{"id":6151,"date":"2019-11-14T17:13:29","date_gmt":"2019-11-14T10:13:29","guid":{"rendered":"http:\/\/gcloudvn.wam.vn\/google-cloud-platform-giup-ban-kiem-soat-cac-moi-de-doa-nhu-the-nao\/"},"modified":"2023-04-28T10:23:37","modified_gmt":"2023-04-28T03:23:37","slug":"google-cloud-platform-giup-ban-kiem-soat-cac-moi-de-doa-nhu-the-nao","status":"publish","type":"post","link":"https:\/\/gcloudvn.com\/en\/kienthuc\/google-cloud-platform-giup-ban-kiem-soat-cac-moi-de-doa-nhu-the-nao\/","title":{"rendered":"How Google Cloud Platform helps you control threats"},"content":{"rendered":"<p style=\"text-align: justify;\"><span style=\"font-weight: 400; font-family: 'times new roman', times, serif; font-size: 18px;\">Why does Google keep talking about Security all this time? Hasn&#039;t anyone been able to fix these vulnerabilities?<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400; font-family: 'times new roman', times, serif; font-size: 18px;\">You&#039;ve heard these questions somewhere, whether from your boss, or a member of the board of directors, or just from friends. You then attempt to explain why security in the cloud is so complex and challenging, the ongoing arms race. But you&#039;re right: It&#039;s complicated, and difficult.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400; font-family: 'times new roman', times, serif; font-size: 18px;\">As a security administrator today, you can spend a lot of time focusing on gathering information: what&#039;s happening, new vulnerabilities emerge, what threats are present in your environment. and how to fix them. And you probably already have several dozen tools available to measure, analyze, collect, and search through your data.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400; font-family: 'times new roman', times, serif; font-size: 18px;\">Right now, with your existing toolset, you believe you have good control over your on-premise systems and defenses. But above all, you can get tangled up in inconsistent data patterns, stale data, and messy information coming from different tools. So consolidating and normalizing the data sources, really gives you a full picture.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400; font-family: 'times new roman', times, serif; font-size: 18px;\">Then you add cloud systems and it gets even more complicated. To summarize National Cybersecurity Awareness Month, Google details some of the most recently developed security features, Event Threat Detection, available right in the session. beta and highlights some information that can help you reduce the complexity of your organization&#039;s security and improve your security layers.<\/span><\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_80 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewbox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewbox=\"0 0 24 24\" version=\"1.2\" baseprofile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/gcloudvn.com\/en\/kienthuc\/google-cloud-platform-giup-ban-kiem-soat-cac-moi-de-doa-nhu-the-nao\/#Tam_nhin_va_kiem_soat_va_ngan_chan_cac_moi_de_doa\" >Visibility and control, and stopping threats<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/gcloudvn.com\/en\/kienthuc\/google-cloud-platform-giup-ban-kiem-soat-cac-moi-de-doa-nhu-the-nao\/#Giam_nguy_co_doi_mat_cac_moi_de_doa_voi_Event_Threat_Detection\" >Reduce your risk of facing threats with Event Threat Detection<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/gcloudvn.com\/en\/kienthuc\/google-cloud-platform-giup-ban-kiem-soat-cac-moi-de-doa-nhu-the-nao\/#Phan_ung_truoc_cac_moi_de_doa\" >Responding to threats<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/gcloudvn.com\/en\/kienthuc\/google-cloud-platform-giup-ban-kiem-soat-cac-moi-de-doa-nhu-the-nao\/#Chi_tiet_ve_Cloud_SCC\" >Details about Cloud SCC<\/a><\/li><\/ul><\/nav><\/div>\n<h2 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"Tam_nhin_va_kiem_soat_va_ngan_chan_cac_moi_de_doa\"><\/span><span style=\"font-size: 18px; font-family: 'times new roman', times, serif;\"><b>Visibility and control, and stopping threats<\/b><\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\"><span style=\"font-family: 'times new roman', times, serif; font-size: 18px;\"><span style=\"font-weight: 400;\">With the new <\/span><span style=\"font-weight: 400;\">Cloud Security Command Center<\/span><span style=\"font-weight: 400;\"> (Cloud SCC), Google offers a flexible platform to give you broad visibility and quick response. In addition to potential threat and risk management, Cloud SCC focuses on proactive defense, showing you detected threats and the path to more comprehensive security for your cloud resources. your. It integrates with existing security solutions you already use and Google Cloud security tools. Also its API is accessible to you and your provider, so any additional data is easy to integrate.<\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: 'times new roman', times, serif; font-size: 18px;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-15058 size-full\" src=\"https:\/\/gcloudvn.com\/wp-content\/uploads\/2019\/11\/newsletter-10.png\" alt=\"How Google Cloud Platform helps you control threats 1\" width=\"512\" height=\"233\" \/><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400; font-family: 'times new roman', times, serif; font-size: 18px;\">The model above is a centralized dashboard to prevent, detect, and respond to threats, with the current state of the system that you can change based on your needs. For example, you can centralize resources to get a holistic view of every firewall, network, disk, bucket, etc. in your organization.