Peace of Mind Security for Every Google Cloud Platform

Monitor and identify threats for workloads and accounts in the Google Cloud Platform

Automated, Continuous GCP Security Monitoring and Threat Detection for Google Cloud Platform and Multi-Cloud Environments

Google Cloud Platforms (GCP) are not immune from some of the biggest security risks. Potential threats to GCP include data breaches, credential and access management issues and identity protection. Achieving peace of mind requires partnering with a company that understands GCP security.

Lacework offers an automated, end-to-end GCP security and configuration solution that monitors threats for workloads and accounts in the Google Cloud Platform and across multi-cloud and containerized environments. Lacework is architected as a host-based intrusion detection that identifies and alerts based on behavioral anomalies that could pose threats to an organization’s data and resources.

Our GCP security platform accomplishes this in two fundamental ways:

  • Lacework checks for a series of controls specific to GCP resources like storage classes and ACLs. It also monitors for processes like Cross-Origin Resource Sharing (CORS), access logs and other elements that can be targeted in the course of attacks. 
  • Lacework builds baseline models of a data center’s behavior to perform anomaly detection that could indicate a security threat. These models are built and updated automatically and do not require manual rules or maintenance. 

Lacework enables security teams to efficiently protect assets deployed on GCP, from the initial configuration to live operations.

Security Built for Tomorrow, Today

For all GCP events and configurations, Lacework’s security solution monitors activities and behaviors of cloud entities beyond network traffic to detect anomalies indicative of misconfigurations, human error, malicious activities, and threats.

Lacework enables security teams to identify escalation of privileges, lateral movement, and misuse of GCP resources quickly so that breaches can be identified and stopped early. Lacework achieves this by:

  • Making all risks and threats visible within the Lacework dashboard ranked by risk severity. These can also be delivered through the most common methods such as a Slack channel or a Jira ticket.
  • Scheduling automatic checks, reviews, and alerts for configuration issues that run counter to controls established as best practices for securing GCP. 
  • Providing support for common compliance standards such as SOC2, PCI DSS, and CIS benchmarks. An interactive report, generated from deep insights from activity happening in the environment, delivers insights into passed or failed controls with specific remediation recommendations to fix non-compliant configuration components. 

Lacework’s GCP security solution ensures continuous compliance by auditing your configuration daily and alerting you of any change that represents a degradation in compliance.

Compliance and Misconfiguration Identification

Lacework automatically checks, reviews, and alerts on configuration issues that run counter to controls established as best practices for securing GCP. Lacework supports common compliance standards such as SOC2, PCI DSS, and CIS benchmarks. An interactive report, generated from deep insights from activity happening in the environment, delivers insights into passed or failed controls with specific remediation recommendations to fix non-compliant configuration components. A similar report is available for security controls for Google Cloud Storage.

Lacework’s GCP security solution ensures continuous compliance by auditing your configuration daily and alerting you of any change that represents a degradation in compliance.

Modern Security for Modern Cloud Infrastructures

Lacework is built to detect anomalies across your server hosts and resources, including GCP, other cloud platforms, containers, and Kubernetes. It also finds anomalies involving processes, users, networks, and files. Lacework achieves this by:

  • Capturing, analyzing, and reporting on all cloud activity so you are able to get an accurate assessment of your GCP and multi-cloud workloads and accounts.
  • Leveraging Polygraph — a deep temporal baseline built by collecting high fidelity machine, process, and user interactions over a period of time — to detect anomalies, generate appropriate alerts and provide a tool for users to investigate and triage issues.

Fundamentally, our Polygraph technology dynamically develops a behavioral and communication-based model of your GCP services and cloud infrastructure. The model understands natural hierarchies including processes, containers, pods and machines to develop behavioral models.

Automated Threat Detection

For all GCP events and configurations, Lacework’s GCP security solution monitors activities and behaviors of cloud entities beyond network traffic to detect anomalies indicative of misconfigurations, human error, malicious activities or threats. Lacework enables security teams to identify escalation of privileges, lateral movement, and misuse of GCP resources quickly on so that breaches can be identified and stopped early.

Risks and threats are visible within the Lacework dashboard, are ranked by risk severity, and can be delivered through the most common modern methods such as a Slack channel or a Jira ticket.

Purpose-Built for Modern Cloud Infrastructures

Lacework is purpose-built to deeply learn and detect anomalies across a customer’s server hosts and resources, including GCP, other cloud platforms, containers, Kubernetes, processes, users, networks, and file behavior. Lacework is a single, comprehensive GCP security solution that captures, analyzes, and reports on all cloud activity so you are able to get an accurate assessment of your GCP and multi-cloud workloads and accounts.

What Our Customers Say

 

FAQs About Lacework's GCP Cloud Security Solutions

Lacework is a multi-cloud security SaaS platform that provides automated, end-to-end visibility and threat detection for the Google Cloud Platform. Our approach simplifies configuration and speeds deployment with a faster time to value.

Lacework’s GCP security platform performs a series of checks against every compute engine firewall rules looking for misconfigurations.

Lacework checks configurations for several different variants of permissions in GCP cloud storage buckets that can risk data exposed and alerts you.

Lacework supports GCP Audit log ingestion and uses these logs to alert you of suspicious behavior in your cloud infrastructure.

Supported Platforms

Account security solutions for cloud containers & multicloud
environments via a single unified console

Share this with your network
Twitter Twitter Twitter Share