RedLock is now a part of Palo Alto Networks - READ MORE

Security & Compliance for Google Cloud

RedLock is proud to be a launch partner for Cloud Security Command Center to enable deeper visibility into Google Cloud security and compliance risks

Google Cloud Platform Partner

With RedLock, organizations can ensure compliance, govern security, and enable security operations across Google Cloud environments.

RedLock - compliance assurance

Monitor, auto-remediate, and report on compliance using out-of-the-box policies for standards such as CIS, NIST, SOC 2, PCI, and HIPAA.

RedLock - security governance

Enable DevSecOps by establishing policy guardrails to rapidly detect, alert and remediate risks across resource configurations, network architecture, and user activities.

RedLock - AWS Security Guard Duty SOC Enablement

Prioritize vulnerabilities, detect threats, investigate current or past incidents, and auto-remediate issues across your entire cloud computing environment.

RedLock Integration with Cloud Security Command Center

Google Cloud Security Command Center

The RedLock integration with Cloud Security Command Center provides customers with centralized visibility into security and compliance risks, and greater context for alerting and actionable remediation in Google Cloud environments. As part of the integration, RedLock monitors Google Cloud environments and sends alerts pertaining to resource misconfigurations, compliance violations, network security risks and anomalous user activities to Cloud Security Command Center.

Security & Compliance is a Shared Responsibility

Cloud Security Shared Responsibility Model

The security of public cloud infrastructure is a shared responsibility between the cloud service provider and the organization. Specifically, organizations are responsible for monitoring resource configurations, user activities, network traffic, and host vulnerabilities. The dynamic nature of the cloud makes this challenging.

Google Cloud Resource Configurations

While the cloud enables agility by allowing users to create, modify, and retire resources on-demand, this often occurs without any security oversight. RedLock provides hundreds of out-of-the-box policies for common security and compliance standards such as CIS, NIST, SOC 2, PCI, and HIPAA to monitor Google Cloud environments. Rest assured that any misconfigurations of cloud resources such as Google Cloud Storage, Google Compute Engine, and Google Cloud Datastore will be immediately detected and remediated.

resource configuration monitoring

User Activities

In cloud environments, multiple users have privileged access which enables productivity but creates greater risk of exposure. It is imperative to monitor users across your entire Google Cloud environment for anomalous activities. Unfortunately, the distributed nature of the cloud consisting of multiple accounts, regions and zones makes this difficult. RedLock consumes audit logs from across your entire Google Cloud environment, enabling you to detect account compromises and insider threats.

user monitoring

Network Traffic

The absence of a physical network boundary to the internet increases the attack surface in the cloud by orders of magnitude. Monitoring network traffic is necessary for detecting nefarious activity such as cryptojacking. However, traditional tools create security blind spots since they cannot be deployed for monitoring traffic to API-driven services. RedLock surfaces intrusions and enables you to investigate and respond to threats in your Google Cloud environment.

network intrusion detection

Host Vulnerabilities

As is the case in on-premise environments, unpatched hosts in cloud computing environments are also vulnerable to attack. Relying on standalone vulnerability management investments is ineffective. These tools perform periodic scans of an environment to identify hosts with missing patches based on IP address. However, cloud environments are constantly changing and IP addresses are elastic, which makes the results unreliable. RedLock integrates with external vulnerability services to continuously scan your environment for unpatched hosts, especially those exposed to the internet.

Host Vulnerability Detection

Embracing and Extending Google Cloud Native Security

RedLock | Google Cloud Technology Partner

Google Cloud Platform provides a number of native security capabilities. While organizations can address each responsibility in the shared security model as an individual problem, comprehensive cloud context is necessary to be effective. For example, organizations that are simply monitoring their Google Cloud environments for risky configurations will receive an alert if an open firewall rule is created. Unfortunately, the severity of the threat is hard to determine based on this data point alone. Alerts without context make it hard to triage issues in a timely manner and ultimately lead to alert fatigue.

A more meaningful alert would be if the open firewall rule is determined to be associated with an unpatched MongoDB resource that is receiving traffic from a suspicious IP address. Such an alert would require correlation of configuration, network traffic, host vulnerability, and threat intelligence data. In order to achieve this, organizations would have to build a solution that stitches together disparate data sets and applies AI to produce context. This exercise becomes more infinitely complex for organizations with multiple cloud accounts across multiple regions.

The RedLock Cloud 360 platform embraces and extends native Google Cloud Platform security capabilities by using AI to correlate disparate data sets from your environment. Specifically, it correlates resource configurations, user activities, network traffic, and host vulnerabilities/activities with third party threat intelligence sources to produce the necessary context. This provides you with actionable alerts and enables you to prioritize response based on the severity of issue.

Want to learn more?

RedLock Announces Support for New Cloud Security Command Center for Google Cloud Platform

This integration provides customers with centralized visibility into security and compliance risks, and greater context for alerting and actionable remediation in Google Cloud.

RedLock Cloud 360 Platform Demo

Get a demo of the RedLock Cloud 360 platform in action for Google Cloud.

Security & Compliance for Google Cloud

Learn how to defend against security and compliance risks across your Google Cloud environment.

Get Started Today

Learn more about the RedLock platform or contact us for a free risk assessment.

Learn More Get a Free Risk Assessment