Skip to main content

gcp scc integration Google Cloud SCC Integration Guide

If your team runs infrastructure on Google Cloud, this integration brings Security Command Center findings into Openlane automatically. You get a single place to track cloud security findings, remediation timelines, and SLA compliance (SOC 2: CC7, CC8; ISO 27001: A.12.6).

Integration Snapshot

ItemDetails
Primary use caseContinuous ingestion of SCC findings into Openlane
Data directionOne-way (GCP -> Openlane), read-only
GCP services usedSecurity Command Center, IAM, IAM Credentials, STS (for WIF)
Setup modelService account key (simple path) or Workload Identity Federation (keyless path)
Openlane records createdVulnerabilities (created or updated), linked to your SCC integration

Key Capabilities

  • Findings Ingestion: Pulls SCC findings and normalizes them into Openlane vulnerability records, giving you a unified view for remediation tracking and SLA compliance (SOC 2: CC7, CC8).
  • Scoped Collection: Supports source and filter scoping to match your operating model and compliance boundary.
  • Flexible Auth: Supports service-account key auth and Workload Identity Federation, so you can choose what fits your environment.

Prerequisites

  • gcloud CLI access with permissions to create service accounts and grant IAM bindings.
  • Security Command Center API enabled in the target project.
  • Organization ID or project ID to define your SCC collection scope.
  • If using Workload Identity Federation, an OIDC issuer configuration.

Step-by-Step Setup

Step 1: Run the GCP Setup Script

Use the Openlane setup script to configure IAM, enable required APIs, and print the exact values needed in Openlane.

  1. Download the script:
curl -fsSL https://docs.theopenlane.io/integrations/setup/gcp/openlane-gcp-scc-setup.sh \
-o openlane-gcp-scc-setup.sh
chmod +x openlane-gcp-scc-setup.sh
  1. Run key-based setup (service account key path):
./openlane-gcp-scc-setup.sh \
--project-id <PROJECT_ID> \
--organization-id <ORGANIZATION_ID> \
--source-id <SCC_SOURCE_ID>
  1. Or run keyless setup (WIF path):
./openlane-gcp-scc-setup.sh \
--project-id <PROJECT_ID> \
--organization-id <ORGANIZATION_ID> \
--source-id <SCC_SOURCE_ID> \
--enable-wif \
--skip-key \
--oidc-issuer-url <OIDC_ISSUER_URL> \
--oidc-allowed-audience <OIDC_AUDIENCE>

The script prints the values to paste into Openlane.

Step 2: Connect Google Cloud SCC in Openlane

  1. Navigate to Organization Settings > Integrations and find Google Cloud SCC.
  2. Click Configure and enter the required fields:
FieldRequiredPurpose
organizationIdYes (one of organizationId or projectId)GCP organization used as the SCC parent for org-wide collection
projectIdYes (one of organizationId or projectId)GCP project for single-project SCC access and quota defaults
sourceIdRecommendedSCC source identifier to scope findings (e.g. organizations/123/sources/456)
sourceIdsRecommendedList of SCC source identifiers; bare IDs are expanded against selected parents
serviceAccountKeyYes (key path)Service account key JSON from setup script output
workloadIdentityProviderYes (WIF path)Fully-qualified Workload Identity Provider resource name
audienceYes (WIF path)STS audience for token exchange
serviceAccountEmailYes (WIF path)Target service account email for impersonation
subjectTokenYes (WIF path)OIDC/JWT subject token used in federation exchange
projectScopeNoall (default) or specific to restrict fan-out
projectIdsConditionalRequired when projectScope is specific
findingFilterNoCEL filter applied when querying SCC findings
scopesNoAdditional OAuth scopes requested during impersonation
tokenLifetimeNoAccess token lifetime override (default: 3600s)
audienceHintNoAudience override if multiple STS exchanges are supported
workloadPoolProjectNoProject that owns the workload identity pool (if different from projectId)
  1. Click Save.

Validate Connection

After saving, Openlane runs a health check against Google Cloud SCC and displays the result on the Installed tab of the Integrations page. A Healthy badge confirms connectivity. If the badge shows Needs Attention, review the troubleshooting section below.

Supported Operations

This integration is read-only and one-directional. Openlane validates connectivity by listing sources, then pulls findings from the configured source scope. Openlane never pushes configuration changes back into GCP.

What Openlane Creates From Findings

Each SCC finding becomes a normalized vulnerability record in Openlane:

  • Converts findings into vulnerability payloads with severity, state, category, timestamps, and source URIs preserved.
  • Deduplicates by externalID (with CVE fallback when available), so repeated syncs update existing records instead of creating duplicates.
  • Links each vulnerability to the SCC integration that produced it.
  • Stores raw payload data if raw payload retention is enabled in your integration config.

What You Can Do Next

Once vulnerabilities land in Openlane, you can link them to affected assets, create remediation tasks, and track resolution against SLAs. Saves you from manually gathering evidence when an auditor asks about SOC 2 CC7 (system monitoring) or ISO 27001 A.12.6 (technical vulnerability management).

Disconnect

To remove this integration, navigate to Organization Settings > Integrations and select the Installed tab. Open the menu on the integration card and select Disconnect. This removes stored credentials and stops all collection activity. You can reconnect later by configuring the integration again.

Troubleshooting

  • Token exchange failure: verify workload identity provider, audience, and subject token.
  • Permission errors: verify service account SCC read permissions at selected scope.
  • No findings ingested: verify source scope and finding filter configuration.

References