Security Command Center Enterprise: Step 2.2 - Visualization | Threats

Table of Contents

SCCE_Journey_Visualization_02.png

The Security Command Center Enterprise’s Threats dashboard allows you to review potentially harmful events in your Google Cloud resources.

Actions

Visualization_Threats_01.png
Threats by Severity

This dashboard helps you identify and review potential harmful events within your Google Cloud resources, enabling swift action to protect your environment.

 
Show More

Steps
  1. Users will see a Threats by Severity Count, and a Severity Rating Scale, listing Threats as:
    1. Critical
    2. High
    3. Medium
    4. Low
    5. Unspecified
  2. Users can click the Threats by Severity Count numbers to view Threats by Severity in the Google SCCE Cloud Platform’s Findings feature. This page will include Threats by Severity Query Results.
Relevant Documentation Links
Visualization_Threats_02.png
Threats by Category

The Threat by Category tool organizes detected threats within your Google Cloud resources, assisting you in identifying and addressing potential security risks.

 
Show More

Steps
  1. Users will see a Threats by Category list, which will list Threats in the following columns:
    1. Category
    2. Findings Count
  2. Users can click each Threat Category to view Threats by Category in the Google SCCE Cloud Platform’s Findings feature. This page will include Threats by Category Query Results.
Relevant Documentation Links
Visualization_Threats_03.png
Threats by Project

This feature allows you to monitor and review potentially harmful events grouped by project, giving you a clear understanding of how threats are distributed across your Google Cloud resources.

 
Show More

Steps
  1. Users will see a Threats by Project list, which will list Threats in the following columns:
    1. Project
    2. Findings Count
  2. Users can click each Threat Project to view Threats by Project in the Google SCCE Cloud Platform’s Findings feature. This page will include Threats by Project Query Results.
Relevant Documentation Links

Next Step: Security Command Center Enterprise: Step 2.3 - Visualization | Vulnerabilities 

Previous Step: Security Command Center Enterprise: Step 2.1 - Visualization | Risk Overview 

Contributors
Version history
Last update:
‎02-14-2025 01:54 PM
Updated by: