Skip to main content

Documentation Index

Fetch the complete documentation index at: https://help.dsalta.com/llms.txt

Use this file to discover all available pages before exploring further.

Overview

Google Cloud Platform (GCP) provides a suite of cloud computing services including Compute Engine, Cloud SQL, GKE, BigQuery, Cloud Storage, and more. DSALTA integrates with GCP to monitor IAM configuration, infrastructure security, encryption, logging, and compliance across your GCP environment.
Read-only access. DSALTA never modifies, creates, or deletes resources in your Google Cloud Platform (GCP) environment. All API access is strictly read-only.

Integration Details

PropertyValue
CategoryCloud Infrastructure
Data Library ModulesAccess, Inventory, Vulnerabilities, Incidents
AuthenticationService Account with Viewer and Security Center roles
Sync FrequencyEvery 24 hours (manual sync available)
PermissionsRead-only

What Data DSALTA Collects

When you connect Google Cloud Platform (GCP), DSALTA automatically collects the following data on every sync cycle:
  • IAM users, service accounts, and roles
  • Compute instances, Cloud SQL databases
  • GKE clusters and node configurations
  • Cloud Storage buckets and BigQuery datasets
  • Firestore, Bigtable, Cloud Spanner instances
  • Security Command Center findings
  • VPC subnet flow logs and audit logs
  • KMS encryption key configuration
Every record includes the integration name as its source, a sync timestamp, and is treated identically to manually entered records by auditors.

Key Use Cases

  • Verify MFA for all GCP users
  • Monitor Cloud SQL encryption and backup status
  • Ensure GKE clusters have logging and monitoring
  • Detect resources exposed to the internet
  • Track Security Command Center findings resolution
  • Verify KMS key rotation and service account hygiene

How to Connect

1

Navigate to Integrations

Go to Settings → Integrations in your DSALTA dashboard and find Google Cloud Platform (GCP) in the catalog.
2

Review Permissions

Review the permissions DSALTA requires. All access is read-only. Click Connect.
3

Authenticate

Follow the on-screen instructions to authenticate with your Google Cloud Platform (GCP) account. Admin-level access is required for the initial setup.
4

Configure Scope

Select which accounts, projects, or resources DSALTA should monitor. You can adjust this later from the integration settings.
5

Initial Sync

DSALTA performs an initial data pull (typically 5–15 minutes). Automated compliance tests are generated immediately after sync completes.
After connecting, allow 15–20 minutes for the initial data sync. DSALTA may take up to 24 hours to fully evaluate all synced data and activate all relevant compliance tests.

