Log in
Integrations/Google Cloud Platform (GCP)
Core Security Platforms

Google Cloud Platform (GCP) Integration

Use Google Cloud Platform (GCP) as an evidence source in Aurora Command. Capture evidence automatically where supported, or attach exports when you need to. Aurora keeps the source, timestamp, owner, and review history so evidence stays reusable between reviews.

CloudDirect connectionEvidence captureContinuous checksUpdates every 1 hours2 mapped controls
Common coverage includes Cloud audit logging and Cloud Security Management --- Cloud security management.
No compliance guarantees. We'll confirm what's automated and what stays export-based.
At a Glance
Best for
Continuous checks and evidence capture
Auth
Gcp Service Account
Cadence
Every 1 hours
Setup time
10 to 20 minutes
Framework coverage
Aurora Essentials (Baseline Control Set) and 11 more
Exports & records
Artifacts reviewers recognize. Preview sample structures before you share anything.

Setup

Setup

A short path from connection to an exportable evidence bundle.

01
Connect Google Cloud Platform (GCP)
Sign-in method: Gcp Service Account. Start with least-privilege access where supported.
02
Confirm Evidence Sources and Cadence
Confirm evidence sources and set cadence (every 1 hours).
03
Validate Capture (Read-Only Where Possible)
Validate evidence capture in read-only mode (where possible) before expanding workflows.
04
Map Evidence to Controls
Map captured artifacts to controls (2 mapped controls listed).
05
Bundle evidence when needed
Export an evidence bundle (ZIP) when you need an offline attachment. Aurora keeps the underlying source and timestamps so the work stays reusable.

Capture

What This Integration Captures

Evidence types and collection notes, based on the integration’s published resources.

What Aurora monitors
2 continuous checks
GCP audit logs enabled • GCP Storage Public Access Prevention enforced
Evidence Aurora can collect
2 evidence types
Accounts • Resource
How it stays current
Incremental updates every 1 hours. Full refresh daily.
Checks update as new data is synced.
Checks
Automated checks Aurora can run
Checks map directly to common buyer requirements. Reviewers see the result as exportable evidence, not a screenshot.
GCP audit logs enabled
GCP Storage Public Access Prevention enforced
Evidence
Evidence types collected
These evidence objects can be mapped to controls and exported as an evidence bundle or audit workbook snapshot.
AccountsResource
Produces
  • Evidence objects with source details
  • Freshness and cadence status
  • Evidence bundle exports (plan-based)
Security Note
Read-only API, scoped credentials, and an audit trail (where supported by the connector and your environment).
Cadence Controls
Incremental updates every 1 hours. Full refresh daily.

Reviewers

Why It Matters for Reviewers

A few ways this reduces follow-ups during audits and buyer reviews.

  • Reduces “show me” follow-ups by attaching system exports to answers.
  • Keeps timestamps explicit for audit windows.
  • Makes sampling easier through evidence bundles.

Frameworks

Controls and Frameworks Impacted

A quick sense of which frameworks this connector helps cover (based on mapped controls).

Aurora Essentials (Baseline Control Set)
AURORA_ESS
2 controls
AWS Foundational Technical Review (FTR) Validation Checklist
AWS_FTR
1 control
CSA Consensus Assessments Initiative Questionnaire (CAIQ) v4.0.3
CAIQ
1 control
CSA Cloud Controls Matrix (CCM) v4.0.12
CCM
1 control
FedRAMP Security Controls Baseline (High) - NIST SP 800-53 Rev. 5
FEDRAMP_REV5_HIGH_BASELINE
1 control
FedRAMP Security Controls Baseline (Low) - NIST SP 800-53 Rev. 5
FEDRAMP_REV5_LOW_BASELINE
1 control
FedRAMP Security Controls Baseline (Moderate) - NIST SP 800-53 Rev. 5
FEDRAMP_REV5_MODERATE_BASELINE
1 control
FedRAMP 20x (Phase 2 Pilot) Requirements, Recommendations, and KSIs
FEDRAMP20X
1 control
ISO/IEC 27017:2015 — Code of practice for information security controls for cloud services
ISO_IEC_27017_2015
1 control
ISO/SAE 21434:2021 — Road vehicles — Cybersecurity engineering
ISO_SAE_21434
1 control
StateRAMP / GovRAMP Baseline Controls for Authorization (Authorized Low & Moderate) --- StateRAMP Authorized Baseline Requirements (Aligned to NIST SP 800-53 Rev. 5)
STATERAMP
1 control
TX-RAMP (Texas Risk and Authorization Management Program) Control Baselines --- TX-RAMP 2.0 Control Baselines (Aligned to NIST SP 800-53 Rev. 5)
TXRAMP
1 control

FAQ

Google Cloud Platform (GCP) Integration Questions

Short answers to common evaluation questions.

Does this require admin access?
It depends on the evidence you choose to capture. We'll confirm required permissions during setup.
Can we control cadence?
Yes. In eligible plans, cadence is configurable.
Can we export evidence if a reviewer asks?
Yes, when needed. You can export evidence bundles for offline attachments, or share a controlled reviewer view through Trust Center. Aurora keeps the source and timestamps so the work stays reusable between reviews.
Next step
Want to Confirm Evidence Coverage for Google Cloud Platform (GCP)?
Bring one reviewer request. We'll map what can be automated, what stays manual, and how to share it in a controlled way.
No obligation. We respond within one business day. No compliance guarantees.