Security Command Center – Increasing operational efficiency with new mute findings capabilitySecurity Command Center – Increasing operational efficiency with new mute findings capabilityProduct Manager, Google CloudProduct Marketing Lead, Google Cloud Security

Security Command Center (SCC) is Google Cloud’s security and risk management platform that helps manage and improve your cloud security and risk posture. It is used by organizations globally to protect their environments providing visibility into cloud assets, discovering misconfigurations and vulnerabilities, detecting threats, and helping to maintain compliance with industry standards and benchmarks. 

SCC is constantly evolving, adding new capabilities to make your security operations and management processes more efficient. To help, we’re excited to announce a new “Mute Findings” capability in SCC that helps you more effectively manage findings based on your organization’s policies and requirements. SCC presents potential security risks in your cloud environment as ‘findings’ inclusive of misconfigurations, vulnerabilities, and threats. A high volume of findings can make it difficult for your security teams to effectively identify, triage, and remediate the most critical risks to your organization. In these cases, you may wish to tune the incoming volume of findings, as some findings may not be relevant for a given project or organization based on your company’s policies or risk appetite. This mute findings capability enables organizations to make Security Command Center findings more reflective of their particular risk model and prioritization.  

Enabling operational efficiencies for your security

With the launch of ‘mute findings’ capability, you gain a way to reduce findings volume and focus on the security issues that are highly relevant to you and your organization by suppressing findings that fit certain criteria. It saves you time from reviewing or responding to findings that you identify as acceptable risks within your environment. For example, alerts for assets that are isolated or fall within acceptable business parameters may not need to be responded to immediately or remediated at all.

Once muted, findings continue to be logged for audit and compliance purposes, and muted findings are still available for review at any time. However, they are hidden by default in the SCC dashboard and can be configured to avoid creating pub/sub notifications, allowing your teams to focus on addressing issues highlighted by non-muted findings.  

Sample Use Cases for muting findings

The following are a few sample use cases or scenarios in which the new mute findings capability can be helpful:

  • Assets within non-production environments where stricter requirements may not be applicable.

  • Recommendations to use customer-managed encryption keys in projects that don’t contain critical data.

  • When granting broad access to a datastore, which intentionally is open to the public in order to disseminate public information.

  • Findings not relevant to your organization based on your company’s security policies.

How to mute findings in SCC

With this release, SCC findings now have one of the following three states:

  1. Muted – Findings that have been either manually muted by a user or automatically muted by a mute rule

  2. Unmuted – Findings that have been unmuted by a user

  3. Undefined – Findings that been never been neither muted nor unmuted

You can quickly set this up for your Google Cloud environment and take advantage of this capability: 

1: Automatically mute findings using mute rules

Mute rules enable you to scale and streamline your security operations process by automatically muting findings. You can create mute rules in SCC to silence findings based on criteria you specify. Any new, updated, or existing findings are automatically muted if they match the mute rule conditions.

Leave a Comment