Google Cloud SecOps MCP server
Triage vulnerability findings and remediation guidance in Google Cloud Security Command Center from your AI agents.
About
Connect Tracecat to Google Cloud SecOps to triage Security Command Center findings for cloud security teams that use SCC as their system of record for GCP misconfigurations and vulnerabilities. You can pull the top active high and critical findings sorted by Attack Exposure Score from a workflow. From there, fetch remediation guidance for each finding, correlate the affected resources with Cloud Asset Inventory, and route the most urgent ones to the right on-call team with credentials kept inside your Google Cloud boundary.
Setup
- 1
Sign in with OAuth
You'll authorize Tracecat to access Google Cloud SecOps on your behalf. No API keys to manage.
- 2
Select the
Google Cloud SecOpstile in the Tracecat MCP catalogOpen the
MCP catalogin your workspace, select theGoogle Cloud SecOpstile, and complete the OAuth flow. - 3
Enable
Google Cloud SecOpsin your agentIn your
ai.agentaction orAgents→toolstab, selectGoogle Cloud SecOpsfrom theMCP integrationsdropdown.
Tools
top_vulnerability_findings | Return active high and critical vulnerability findings from Security Command Center, sorted by Attack Exposure Score. |
get_finding_remediation | Fetch remediation guidance for a single finding, with details of the affected resource. |