Overview
WALT Carbon’s security scanning feature provides comprehensive vulnerability assessment and compliance monitoring for your Google Cloud Platform resources. This guide walks you through the essential configuration steps.Prerequisites
Before configuring security scans, ensure:- You have Admin or Security Manager role in WALT Carbon
- Your GCP organization has Security Command Center API enabled
- WALT Carbon service account has Security Reviewer permissions
Step 1: Enable Security APIs
First, verify that required APIs are enabled in your GCP project:WALT Carbon can automatically enable these APIs if you grant the necessary permissions during setup.
Step 2: Configure Service Account Permissions
Grant WALT Carbon’s service account the necessary permissions:- Using Console
- Using CLI
- Go to IAM & Admin > IAM in Google Cloud Console
- Find the WALT Carbon service account
- Add these roles:
- Security Center Admin
- Cloud Asset Viewer
- Compute Security Admin
Step 3: Access Security Configuration
In your WALT Carbon platform:- Navigate to Security > Configuration
- Click Set Up Security Scanning
- Select your GCP organization/project
Step 4: Configure Scan Settings
Basic Scan Configuration
Resource Scope
Select which GCP resources to scan:
- ✅ Compute Engine instances
- ✅ Cloud Storage buckets
- ✅ Cloud SQL databases
- ✅ IAM policies and permissions
- ✅ Network security groups
Scan Frequency
Set your scanning schedule:
- Daily: Recommended for production environments
- Weekly: Suitable for development environments
- On-demand: Manual scans only
Advanced Configuration
Custom Scan Filters
Custom Scan Filters
Resource Filters
- Exclude test/development projects
- Focus on production environments
- Filter by resource labels or tags
- Exclude known false positives
- Custom severity scoring
- Compliance framework alignment
Alert Configuration
Alert Configuration
Immediate Alerts
- Critical vulnerabilities (Slack/Email)
- New security findings (Email)
- Compliance violations (Email)
- Weekly security summary
- Monthly compliance report
- Quarterly risk assessment
Team Notifications
Team Notifications
Security Team
- All critical and high findings
- Compliance status changes
- Scan completion notifications
- Findings specific to their projects
- Remediation recommendations
- Fix verification notifications
Step 5: Run Initial Scan
After configuration:- Click Run Initial Scan
- Monitor scan progress in the Security Dashboard
- Initial scan may take 30-60 minutes depending on resource count
The first scan will establish your security baseline. Subsequent scans will focus on changes and new findings.
Step 6: Review and Prioritize Findings
Understanding Scan Results
- Critical Findings
- High Priority
- Medium Priority
Immediate Action Required
- Publicly accessible resources with sensitive data
- Unencrypted databases or storage
- Overprivileged service accounts
- Known vulnerabilities with active exploits
Remediation Workflow
- Triage: Review findings with your security team
- Prioritize: Use WALT Carbon’s risk scoring
- Assign: Delegate fixes to appropriate teams
- Track: Monitor remediation progress
- Verify: Confirm fixes with follow-up scans
Compliance Frameworks
WALT Carbon supports multiple compliance standards:CIS Benchmarks
Center for Internet Security best practices
NIST Framework
National Institute of Standards and Technology
ISO 27001
International security management standard
SOC 2
Service Organization Control requirements
Monitoring and Maintenance
Regular Activities
Performance Optimization
To optimize scan performance:- Schedule scans during low-usage periods
- Exclude unnecessary resources from scans
- Use incremental scanning for large environments
- Batch remediation activities to reduce scan noise
Troubleshooting
Common Issues
Scan Failures
Scan Failures
Symptoms: Scans not completing or returning errorsSolutions:
- Verify API permissions are correctly configured
- Check service account has not been modified
- Ensure APIs are enabled in target projects
- Review resource quotas and limits
Missing Resources
Missing Resources
Symptoms: Expected resources not appearing in scansSolutions:
- Verify resource scope configuration
- Check IAM permissions for target resources
- Confirm resources are in supported regions
- Review resource labels and filters
No Alerts Received
No Alerts Received
Symptoms: Security findings not generating alertsSolutions:
- Check notification settings and recipients
- Verify email addresses and Slack channels
- Review alert severity thresholds
- Test notification channels manually
Best Practices
Next Steps
After completing security scan configuration:- Set up BigQuery Analytics for advanced security reporting
- Configure 2FA for additional account security
- Explore Cost Management features for comprehensive platform utilization
Support
Need help with security scanning?- 📧 Security support: security@waltlabs.io
- 📚 Knowledge base: Access in-platform help center
- 🔧 Schedule consultation: Available through your account manager