Posture Control (ZPC)
Integrating Vulnerability Management for Google Cloud Platform Workloads
Zscaler Posture Control (ZPC) enables you to integrate the vulnerability management for your Google Cloud Platform (GCP) workloads. The integration allows ZPC to scan the Windows and Linux GCP cloud workloads for known security vulnerabilities and display the scan results in the ZPC Admin Portal, so you can investigate and remediate the vulnerabilities.
ZPC does not support the vulnerability scanning of GCP workloads that are encrypted with Customer Supplied Encryption Key (CSEK).
ZPC supports the vulnerability scanning of GCP cloud workloads located in the following regions:
- Supported Regions
- asia-east1
- asia-east2
- asia-northeast1
- asia-northeast2
- asia-northeast3
- asia-south1
- asia-south2
- asia-southeast1
- asia-southeast2
- australia-southeast1
- australia-southeast2
- europe-central2
- europe-north1
- europe-southwest1
- europe-west1
- europe-west2
- europe-west3
- europe-west4
- europe-west6
- europe-west8
- europe-west9
- me-west1
- northamerica-northeast1
- northamerica-northeast2
- southamerica-east1
- southamerica-west1
- us-central1
- us-east1
- us-east4
- us-east5
- us-south1
- us-west1
- us-west2
- us-west3
- us-west4
Prerequisites
You must first onboard your GCP cloud accounts before enabling the specific accounts for vulnerability scanning. To learn more, see Onboarding a Google Cloud Platform Account.
To integrate the vulnerability management for GCP cloud workloads:
- Go to Administration > Container Registries & Workloads.
- Click Add Integration.
- Under General Information:
- For Vulnerability Scanning Type, select Cloud Workloads.
- For Cloud Type, select Google Cloud.
- Click Next.
- Under Account Selection, click the Organizations tab and select the accounts within a specific organization that must be configured for scanning.
- Click Finish.
A message is displayed indicating that the vulnerability management integration is successful. You can set up the vulnerability scanning rule and schedule the scan to run at regular intervals. To learn more, see Adding a Vulnerability Scanning Rule for Cloud Workloads.