Mengontrol akses ke fitur di halaman konsol Operasi Keamanan
Tetap teratur dengan koleksi
Simpan dan kategorikan konten berdasarkan preferensi Anda.
Paket Security Command Center Enterprise mencakup fitur tertentu yang tersedia dari Google Security Operations. Anda menyelidiki dan memperbaiki kerentanan, kesalahan konfigurasi, dan ancaman menggunakan halaman Google Cloud console dan Security Operations console.
Pengguna Security Command Center Enterprise memerlukan izin IAM untuk mengakses fitur Security Command Center di halaman konsol Google Cloud dan konsol Operasi Keamanan.
Google Security Operations memiliki serangkaian peran IAM yang telah ditentukan sebelumnya yang memungkinkan Anda mengakses fitur terkait SIEM dan fitur terkait SOAR di halaman konsol Security Operations. Anda dapat memberikan peran Google Security Operations di tingkat project.
Security Command Center memiliki serangkaian peran IAM yang telah ditentukan sebelumnya yang memungkinkan Anda mengakses fitur di halaman konsol Operasi Keamanan yang unik untuk paket Security Command Center Enterprise. Contoh ini meliputi:
Untuk melihat fitur Security Command Center yang tersedia di halaman konsol Operasi Keamanan, pengguna memerlukan setidaknya peran Security Center Admin Viewer (roles/securitycenter.adminViewer). Berikan peran Security Command Center di tingkat organisasi.
Saat Anda merencanakan deployment, tinjau hal berikut untuk mengidentifikasi pengguna yang memerlukan akses ke fitur:
Untuk memberikan akses pengguna ke fitur dan temuan di konsol Google Cloud , lihat Kontrol akses dengan IAM.
Untuk memberi pengguna akses ke fitur respons terkait SOAR di halaman konsol Operasi Keamanan, lihat Memetakan peran IAM di sisi SOAR pada konsol Operasi Keamanan.
Anda juga memetakan peran IAM terkait SOAR ke peran SOC, grup izin, dan lingkungan di bagian Setelan SOAR.
Untuk mengakses fitur yang tersedia dengan Security Command Center Enterprise, seperti
halaman Ringkasan Postur,
beri pengguna peran IAM yang diperlukan
di organisasi tempat Security Command Center Enterprise diaktifkan.
Langkah-langkah untuk memberikan akses ke fitur berbeda-beda bergantung pada konfigurasi penyedia identitas.
Jika Anda menggunakan Google Workspace atau Cloud Identity sebagai penyedia identitas, Anda memberikan peran langsung kepada pengguna atau grup. Lihat
Mengonfigurasi Google Cloud penyedia identitas
untuk mengetahui contoh cara melakukannya.
Jika Anda menggunakan Workforce Identity Federation untuk terhubung ke penyedia identitas pihak ketiga (seperti Okta atau Azure AD), Anda memberikan peran ke identitas di workforce identity pool atau ke grup dalam workforce identity pool.
Pastikan workforce pool menyertakan izin untuk mengakses fitur khusus Security Command Center di halaman konsol Operasi Keamanan. Berikut
adalah contohnya:
Untuk memberikan peran Pelihat Admin Security Center kepada semua pengguna di kumpulan identitas tenaga kerja, jalankan perintah berikut:
[[["Mudah dipahami","easyToUnderstand","thumb-up"],["Memecahkan masalah saya","solvedMyProblem","thumb-up"],["Lainnya","otherUp","thumb-up"]],[["Sulit dipahami","hardToUnderstand","thumb-down"],["Informasi atau kode contoh salah","incorrectInformationOrSampleCode","thumb-down"],["Informasi/contoh yang saya butuhkan tidak ada","missingTheInformationSamplesINeed","thumb-down"],["Masalah terjemahan","translationIssue","thumb-down"],["Lainnya","otherDown","thumb-down"]],["Terakhir diperbarui pada 2025-08-19 UTC."],[],[],null,["# Control access to features in Security Operations console pages\n\n| Enterprise [service tier](/security-command-center/docs/service-tiers)\n\nThe Security Command Center Enterprise tier includes certain features available\nfrom Google Security Operations. You investigate and remediate vulnerabilities,\nmisconfigurations, and threats using both\n[Google Cloud console and Security Operations console](/security-command-center/docs/scce-consoles-overview)\npages.\n\nSecurity Command Center Enterprise users need IAM permissions to access\nSecurity Command Center features in both the Google Cloud console and Security Operations console\npages.\n\nGoogle Security Operations has a set of predefined IAM roles that let\nyou access\n[SIEM-related features](/chronicle/docs/onboard/configure-feature-access#overview-perm-role)\nand\n[SOAR-related features](/security-command-center/docs/map-users-in-secops#grant-iam-roles-in-the-google-cloud-console)\nin Security Operations console pages. You can grant the Google Security Operations roles\nat the project level.\n\nSecurity Command Center has a set of predefined IAM roles that let you\naccess features in Security Operations console pages that are unique to the\nSecurity Command Center Enterprise tier. These include the following:\n\n- [Security Center Admin Editor Viewer (`roles/securitycenter.adminEditor`)](/iam/docs/understanding-roles#securitycenter.adminEditor)\n- [Security Center Admin Viewer (`roles/securitycenter.adminViewer`)](/iam/docs/understanding-roles#securitycenter.adminViewer)\n\nTo view Security Command Center features available in Security Operations console pages,\nusers need at least the **Security Center Admin Viewer** (`roles/securitycenter.adminViewer`)\nrole. Grant the Security Command Center roles at the organization level.\n\nAs you plan the deployment, review the following to identify which users need\naccess to features:\n\n- To grant user access to features and findings in the Google Cloud console,\n see [Access control with IAM](/security-command-center/docs/access-control).\n\n- To grant user access to SIEM-related threat detection and investigation\n features in Security Operations console pages, see\n [Configure feature access control using IAM](/chronicle/docs/onboard/configure-feature-access#overview-perm-role).\n\n- To grant users access to SOAR-related response features in Security Operations console pages,\n see [Map IAM roles in the SOAR side of the Security Operations console](/security-command-center/docs/map-users-in-secops).\n You also map the SOAR-related IAM roles to SOC roles,\n permission groups, and environments under **SOAR settings**.\n\n- To create custom IAM roles using Google SecOps\n IAM permissions, see\n [Create and assign a custom role to a group](/chronicle/docs/onboard/configure-feature-access#custom-role).\n\n- To access features available with Security Command Center Enterprise, such as the\n [Posture Overview page](/security-command-center/docs/toxic-combinations-manage#view_an_overview_of_all_toxic_combination_cases),\n grant users the [required IAM roles](/security-command-center/docs/how-to-use-security-command-center#required_permissions)\n in the organization where Security Command Center Enterprise is activated.\n\nThe steps to grant access to features is different depending on the identity\nprovider configuration.\n\n- If you use Google Workspace or Cloud Identity as the identity provider,\n you grant roles directly to a user or group. See\n [Configure a Google Cloud identity provider](/chronicle/docs/onboard/configure-cloud-authentication)\n for an example of how to do this.\n\n- If you use Workforce Identity Federation to connect to a third-party identity\n provider (such as Okta or Azure AD), you grant roles to identities in a\n workforce identity pool or to a group within the workforce identity pool.\n\n See [Configure feature access control using IAM](/chronicle/docs/onboard/configure-feature-access)\n for examples of how to grant SIEM-related features and SOAR-related features\n to a workforce identity pool.\n\n Make sure the workforce pools include permissions to access\n Security Command Center-specific features in Security Operations console pages. The following\n are examples:\n - To grant the Security Center Admin Viewer role to all users in a workforce\n identity pool, run the following command:\n\n gcloud organizations add-iam-policy-binding \u003cvar translate=\"no\"\u003eORGANIZATION_ID\u003c/var\u003e \\\n --role roles/securitycenter.adminViewer \\\n --member \"principalSet://iam.googleapis.com/locations/global/workforcePools/\u003cvar translate=\"no\"\u003eWORKFORCE_POOL_ID\u003c/var\u003e/*\" \\\n --condition None\n\n Replace the following:\n - \u003cvar translate=\"no\"\u003eORGANIZATION_ID\u003c/var\u003e: the numeric organization ID.\n - \u003cvar translate=\"no\"\u003eWORKFORCE_POOL_ID\u003c/var\u003e: the value you defined for the workforce identity pool ID.\n - To grant the Security Center Admin Viewer roles to a specific group, run the following commands:\n\n gcloud organizations add-iam-policy-binding \u003cvar translate=\"no\"\u003eORGANIZATION_ID\u003c/var\u003e \\\n --role roles/securitycenter.adminViewer \\\n --member \"principalSet://iam.googleapis.com/locations/global/workforcePools/\u003cvar translate=\"no\"\u003eWORKFORCE_POOL_ID\u003c/var\u003e/group/\u003cvar translate=\"no\"\u003eGROUP_ID\u003c/var\u003e\" \\\n --condition None\n\n Replace \u003cvar translate=\"no\"\u003eGROUP_ID\u003c/var\u003e: a group in the mapped `google.groups` claim."]]