Reference documentation and code samples for the Google Cloud Security Center Management V1 Client class Severity.
The severity of the finding.
Protobuf type google.cloud.securitycentermanagement.v1.SimulatedFinding.Severity
Namespace
Google \ Cloud \ SecurityCenterManagement \ V1 \ SimulatedFinding
Methods
static::name
Parameter
Name
Description
value
mixed
static::value
Parameter
Name
Description
name
mixed
Constants
SEVERITY_UNSPECIFIED
Value: 0
Default value. This value is unused.
Generated from protobuf enum SEVERITY_UNSPECIFIED = 0;
CRITICAL
Value: 1
For vulnerabilities: A critical vulnerability is easily discoverable by
an external actor, exploitable, and results in the direct ability to
execute arbitrary code, exfiltrate data, and otherwise gain additional
access and privileges to cloud resources and workloads. Examples include
publicly accessible unprotected user data and public SSH access with weak
or no passwords.
For threats: Indicates a threat that is able to access, modify, or delete
data or execute unauthorized code within existing resources.
Generated from protobuf enum CRITICAL = 1;
HIGH
Value: 2
For vulnerabilities: A high-risk vulnerability can be easily discovered
and exploited in combination with other vulnerabilities in order to gain
direct access and the ability to execute arbitrary code, exfiltrate data,
and otherwise gain additional access and privileges to cloud resources
and workloads. An example is a database with weak or no passwords that is
only accessible internally. This database could easily be compromised by
an actor that had access to the internal network.
For threats: Indicates a threat that is able to create new computational
resources in an environment but not able to access data or execute code
in existing resources.
Generated from protobuf enum HIGH = 2;
MEDIUM
Value: 3
For vulnerabilities: A medium-risk vulnerability could be used by an
actor to gain access to resources or privileges that enable them to
eventually (through multiple steps or a complex exploit) gain access and
the ability to execute arbitrary code or exfiltrate data. An example is a
service account with access to more projects than it should have. If an
actor gains access to the service account, they could potentially use
that access to manipulate a project the service account was not intended
to.
For threats: Indicates a threat that is able to cause operational impact
but may not access data or execute unauthorized code.
Generated from protobuf enum MEDIUM = 3;
LOW
Value: 4
For vulnerabilities: A low-risk vulnerability hampers a security
organization's ability to detect vulnerabilities or active threats in
their deployment, or prevents the root cause investigation of security
issues. An example is monitoring and logs being disabled for resource
configurations and access.
For threats: Indicates a threat that has obtained minimal access to an
environment but is not able to access data, execute code, or create
resources.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-09-04 UTC."],[],[],null,["# Google Cloud Security Center Management V1 Client - Class Severity (1.2.1)\n\nVersion latestkeyboard_arrow_down\n\n- [1.2.1 (latest)](/php/docs/reference/cloud-securitycentermanagement/latest/V1.SimulatedFinding.Severity)\n- [1.2.0](/php/docs/reference/cloud-securitycentermanagement/1.2.0/V1.SimulatedFinding.Severity)\n- [1.1.3](/php/docs/reference/cloud-securitycentermanagement/1.1.3/V1.SimulatedFinding.Severity)\n- [1.0.0](/php/docs/reference/cloud-securitycentermanagement/1.0.0/V1.SimulatedFinding.Severity)\n- [0.3.2](/php/docs/reference/cloud-securitycentermanagement/0.3.2/V1.SimulatedFinding.Severity)\n- [0.2.7](/php/docs/reference/cloud-securitycentermanagement/0.2.7/V1.SimulatedFinding.Severity)\n- [0.1.0](/php/docs/reference/cloud-securitycentermanagement/0.1.0/V1.SimulatedFinding.Severity) \nReference documentation and code samples for the Google Cloud Security Center Management V1 Client class Severity.\n\nThe severity of the finding.\n\nProtobuf type `google.cloud.securitycentermanagement.v1.SimulatedFinding.Severity`\n\nNamespace\n---------\n\nGoogle \\\\ Cloud \\\\ SecurityCenterManagement \\\\ V1 \\\\ SimulatedFinding\n\nMethods\n-------\n\n### static::name\n\n### static::value\n\nConstants\n---------\n\n### SEVERITY_UNSPECIFIED\n\n Value: 0\n\nDefault value. This value is unused.\n\nGenerated from protobuf enum `SEVERITY_UNSPECIFIED = 0;`\n\n### CRITICAL\n\n Value: 1\n\nFor vulnerabilities: A critical vulnerability is easily discoverable by\nan external actor, exploitable, and results in the direct ability to\nexecute arbitrary code, exfiltrate data, and otherwise gain additional\naccess and privileges to cloud resources and workloads. Examples include\npublicly accessible unprotected user data and public SSH access with weak\nor no passwords.\n\nFor threats: Indicates a threat that is able to access, modify, or delete\ndata or execute unauthorized code within existing resources.\n\nGenerated from protobuf enum `CRITICAL = 1;`\n\n### HIGH\n\n Value: 2\n\nFor vulnerabilities: A high-risk vulnerability can be easily discovered\nand exploited in combination with other vulnerabilities in order to gain\ndirect access and the ability to execute arbitrary code, exfiltrate data,\nand otherwise gain additional access and privileges to cloud resources\nand workloads. An example is a database with weak or no passwords that is\nonly accessible internally. This database could easily be compromised by\nan actor that had access to the internal network.\n\nFor threats: Indicates a threat that is able to create new computational\nresources in an environment but not able to access data or execute code\nin existing resources.\n\nGenerated from protobuf enum `HIGH = 2;`\n\n### MEDIUM\n\n Value: 3\n\nFor vulnerabilities: A medium-risk vulnerability could be used by an\nactor to gain access to resources or privileges that enable them to\neventually (through multiple steps or a complex exploit) gain access and\nthe ability to execute arbitrary code or exfiltrate data. An example is a\nservice account with access to more projects than it should have. If an\nactor gains access to the service account, they could potentially use\nthat access to manipulate a project the service account was not intended\nto.\n\nFor threats: Indicates a threat that is able to cause operational impact\nbut may not access data or execute unauthorized code.\n\nGenerated from protobuf enum `MEDIUM = 3;`\n\n### LOW\n\n Value: 4\n\nFor vulnerabilities: A low-risk vulnerability hampers a security\norganization's ability to detect vulnerabilities or active threats in\ntheir deployment, or prevents the root cause investigation of security\nissues. An example is monitoring and logs being disabled for resource\nconfigurations and access.\n\nFor threats: Indicates a threat that has obtained minimal access to an\nenvironment but is not able to access data, execute code, or create\nresources.\n\nGenerated from protobuf enum `LOW = 4;`"]]