Managing security across Google Cloud, Azure, and AWS can feel overwhelming, especially as businesses adopt multi‑cloud environments and face constantly evolving threats. Each cloud provider offers its own CSPM, CWP, SIEM, and threat‑detection tools—but knowing which service does what is essential for building a strong security foundation. This guide breaks down the core security services across all three major cloud platforms, helping you compare capabilities, understand their roles, and choose the right controls to strengthen your cloud security posture.
CSPM: For Compliance & Posture
CWP: For Vulnerability & Workload Protection
Google Cloud Security Services:
Google Cloud uses Security Command Center (SCC) as its unified security platform for CSPM, CWP, and threat detection and Google Chronicle for SIEM/SOAR
CSPM - Security Command Center (SCC): For Compliance & Posture
Security Health Analytics (SHA): Posture & Compliance Scanning
Misconfigurations, compliance violations, IAM risks, public bucket exposure
CWP - Security Command Center (SCC): For Vulnerability & Workload Protection
Container Threat Detection (CTD): Runtime Threat Detection for Containers
Malware in containers, suspicious processes, privilege escalation attempts
Container Analysis: Vulnerability Scanning for container images
CVEs in container images, outdated packages
Web Security Scanner: Vulnerability Scanning for Web Apps
Scans applications running on App Engine, GKE, and Compute Engine for common web vulnerabilities. XSS, insecure configurations, outdated libraries
VM Threat Detection (VTD): Runtime threat detection for VMs
Monitors Compute Engine VMs for signs of compromise or malicious activity using runtime signals and logs. Crypto-mining, rootkits, suspicious binaries
Threat Detection via Logs: Used by SOC
Event Threat Detection (ETD): Suspicious IAM activity, anomalous network traffic, malware indicators, data exfiltration
SIEM: Google Chronicle
Collects and analyzes security telemetry for threat detection and investigation.
Azure Security Services:
Azure uses Microsoft Defender for Cloud as its unified security platform for CSPM, CWP, and threat detection, integrated with Microsoft Sentinel for SIEM/SOAR.
CSPM: For Compliance & Posture
Microsoft Defender for Cloud (formerly Azure Security Center): For CSPM and CWP
Provides security posture management across Azure, AWS, and GCP.
Portal: portal.azure.com > Search for "Defender for Cloud"
Alert Types (CSPM): Misconfigurations, compliance violations, insecure settings.
Azure Policy: Creates, assigns, and manages policies to enforce security configurations and compliance. Often integrated with Defender for Cloud.
Portal: portal.azure.com > Search for "Policy"
Alert Types: Policy non-compliance alerts.
CWP: For Vulnerability & Workload Protection
Microsoft Defender for Cloud (formerly Azure Security Center): For CSPM and CWP
Protects VMs, containers, and PaaS services with vulnerability scanning and runtime protection.
Portal: portal.azure.com > Search for "Defender for Cloud"
Alert Types (CWP): Vulnerabilities, malware detection, suspicious processes
Azure Defender (Endpoint/Identity/Office): For example, Defender for Endpoint / Servers / Identity/Office
Includes Defender for Endpoint, Servers, Identity, and Office for advanced threat protection across workloads and identities.
Portal: https://security.microsoft.com/
Alert Types: Endpoint compromise, identity-based attacks, phishing, ransomware indicators.
Threat Detection via Logs:
Microsoft Defender for Cloud + Defender family: Threat Detection – Used by SOC
Monitors Azure resources and integrated services for malicious activity.
Alert Types: Suspicious sign-ins, anomalous network traffic, privilege escalation attempts.
SIEM:
Microsoft Sentinel (SIEM/SOAR) (formerly Azure Security Center)
Cloud-native SIEM and SOAR platform for collecting, analyzing, and correlating security data across environments.
Portal: portal.azure.com > Search for "Microsoft Sentinel"
Alert Types: Threat detection alerts, automated incident response workflows.
AWS Security Services:
AWS uses a combination of Security Hub and Config for CSPM, Amazon Inspector for CWP, and GuardDuty for threat detection, with Security Lake providing SIEM-like capabilities.
CSPM: For Compliance & Posture
AWS Security Hub: CSPM
Aggregates and prioritizes security findings across AWS services.
Alert Types: Aggregated findings from AWS services (WAS Config, AWS GuardDuty, AWS Inspector) and partner tools; compliance violations (CIS, PCI DSS, etc.).
AWS Config: CSPM
Tracks resource configurations and evaluates compliance over time.
Alert Types: Configuration drift, non-compliant resources, rule violations.
CWP: For Vulnerability & Workload Protection
Amazon Inspector: CWP (Vulnerability Management)
Automated vulnerability scanning for EC2, containers, and Lambda workloads.
Alert Types: Vulnerabilities (CVEs), exposed network paths, software misconfigurations.
Threat Detection via Logs:
Amazon GuardDuty: Threat Detection – Used by SOC
Threat detection service monitoring AWS accounts and workloads for malicious activity.
Alert Types: Security Alerts - Suspicious API calls, compromised credentials, crypto-mining activity, anomalous network traffic.
SIEM-like capability for AWS:
Amazon Security Lake (SIEM-like) + Lambda/EventBridge for SOAR
Centralized Security Data Lake, Collects and normalizes security logs from AWS services and third-party sources into a centralized data lake for analytics
Alert Types: Security Lake itself does not create alerts; it stores and normalizes logs (e.g., GuardDuty findings, Inspector vulnerabilities, VPC Flow Logs, CloudTrail events) for analysis by SIEM tools or custom queries.
Incident Investigation & Forensics:
Amazon Detective:
Investigates and analyzes security incidents using graph-based data.
Alert Types: Detective does not produce alerts; it consumes alerts from GuardDuty, Security Hub, and other sources and provides context for investigation (e.g., related resources, timelines, and behaviors) and root cause analysis.
Best-Practice Advisory tool:
AWS Trusted Advisor: Best-Practice Advisory tool
Provides best-practice recommendations for cost, performance, and security.
Alert Types: Recommendations (not real-time alerts) for security gaps, cost optimization, performance improvements.
Comments