GCP Security Command Center - Detect Firewall rules allowing unrestricted high-risk ports

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


This query detects GCP Firewall rules that allow unrestricted (0.0.0.0/0) ingress to high-risk ports using Google Cloud Security Command Center OPEN_FIREWALL findings. Publicly exposed management, database, and service ports (e.g., RDP 3389, SSH 22, SQL 1433/3306) significantly increase the risk of brute-force attacks, exploitation, and lateral movement.

Attribute Value
Type Analytic Rule
Solution Google Cloud Platform Security Command Center
ID f4f92ca4-6ebe-4f2a-90e5-b0d04b709651
Severity High
Status Available
Kind Scheduled
Tactics InitialAccess, LateralMovement, Discovery
Techniques T1133, T1021, T1046
Required Connectors GoogleSCCDefinition
Source View on GitHub

Tables Used

This content item queries data from the following tables:

Table Transformations Ingestion API Lake-Only
GoogleCloudSCC ?

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Analytic Rules · Back to Google Cloud Platform Security Command Center