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: 'times new roman', times, serif; font-size: 18px;\"><span style=\"font-weight: 400;\">You can also shape your opinion based on findings (outcomes) of vulnerabilities in the environment <a href=\"https:\/\/gcloudvn.com\/en\/google-cloud-platform\/\">Google Cloud Platform<\/a> your (GCP). Recently, we went out <\/span><span style=\"font-weight: 400;\">Dashboard<\/span><span style=\"font-weight: 400;\"> Vulnerabilities to display results from Security Health Analytics. It is an integrated security product that helps you identify misconfigurations and compliance violations in your GCP resources, and recommend action.<\/span><\/span><\/p>\n<h2 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"Giam_nguy_co_doi_mat_cac_moi_de_doa_voi_Event_Threat_Detection\"><\/span><span style=\"font-size: 18px; font-family: 'times new roman', times, serif;\"><b>Reduce your risk of facing threats with Event Threat Detection<\/b><\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\"><span style=\"font-family: 'times new roman', times, serif; font-size: 18px;\"><span style=\"font-weight: 400;\">Reducing your risk of facing threats goes hand in hand with being able to react quickly to attacks in your environment. Today, Google announced the beta of <\/span><span style=\"font-weight: 400;\">Event Threat Detection<\/span><span style=\"font-weight: 400;\">, a security product that integrates into Cloud SCC and is inspired by how Google protects itself. We want to scale and intelligence to help you protect your systems and improve your security.<\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400; font-family: 'times new roman', times, serif; font-size: 18px;\">Event Threat Detection helps you detect threats in system logs and send high-risk threats to SIEM (Security Information and Event Management system) for further investigation. It can also save you time and money by focusing your attention on the most worrisome cloud-based threats.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400; font-family: 'times new roman', times, serif; font-size: 18px;\">Thanks to the rise of cloud computing, Google has seen an increase in the number of customers using VPC Flow, Cloud DNS logs, Cloud Audit logs, and system logs distributed on GCP. Event Threat Detection uses Google&#039;s intelligence to confront threats surfaced in these logs, including anomalous IAMs, malware, crypto, DDoS, and powerful SSH.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400; font-family: 'times new roman', times, serif; font-size: 18px;\">When Event Threat Detection finds a threat in your logs, it shows up as a detection on the Cloud SCC dashboard. If you need further analysis of any of these threats, you can submit them to your SIEM, saving you time and money as Event Threat Detection finds you potential dangers you need to investigate further.\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400; font-family: 'times new roman', times, serif; font-size: 18px;\">Event Threat Detection integrates with Cloud Functions to make it easier for you to retrieve results for the SIEM of your choice. You can also use Cloud Functions to automate responses and changes to Event Threat Detection findings. Watch more videos below:<\/span><\/p>\n<div class=\"wpex-responsive-media\"><iframe loading=\"lazy\" title=\"How to use Event Threat Detection - Getting Started with Cloud Security Command Center\" width=\"980\" height=\"551\" src=\"https:\/\/www.youtube.com\/embed\/0f5Dh8cGbyQ?feature=oembed\"  allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe><\/div>\n<h2 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"Phan_ung_truoc_cac_moi_de_doa\"><\/span><span style=\"font-size: 18px; font-family: 'times new roman', times, serif;\"><b>Responding to threats<\/b><\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400; font-family: 'times new roman', times, serif; font-size: 18px;\">Once threats have been detected, the obvious final step is taking action against them. To help speed up response, you can set up automatic actions each time a threat is detected. When Cloud SCC detects an anomaly or an active threat, you can ask it to change the VM configuration, possibly cutting the VM off from other parts of your network. You can also change the firewall rules automatically. Using these events to trigger Cloud Functions, you can set up any response you want, fully automated. Also, you can send metrics and crash data to your own Stackdriver or SIEM to ensure the incident response team has all the information they need.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400; font-family: 'times new roman', times, serif; font-size: 18px;\">Combined, these features give you the power to structure and organize the data you collect, which is key to securing large organizations&#039; cloud operations. Cloud SCC allows you to create tags for items to assist with project-based request or incident response and to aid in creating custom dashboards. Critical goal: to give you the information you need quickly, so you can take the most timely actions.