Configure Google Cloud Platform for Arctic Wolf monitoring
You can configure GCP® to send the necessary logs to Arctic Wolf® for security monitoring.
These resources are required:
- A user account with the Organization Administrator and Security Center Admin roles for the organization that you want to monitor.
- A user account with the Owner, Logging Admin, or Logging Writer role for the relevant organization, project, folder, or billing account that you want to monitor, to create an associated log sink.
- A tenant with data residency disabled for GCP Security Command Center.
Configure GCP Security Command Center
Enable Data Access audit logging
This step is optional.
GCP includes these default cloud audit logs:
- Admin Activity
- System Event
- Policy Denied
You can enable Data Access audit logging to get more detailed logging of GCP services at the read level. For example, if you have a GCP storage bucket with sensitive information, you can enable Data Access audit logging to report on read and write actions to the storage bucket. Without Data Access audit logging, you only receive reports on GCP storage bucket creation and deletion.
Changing any of the default cloud audit log settings, for example enabling Data Access audit logging, could increase costs associated with storing these logs and exporting them to Arctic Wolf. See Google Cloud's operations suite pricing for more information.
For each service that requires audit logging, complete these steps:
Create a project
Enable APIs
- Sign in to the Google Cloud Console with administrator permissions.
- In the main menu, click .
- Enable the SCC API in the project:
- In the search field, enter
Security Command Center API. - In the search results, click Security Command Center API.
- Click Enable.
- In the search field, enter
- Enable the Cloud Pub/Sub API in the project:
- In the search field, enter
Cloud Pub/Sub API. - In the search results, click Cloud Pub/Sub API.
- Click Enable.
- In the search field, enter
Create a service account
Create a topic
Create the main and replay subscriptions
For the main subscription and the replay subscriptions, complete these steps:
Create a cloud audit log sink
A cloud audit log sink routes cloud audit logs from the GCP organization, project, folder, or billing account to the Pub/Sub export topic, which then forwards the cloud audit log messages to Arctic Wolf.
You must create a log sink for each resource that you want Arctic Wolf to monitor. However, Arctic Wolf does not recommend creating a log sink at the organization level because of the increased costs. There could be costs associated with storing these logs and exporting them to Arctic Wolf through the topic created in Create a topic. See Google Cloud's operations suite pricing for more information.