Search icon CANCEL
Subscription
0
Cart icon
Cart
Close icon
You have no products in your basket yet
Save more on your purchases!
Savings automatically calculated. No voucher code required
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Microsoft Defender for Cloud Cookbook

You're reading from  Microsoft Defender for Cloud Cookbook

Product type Book
Published in Jul 2022
Publisher Packt
ISBN-13 9781801076135
Pages 314 pages
Edition 1st Edition
Languages
Author (1):
Sasha Kranjac Sasha Kranjac
Profile icon Sasha Kranjac
Toc

Table of Contents (12) Chapters close

Preface 1. Chapter 1: Getting Started with Microsoft Defender for Cloud 2. Chapter 2: Multi-Cloud Connectivity 3. Chapter 3: Workflow Automation and Continuous Export 4. Chapter 4: Secure Score and Recommendations 5. Chapter 5: Security Alerts 6. Chapter 6: Regulatory Compliance and Security Policy 7. Chapter 7: Microsoft Defender for Cloud Workload Protection 8. Chapter 8: Firewall Manager 9. Chapter 9: Information Protection 10. Chapter 10: Workbooks 11. Other Books You May Enjoy

Creating a GCP service account and connecting GCP to Microsoft Defender for Cloud

You will need a GCP service account to access the data that's ingested in GCP's Security Command Center.

Getting ready

Open a web browser and navigate to https://portal.azure.com. Open a new browser tab and navigate to https://console.cloud.google.com.

How to do it…

To create a GCP service account, complete the following steps:

  1. In GCP Console, from the left menu, under IAM & Admin, select Service Accounts.
  2. From the top menu, select + CREATE SERVICE ACCOUNT.
  3. In the Service account name field, enter the account's name. Optionally, in the Service account description field, describe what this service account will be used for. Click CREATE AND CONTINUE.
  4. When you get to the Grant this service account access to project step, click on a Select role drop-down menu and select the Security Center Admin Viewer role. Select CONTINUE.
  5. The Grant users access to this service account step is optional. Click DONE.
  6. Copy the email of the service account and save it; we will use this later.
  7. From the Navigation menu, under IAM & Admin, click IAM. Ensure you are viewing IAM permissions for an organization, rather than for a project. From the top menu, switch to the organization level.
  8. To add a new user, click ADD.
  9. In the New members field, enter the email value of the service account you copied in Step 6.
  10. From the Select role menu, select the Security Center Admin Viewer role and click SAVE.
  11. Select a project to switch to a project level since the Service Accounts page can't be viewed by organizations.
  12. In the Navigation menu, under IAM & Admin, click Service accounts.
  13. Next to the service account you created previously, click on the vertical ellipsis (three vertical dots) and select Manage keys:
Figure 2.33 – Service accounts for project

Figure 2.33 – Service accounts for project

  1. On the Keys page, click ADD KEY and then select Create new key.
  2. In the Create private key window, choose JSON for Key type and click CREATE.
  3. Save the JSON file.
  4. In the Navigation menu, under IAM & Admin, click Settings. Copy the Organization ID value and save it for later use.
  5. In the Azure portal, open Microsoft Defender for Cloud. Under the Management section, select Cloud connectors.
  6. Select Connect GCP account:
Figure 2.34 – Connect GCP account

Figure 2.34 – Connect GCP account

  1. In the Display name field, enter a name for the GCP connector.
  2. Choose an Azure subscription.
  3. In the Organization ID field, paste the value you copied in Step 17.
  4. For GCP private key file, click on a folder icon and select the JSON file you saved in Step 16.
  5. Select Next: Review and generate.
  6. On the Review and generate page, review the details and click Create.

How it works…

To connect the GCP account to Microsoft Defender for Cloud, you created a service account in GCP with the appropriate permissions to read security information from GCP Security Center. This GCP service account is used to read the data in GCP Security Command Center. Then, you created a private key for the service account, which will be used for authentication in the Microsoft Defender for Cloud GCP connector. With all the necessary information at hand, you created a GCP connector in Microsoft Defender for Cloud.

You have been reading a chapter from
Microsoft Defender for Cloud Cookbook
Published in: Jul 2022 Publisher: Packt ISBN-13: 9781801076135
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime