Maintained with ☕️ by
IcePanel logo

Security Command Center provides increased support for Microsoft Azure data

Share

Services

## Feature Security Command Center provides increased support for Microsoft Azure data. * Security Command Center can collect [Microsoft Azure resource and configuration data](https://cloud.google.com/security-command-center/docs/connect-scc-to-azure). * Risk Engine can discover [toxic combinations](https://cloud.google.com/security-command-center/docs/toxic-combinations-overview), [attack paths](https://cloud.google.com/security-command-center/docs/attack-exposure-learn), and [issues](https://cloud.google.com/security-command-center/docs/issues-overview) in your Microsoft Azure environment. * The Sensitive Data Protection discovery service can [profile your Azure Blob Storage](https://cloud.google.com/sensitive-data-protection/docs/profile-azure-blob-storage) data and identify vulnerabilities and misconfigurations that can expose sensitive data. * [Cloud Infrastructure Entitlement Management (CIEM)](https://cloud.google.com/security-command-center/docs/ciem-overview) can analyze and generate misconfiguration findings for Azure role-assignments that grant principals excessive privileges beyond what they use. This capability is available in [Preview](https://cloud.google.com/products#product-launch-stages). ## Announcement [Toxic Combinations](https://cloud.google.com/security-command-center/docs/toxic-combinations-overview) for Amazon Web Services (AWS) has been released to [General Availability](https://cloud.google.com/products#product-launch-stages).