<\/span><\/p>\n<h2 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"Chi_tiet_ve_Cloud_SCC\"><\/span><span style=\"font-family: 'times new roman', times, serif; font-size: 18px;\"><b>Details about Cloud SCC<\/b><\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400; font-family: 'times new roman', times, serif; font-size: 18px;\">Now that you have an overview of how Cloud SCC and Event Threat Detection can help you keep your organization safer, here are some more documents highlighting built-in Google security features: integrated into the Cloud Security Command Center, how they work, and how they can help you improve your security posture:<\/span><\/p>\n<ul style=\"text-align: justify;\">\n<li style=\"font-weight: 400;\"><span style=\"font-family: 'times new roman', times, serif; font-size: 18px;\"><a href=\"https:\/\/cloud.google.com\/blog\/products\/identity-security\/find-and-fix-misconfigurations-in-your-google-cloud-resources\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">Find and fix misconfigurations on Google Cloud resources <\/span><\/a><span style=\"font-weight: 400;\">with Security Health Analytics<\/span><\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-family: 'times new roman', times, serif; font-size: 18px;\"><a href=\"https:\/\/cloud.google.com\/blog\/products\/identity-security\/4-steps-to-stop-data-exfiltration-with-google-cloud\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">Prevent data leaks with<\/span><\/a><span style=\"font-weight: 400;\"> Cloud Data Loss Prevention<\/span><\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-family: 'times new roman', times, serif; font-size: 18px;\"><a href=\"https:\/\/cloud.google.com\/blog\/products\/identity-security\/3-steps-to-detect-and-remediate-security-anomalies-with-cloud-anomaly-detection\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">Detect and act on unusual security events<\/span><\/a><span style=\"font-weight: 400;\"> with Cloud Anomaly Detection<\/span><\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-family: 'times new roman', times, serif; font-size: 18px;\"><a href=\"https:\/\/cloud.google.com\/blog\/products\/identity-security\/catch-web-app-vulnerabilities-before-they-hit-production-with-cloud-web-security-scanner\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">Scan and detect web application vulnerabilities<\/span><\/a><span style=\"font-weight: 400;\"> with Cloud Web Security Scanner<\/span><\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400; font-family: 'times new roman', times, serif; font-size: 18px;\">These blogs have step-by-step instructions with screenshots, and each has a companion video. Take a look and let us know if there are any other problems and solutions that you would like to elaborate on.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400; font-family: 'times new roman', times, serif; font-size: 18px;\">To get started with Cloud Security Command Center, watch the video below:<\/span><\/p>\n<div class=\"wpex-responsive-media\"><iframe loading=\"lazy\" title=\"The five-step overview - Getting Started with Cloud Security Command Center\" width=\"980\" height=\"551\" src=\"https:\/\/www.youtube.com\/embed\/PfXZovlblJc?feature=oembed\"  allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe><\/div>\n<p style=\"text-align: justify;\"><span style=\"font-family: 'times new roman', times, serif; font-size: 18px;\"><span style=\"font-weight: 400;\">If you&#039;re new to GCP and want to try these products, just start a free trial of GCP, enable Cloud SCC, and enable built-in security products, like Event Threat Detection. You can read the reasons If you are an existing Cloud SCC customer, simply enable Event Threat Detection and our other security products from <\/span><span style=\"font-weight: 400;\">Cloud SCC<\/span><span style=\"font-weight: 400;\">. For more information about Event Threat Detection, <\/span><a href=\"https:\/\/cloud.google.com\/event-threat-detection\/docs\/\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">Read our brochure.<\/span><\/a><\/span><\/p>\n<p style=\"text-align: right;\"><span style=\"font-family: 'times new roman', times, serif; font-size: 18px;\"><strong>Source: Gimasys<\/strong><\/span><\/p>\n<div id=\"gtx-trans\" style=\"position: absolute; left: 677px; top: 3342px;\">\n<div class=\"gtx-trans-icon\" style=\"text-align: justify;\"><\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>V\u00ec sao Google li\u00ean t\u1ee5c n\u00f3i v\u1ec1 B\u1ea3o m\u1eadt su\u1ed1t th\u1eddi gian qua nh\u01b0 v\u1eady? C\u00f3 ph\u1ea3i kh\u00f4ng ai kh\u1eafc ph\u1ee5c \u0111\u01b0\u1ee3c c\u00e1c l\u1ed7 h\u1ed5ng n\u00e0y sao? \u0110\u00e2u \u0111\u00f3 b\u1ea1n \u0111\u00e3 t\u1eebng nghe nh\u1eefng c\u00e2u h\u1ecfi n\u00e0y, cho d\u00f9 t\u1eeb&hellip;<\/p>","protected":false},"author":1,"featured_media":6152,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-6151","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kienthuc","entry","has-media"],"_links":{"self":[{"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/posts\/6151","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/comments?post=6151"}],"version-history":[{"count":0,"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/posts\/6151\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/media\/6152"}],"wp:attachment":[{"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/media?parent=6151"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/categories?post=6151"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/tags?post=6151"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}