Overview
- CSCC premium feature
- Analyse logs from Cloud Logging in near real-time
- 25+ rules, e.g.:
- Malware
- Crypto mining
- Outgoing DDoS attacks
- Port scanning
- IAM anomalous grants—roles given to members outside the organization
- Brute force SSH
- Custom rules—run queries on log data exported to BigQuery