Stay organized with collections Save and categorize content based on your preferences.
Preview
This feature is subject to the "Pre-GA Offerings Terms" in the General Service Terms section of the Service Specific Terms. Pre-GA features are available "as is" and might have limited support. For more information, see the launch stage descriptions.
The Snyk for Google Security Command Center (SCC) integration, available in Cloud Marketplace, lets you view and manage issues identified by Snyk as security findings in Google Cloud. Issues received from Snyk are represented in Security Command Center as code security findings. When Snyk issues are updated, the corresponding Security Command Center findings are automatically updated as well.
Complete the following sections in order:
Create a Snyk user account with permissions to edit and view group integrations.
Prepare your Google Cloud environment.
Create a Google Cloud organization with Security Command Center enabled at the organization level. See either Activate Security Command Center or Activate Security Command Center Enterprise tier for information about how to do this.
Identify or create a Google Cloud project in the organization from the previous step. Record the project information. You need this when configuring the integration.
(Optional) Manually create a service account in the project from the previous step, then do the following. If you don't create the service account manually, you must create it when configuring the integration. It is used to authenticate with Google Cloud.
Assign the Security Center Findings Editor (roles/securitycenter.findingsEditor
) role to the service account.
Create a service account key for the service account. Create the key in JSON format.
Record the following information. You use this when configuring the integration.
During this process, you configure the Snyk integration and create or configure a service account.
If you manually created the service account, get the following information:
In the Google Cloud console, go to the Snyk for Google Security Command Center (SCC) in Marketplace.
As an alternative, you can search for Snyk for Google Security Command Center (SCC) in Google Cloud Marketplace.
Select the organization where Security Command Center is enabled.
Click Sign up with partner to configure the integration.
Click Change to select a project in the organization. This is where the service account exists if you have already created it. If you have not created the service account, this is where it is created.
Select one of the following options:
Create a new service account. Select this if you didn't create a service account manually. Enter the following information:
Use an existing service account. Select this if you created a service account manually. From the menu, select the service account.
Click Submit.
In Security Command Center, go to Settings > Integrated services.
Find the listing for Snyk for Google Security Command Center (SCC).
Record the Source ID value for the integration. You need this information in the following section. This is also known as the relative resource name stored in the finding source name
field.
If you selected Create a new service account in the previous step, go to IAM in Google Cloud console and Create a service account key for the service account that was created. Create the key in JSON format and save it. You use it in a later step.
Collect the following information:
Source ID: the relative resource name that you saved in the previous section. The Google Cloud organization ID is parsed automatically from this field.
Service account key: the JSON key that you created from the service account.
Navigate to your Snyk group-level integrations page, called Integrations Hub, and then sign in using your Snyk credentials.
Search for Google SCC
, and then click Use integration in the Google SCC entry that is returned.
Enter values for the following:
Click Done.
After the connection is established, the Google SCC integration status changes to Setup in progress. The status automatically changes to Connected when the next Snyk scan occurs in your environment.
What's nextReview and manage Snyk code security findings.
Except as otherwise noted, the content of this page is licensed under the Creative Commons Attribution 4.0 License, and code samples are licensed under the Apache 2.0 License. For details, see the Google Developers Site Policies. Java is a registered trademark of Oracle and/or its affiliates.
Last updated 2025-08-12 UTC.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-08-12 UTC."],[],[]]
RetroSearch is an open source project built by @garambo | Open a GitHub Issue
Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo
HTML:
3.2
| Encoding:
UTF-8
| Version:
0.7.4