How to Onboard GCP Account

Modified on Tue, 26 Mar 2024 at 08:14 PM

Log in to CloudSecOps portal using your credentials.

Once you successfully logged in for the first time. You will be able to see the "Environment" page only under Global Tenant Setting (please refer to the screenshot below).

You will be able to see all of the pages once you add any AWS, GCP or Azure account. 

Now, hit the marked option to link your GCP account.


  • Make sure the user who is onboarding the GCP account must have Permissions to create Service Accounts

Step 1: Basic Information 

Start with giving it a name.You can give any name for your account. Labels help you to identify the account. Some examples of labels are: US PROD, Dev server, etc.

Step 2: Organization

Now you give your organization a name. An organization is where you can add multiple GCP accounts.

Step 3: Create a Service Account

  1. Go to IAM and Admin
  2. Choose create service account
  3. Fillup Service account details
  4. For Granting service account access to project, select roles as in below screenshot
  5. Click continue and create service account

Permissions you need to provide
  • Cloud Functions Admin 
  • Compute Admin

Note: These permissions are required to enable CWPP to identify OS Vulnerabilities*

Step 4: Create Keys

  • Go to IAM and Admin
  • Go to keys Tab
  • Click create key button, a popup will open
  • In the popup, select JSON as Key type and click create

  • JSON file will downloaded
  • Upload the JSON and connect your GCP account with clouddefense

Once done click Connect account. Once the account is added, the scan will get automatically started. 

Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select atleast one of the reasons

Feedback sent

We appreciate your effort and will try to fix the article