Automated Compliance Tests

When you connect Google Cloud Platform (GCP), DSALTA automatically generates the following compliance tests. Each test runs every 24 hours and produces pass/fail evidence for your auditor.
TestDescription
GCP users should have MFA enabledChecks that MFA is enabled for all GCP user accounts.
GCP should redirect HTTP to HTTPSChecks that GCP redirects HTTP traffic to HTTPS.
GCP should be on HTTPSChecks that GCP services are accessible over HTTPS.
Google Security Command Center should be enabledChecks that Google Security Command Center is enabled.
Reported incidents should be closed in Security Command CenterChecks that incidents detected in Google Security Command Center are closed.
GCP bucket storage should be encryptedChecks that GCP Cloud Storage buckets are encrypted at rest.
GCP VPC subnet flow logs should be capturedChecks that VPC subnet flow logs are enabled in GCP.
GCP Kubernetes clusters should have logging and monitoring enabledChecks that GCP Kubernetes clusters have logging and cloud monitoring enabled.
GKE Kubernetes Web UI Dashboard should be disabledChecks that the Kubernetes Web UI Dashboard is disabled in GKE.
GKE Metadata Server should be enabledChecks that GKE Metadata Server is enabled on node pools.
GCP Firestore read frequency should be monitoredChecks that GCP Firestore read frequency is being monitored.
GCP Firestore write frequency should be monitoredChecks that GCP Firestore write frequency is being monitored.
GCP Compute instance CPU utilization should be monitoredChecks that GCP Compute instance CPU utilization is being monitored.
GCP Compute instances should be protected from direct internet trafficChecks that GCP Compute instances are not directly exposed to the internet.
GCP Cloud SQL CPU utilization should be monitoredChecks that GCP Cloud SQL CPU utilization is being monitored.
GCP Cloud SQL should be encryptedChecks that GCP Cloud SQL databases are encrypted at rest.
GCP Cloud SQL memory utilization should be monitoredChecks that GCP Cloud SQL memory utilization is being monitored.
GCP Cloud SQL backup should be enabledChecks that GCP Cloud SQL automated backups are enabled.
GCP Cloud SQL should be protected from direct internet trafficChecks that GCP Cloud SQL instances are not directly exposed to the internet.
GCP Cloud SQL connections should require SSLChecks that GCP Cloud SQL requires SSL for all connections.
GCP Cloud Spanner should be encryptedChecks that GCP Cloud Spanner databases are encrypted at rest.
GCP Bigtable should be encryptedChecks that GCP Bigtable instances are encrypted at rest.
GCP Bigtable CPU utilization should be monitoredChecks that GCP Bigtable CPU utilization is being monitored.
GCP Bigtable storage utilization should be monitoredChecks that GCP Bigtable storage utilization is being monitored.
GCP Cloud Storage buckets should be protected from direct internet trafficChecks that GCP Cloud Storage buckets are not publicly accessible.
GCP BigQuery datasets should be protected from direct internet trafficChecks that GCP BigQuery datasets are not publicly accessible.
GCP Cloud Storage should have uniform bucket-level access enabledChecks that GCP Cloud Storage buckets have uniform bucket-level access enabled.
GCP BigQuery storage should be encryptedChecks that GCP BigQuery storage is encrypted at rest.
GCP KMS encryption keys should be protected from direct internet trafficChecks that GCP KMS encryption keys are not directly exposed to the internet.
GCP KMS encryption keys should be rotated within 90 daysChecks that GCP KMS encryption keys are rotated within 90 days.
GCP essential contacts should be configuredChecks that GCP essential contacts are configured for the project.
GCP log sink should be configured for all log entriesChecks that a GCP log sink is configured to capture all log entries.
GCP service account keys should only be GCP-managedChecks that GCP service account keys are GCP-managed only.
GCP service account user-managed keys should be rotated every 90 daysChecks that user-managed GCP service account keys are rotated within 90 days.
GCP service accounts should not have admin privilegesChecks that GCP service accounts do not have admin-level privileges.
GCP service account user role should not be assigned at project levelChecks that the GCP service account user/token creator role is not assigned at the project level.
Infrastructure entities should be classifiedChecks that all GCP infrastructure entities are classified by criticality.
Reported incidents should be closed in DSALTAChecks that incidents reported in GCP Security Command Center are resolved in DSALTA.
Users should be identifiedChecks that GCP users are identified and documented.
User access to critical systems should be validChecks that users with access to critical systems are authorized in GCP.
Google Security Command Center vulnerability alerts should be resolved within SLAChecks that Google Security Command Center vulnerability alerts are resolved within SLA.
Tests run automatically every 24 hours. Failed tests generate alerts and appear in your compliance dashboard with remediation guidance. All test results are stored as audit evidence with timestamps.

Compliance Frameworks

This integration provides evidence for the following compliance frameworks:

SOC 2

Access controls, monitoring, and change management evidence.

ISO 27001

Asset management, access control, and operations security evidence.

GDPR

Access records and data processing evidence.

Troubleshooting

Re-authenticate by going to Settings → Integrations → Google Cloud Platform (GCP) and clicking Reconnect. This usually happens when API tokens expire or permissions change.
Verify that the connected account still has the required admin permissions. Try a manual sync from the integration settings page. If the issue persists, check your Google Cloud Platform (GCP) API rate limits.
Tests generate after the first successful data sync. If sync completed but tests are missing, ensure the relevant features are configured in Google Cloud Platform (GCP) (e.g., GuardDuty must be enabled in AWS for GuardDuty tests to appear).
DSALTA syncs all users visible to the connected admin account. If users are missing, verify they are within the scope you configured during setup. Suspended or deleted accounts may not appear.