Detect and investigate threats across cloud platforms

Certain threat investigation capabilities in the Enterprise tier of Security Command Center are powered by Google Security Operations, including curated detection rules, threat detection on other cloud platforms, and cases to manage your investigations.

The curated rules enable you to identify patterns in Google Cloud, AWS, and Azure data. These features extend Security Command Center Enterprise threat detection to let you identify more threat patterns in additional cloud environments.

For general information about how to use curated detections, see Getting started with curated detections.

Curated detections for AWS data

See Overview of Cloud Threats Category for information about available curated detections for AWS data and the required data for each rule set. For information about how to ingest data required by these rule sets, see the following:

Curated detections for Microsoft Azure data

See Curated detections for Microsoft Azure and Microsoft Entra ID data for information about available rule sets and the required Azure data.

For information about how to ingest Azure and Microsoft Entra ID data required by these rule sets, see the following:

What's next