Connector Instructions
GCP Connector Instructions
Custom Instructions
Required Permissions
User Executing The Script:
Create Service Accounts (Role)
Service Account Key Admin (Role)
Script Permissions:
Reader (Project Level for all Projects)
Manual Instructions
Log in to your GCP Console.
Select a Google Cloud Project.
Navigate to
IAM & Admin → Service Account → Create Service Account → Create and Continue.Grant the Service Account the
ViewerRole and clickDone.Copy the new service account email.
Click the three-dot menu for the new service account and select
Manage Keys.In the Service Account keys screen:
Click
Add Key → Create New Key → Create.Save the Service Account JSON file.
Note down the value of
project_idin the JSON.Encode the JSON object to Base64 and note down the value.
In the OX Connector, enter the
project_idand encoded JSON object.Click
Connect.
You should receive a message that the connection was successful. If not, please repeat the steps above or contact support.
Adding Multiple Projects for the Same Token
Step 1: Copy the Service Account Email
Navigate to the main project (the one already selected for scan) in Google Cloud Console.
Go to
Service Accountsand copy the service account email.
Step 2: Grant Access to Multiple Projects
For the Main Project:
Navigate to
IAM & Admin → IAM.Click on
Grant Access.Add the copied Service Account email as a Participant.
Assign the
ViewerRole and clickSave.
For Additional Projects:
Navigate to the target project’s
IAM & Admin → IAM.Click on
Grant Access.Add the same copied Service Account email as a Participant.
Assign the
ViewerRole and clickSave.
Repeat this process for each additional project.
GCP and GKE Connector Integration Guide
OX Security supports integrations with both GCP (Google Cloud Platform) and GKE (Google Kubernetes Engine) to enhance visibility into your cloud and Kubernetes environments.
The GCP Connector is primarily used to run Prowler for cloud misconfiguration scanning at the project level.
The GKE Connector is used to ingest Kubernetes workload data into OX's Cloud Graph, helping visualize how code travels through the CI/CD pipeline into production and identify attack paths.
These connectors are independent—unlike Azure or AWS integrations, there's no dependency between the GCP and GKE connectors. Both require the same setup: a GCP project ID and an API token (service account credentials).
Prerequisites
A GCP project with IAM permissions to:
Create service accounts
Manage service account keys
Optional:
gcloudCLI installed and configured(For GKE only) A running GKE cluster in the selected GCP project, with Kubernetes API enabled
Step-by-Step Instructions
1. Create a Service Account
Log in to the Google Cloud Console
Select your GCP project.
Navigate to
IAM & Admin → Service Accounts.Click Create Service Account.
Enter a descriptive name (e.g.,
ox-gcp-connector-sa) and an optional description.Click Create and Continue.
2. Assign Roles
Grant the following roles to the new service account:
ViewerService Account Key AdminService Account Creator(if your user account lacks permission)
Click Done to complete the process.
3. Generate Service Account Key
In the Service Accounts list, find your newly created account.
Click the three-dot menu → Manage Keys.
Click Add Key → Create New Key.
Choose JSON format and click Create.
Download and securely store the JSON key file.
4. Collect Required Values
From the downloaded JSON key file:
Copy the value of
project_idEncode the entire JSON file contents as a Base64 string
These two values are required in OX:
project_idencoded_credentials(Base64-encoded JSON)
5. Connect in OX Security
In OX, go to the Connectors page.
Select GCP or GKE, depending on your target.
Enter:
project_idBase64-encoded JSON credentials
Click Connect
You should receive a success confirmation. If not, double-check the steps or contact OX support.
Optional: Add Access to Multiple GCP Projects
To use the same service account across multiple GCP projects:
Open the IAM & Admin → IAM section in each additional project.
Click Grant Access.
Add the same service account email.
Assign the Viewer role.
Click Save.
Repeat this process for each project you want to include.
Connector Use Cases
GCP
Cloud configuration scanning using Prowler
Standalone
GKE
Workload visibility and deployment mapping in Cloud Graph
Standalone
Both connectors provide data that enriches OX Security’s attack path analysis, helping link code commits to live workloads and identify misconfigurations or public exposures across environments.
Last updated
