You are a SOC manager at an organization that recently implemented Google Security Operations (SecOps). You need to monitor your organization's data ingestion health in Google SecOps. Data is ingested with Bindplane collection agents.
You want to configure the following:
• Receive a notification when data sources go silent within 15 minutes.
• Visualize ingestion throughput and parsing errors.
What should you do?
A. Configure automated scheduled delivery of an ingestion health report in the Data Ingestion and Health dashboard. Monitor and visualize data ingestion metrics in this dashboard.
B. Configure silent source alerts based on rule detections for anomalous data ingestion activity in Risk Analytics. Monitor and visualize the alert metrics in the Risk Analytics dashboard.
C. Configure notifications in Cloud Monitoring when ingestion sources become silent in Bindplane. Monitor and visualize Google SecOps data ingestion metrics using Bindplane Observability Pipeline (OP).
D. Configure silent source notifications for Google SecOps collection agents in Cloud Monitoring.
Create a Cloud Monitoring dashboard to visualize data ingestion metrics.
Explanation:
Comprehensive and Detailed Explanation
The correct solution is Option D. This approach correctly uses the integrated Google Cloud-native tools for both monitoring and alerting.
Google Security Operations (SecOps) automatically streams all ingestion metrics to Google Cloud
Monitoring. This includes metrics for throughput (e.g., chronicle.googleapis.com/ingestion/event_count, chronicle.googleapis.com/ingestion/byte_count), parsing errors (e.g., chronicle.googleapis.com/ingestion/parse_error_count), and the health of collection agents (e.g., chronicle.googleapis.com/ingestion/last_seen_timestamp).
Receive a notification (15 minutes): The Data Ingestion and Health dashboard (Option A) is for visualization, and its "reports" are scheduled summaries, not real-time alerts. The only way to get a 15-minute notification is to use Cloud Monitoring. An alerting policy can be configured to trigger when a "metric absence" is detected for a specific collection agent's last_seen_timestamp, fulfilling the "silent source" requirement.
Visualize metrics: Cloud Monitoring also provides a powerful dashboarding service. A Cloud Monitoring dashboard can be built to graph all the necessary metrics―throughput, parsing errors, and agent status―in one place.
Option C is incorrect because it suggests using the Bindplane Observability Pipeline, which is a separate product.
Option B is incorrect as Risk Analytics is for threat detection (UEBA), not platform health.
Exact Extract from Google Security Operations Documents:
Use Cloud Monitoring for ingestion insights: Google SecOps uses Cloud Monitoring to send the ingestion notifications. Use this feature for ingestion notifications and ingestion volume viewing.
Set up a sample policy to detect silent Google SecOps collection agents:
In the Google Cloud console, select Monitoring.
Click Create Policy.
On the Select a metric page, select Chronicle Collector > Ingestion > Total ingested log count.
In the Transform data section, set the Time series group by to collector_id.
Click Next.
Select Metric absence and set the Trigger absence time (e.g., 15 minutes).
In the Notifications and name section, select a notification channel.
You can also create custom dashboards in Cloud Monitoring to visualize any of the exported metrics, such as Total ingested log size or Total record count (for parsing).
Reference: Google Cloud Documentation: Google Security Operations > Documentation > Ingestion > Use Cloud Monitoring for ingestion insights
Google Cloud Documentation: Google Security Operations > Documentation > Ingestion > Silent-host monitoring > Use Google Cloud Monitoring with ingestion labels for SHM