wealth of centralized tools to help companies manage and monitor their cloud infrastructure.
However, with the benefits come some potential security risks, most stemming from the customer’s use of the platforms versus the platforms themselves. From a security perspective, where do you start?