Google Security Command Center¶
Overview¶
This integration provides tools to interact with Google Security Command Center (SCC) for managing findings and retrieving vulnerability information related to assets.
Available Tools¶
Push Finding To Pub/Sub¶
Tool Name: google_security_command_center_push_finding_to_pub_sub
Description: Utility action that will push the finding to pub/sub. Only available for SCC Enterprise.
Arguments:
case_id
(string, required): The ID of the case.alert_group_identifiers
(List[string], required): Identifiers for the alert groups.finding_names
(string, required): Specify a comma-separated list of finding names which you want to push. Note: finding name has the following structure: organizations/{organization_id}/sources/{source_id}/findings/{finding_id}.target_entities
(List[TargetEntity], optional): Optional list of specific target entities (Identifier, EntityType) to run the action on. Defaults to empty list.scope
(string, optional): Defines the scope for the action. Defaults to “All entities”.
Returns:
dict
: A dictionary containing the result of the action execution.
Ping¶
Tool Name: google_security_command_center_ping
Description: Test connectivity to the Google Security Command Center with parameters provided at the integration configuration page on the Marketplace tab.
Arguments:
case_id
(string, required): The ID of the case.alert_group_identifiers
(List[string], required): Identifiers for the alert groups.target_entities
(List[TargetEntity], optional): Optional list of specific target entities (Identifier, EntityType) to run the action on. Defaults to empty list.scope
(string, optional): Defines the scope for the action. Defaults to “All entities”.
Returns:
dict
: A dictionary containing the result of the action execution.
List Asset Vulnerabilities¶
Tool Name: google_security_command_center_list_asset_vulnerabilities
Description: List vulnerabilities related to the entities in Google Security Command Center.
Arguments:
case_id
(string, required): The ID of the case.alert_group_identifiers
(List[string], required): Identifiers for the alert groups.asset_resource_names
(string, required): Specify a comma-separated list of resource names of the assets for which you want to return data.timeframe
(List[str], optional): Specify the timeframe for the vulnerabilities/misconfiguration search. Defaults to None.record_types
(List[str], optional): Specify what kind of records should be returned. Defaults to None.output_type
(List[str], optional): Specify what kind of output should be returned in the JSON result for the asset. Defaults to None.max_records_to_return
(string, optional): Specify how many records to return per record type per assets: Default: 50. Defaults to None.target_entities
(List[TargetEntity], optional): Optional list of specific target entities (Identifier, EntityType) to run the action on. Defaults to empty list.scope
(string, optional): Defines the scope for the action. Defaults to “All entities”.
Returns:
dict
: A dictionary containing the result of the action execution.
Update Finding¶
Tool Name: google_security_command_center_update_finding
Description: Update finding in Google Security Command Center.
Arguments:
case_id
(string, required): The ID of the case.alert_group_identifiers
(List[string], required): Identifiers for the alert groups.finding_name
(string, required): Specify a comma-separated list of finding names which you want to update. Note: finding name has the following structure: organizations/{organization_id}/sources/{source_id}/findings/{finding_id}.mute_status
(List[str], optional): Specify the mute status for the finding. Defaults to None.state_status
(List[str], optional): Specify the state status for the finding. Defaults to None.target_entities
(List[TargetEntity], optional): Optional list of specific target entities (Identifier, EntityType) to run the action on. Defaults to empty list.scope
(string, optional): Defines the scope for the action. Defaults to “All entities”.
Returns:
dict
: A dictionary containing the result of the action execution.
Get Finding Details¶
Tool Name: google_security_command_center_get_finding_details
Description: Get details about a finding in Google Security Command Center.
Arguments:
case_id
(string, required): The ID of the case.alert_group_identifiers
(List[string], required): Identifiers for the alert groups.finding_name
(string, required): Specify a comma-separated list of finding names for which you want to return details. Note: finding name has the following structure: organizations/{organization_id}/sources/{source_id}/findings/{finding_id}.target_entities
(List[TargetEntity], optional): Optional list of specific target entities (Identifier, EntityType) to run the action on. Defaults to empty list.scope
(string, optional): Defines the scope for the action. Defaults to “All entities”.
Returns:
dict
: A dictionary containing the result of the action execution.