Table of Contents
Google Cloud Security Operations Suite
Google Cloud’s unified Security Operations platform, built on Chronicle SecOps, aims to modernize threat detection, investigation, and response (TDIR) by combining SIEM
and SOAR
capabilities into a single, streamlined console.
It enables organizations to ingest
and analyze
data at Google scale for faster detection, investigation, and response, with alerts automatically grouped into cases
enriched by context for quicker decisions.
The platform integrates over 300 tools
, offers visual playbook
automation, and leverages applied threat intelligence from VirusTotal
, Mandiant
, and Google Cloud research
.
Mandiant
is a cybersecurity company focused on incident response, threat intelligence, and defense, acquired by Google Cloud in 2022 but still operating under its name. Google uses Mandiant’s CTI
within its SecOps
to enhance detection and response
.
Deep Dive into the Security Operations Platform
The platform’s left-side navigation provides access to all core sections, the Cases page
where workflows begin, Investigation
for running searches, and Detections page
to manage and correlate alerts into cases.
The Response section
ties alerts to playbooks, integrations, jobs, and actions configurable via the integrated development environment (IDE). Dashboards
enable customizable and automated reporting, while Incident Manager
serves as a collaborative digital war room for handling incidents.
SIEM Search
Used for deep log analysis and threat hunting with queries or YARA-L
rules, SOAR Search
Used to pull contextual evidence during automated incident response workflows.
SIEM Dashboard
Displays trends and detection from security telemetry for monitoring and hunting, SOAR Dashboard
Displays incident statuses, playbook executions, and response efficiency metrics.
Playbooks
Automated workflows for investigating
and remediating alerts
, e.g., a Malware Detection
playbook analyzes a suspicious file, enriches it, and assigns SOC tasks.
Case Grouping
: Multiple similar alerts
are combined into one case
to reduce workload, e.g., three failed logins from the same user are investigated together.
The Marketplace offers
over 300 integrations, use cases, and productivity add-ons, and Settings
allows admins to configure the entire platform.
Investigative Process Through Case Analysis
Chronicle’s investigation workspace centers on the Cases page
, where analysts manage and explore alerts. Cases can originate from SIEM or EDR detections
, manual creation
, or testing simulations, and multiple similar alerts can be grouped to reduce workload. Analysts can filter cases by criteria like criticality
, assignee
, time frame
, or status to streamline focus.
Each case provides a Case Overview
summarizing all associated alerts and relevant data, with AI-powered features like the Duet AI
Investigation widget offering automated summaries
, threat classification
, and recommendations
to guide handling. The interface is customizable by administrators to optimize workflow and display relevant information for each role.
Analysts can add notes
, update executive summaries
, and rely on the case wall
for a chronological record of all actions
, including automated playbooks
.
Entities like IPs
, hostnames
, usernames
, file hashes
, and domains
are automatically extracted and normalized through Marketplace integrations, enabling quick enrichment and correlation with threat intelligence from sources like Virus-total and Mandiant, reducing manual configuration and accelerating investigation and response.
Log parsing in SIEM
converts these raw logs into a standardized format, making the data easier to analyze. During the normalization phase
, data from different log sources is aligned and categorized into uniform fields.
Chronicle allows analysts to visualize and manage entities through an Entities Graph
, showing relationships between hosts
, users
, IPs
, URLs
, processes
, and alerts
. Investigators can see chronological timelines of events
, including network connections and process activity, with details like process names
, IDs
, and hashes
, which can be enriched with threat intelligence.
Cases consolidate one
or more
alerts, combine automatically or manually extracted entity data, and support containment actions via integrated tools like EDRs.
Navigating Investigations with Visual Context
Investigation process in case management
by focusing on working with alerts, views, and actions. It begins with a pending action titled investigate further
, which allows the analyst to choose whether to escalate or gather more data
.
By selecting to investigate
, a built-in playbook action
queries the SIEM environment
for additional host activity. The results are logged in the case wall
, showing both execution details and comments. Analysts can then view enriched data through new widgets, such as a UDM query
, which searches massive datasets to find related suspicious activity.
The UDM
is a Google Security Operations
standard data structure that stores information about data received from sources. It is also called the schema
.
The platform provides multiple tabs for deeper technical insights. The events
tab allows analysts to view raw data and mapped fields
, while the playbooks tab
shows the sequence of actions and decisions executed during the investigation.
Host event trends
and SIEM searches are integrated into widgets to streamline investigations and avoid repetitive queries. Integrations with threat intelligence platforms like Mandiant TI
and VirusTotal further enrich the case
, tagging malware with threat actors and providing details such as file patterns, domains, and attack characteristics.
Leveraging Events, Playbooks, and Manual Actions
These events originate from systems like EDR
, IDS
, or email mailboxes
and are enriched automatically by Chronicle
. For example, a Microsoft Excel launch event is shown with both raw
and normalized logs
, where Chronicle enriches fields such as hostnames
, IPs
, and geolocation
. By stitching together disparate logs, the system creates a coherent detection story
, adding metadata such as rule names and MITRE techniques to enhance analysis.
Introduction to Security Detection's
Detections tab
where analysts manage rule definitions, alerts, IOCs, and reference lists. Within a case
, detection's can also be reviewed directly from the alert menu by selecting view detection rule.
By selecting events
, analysts can open the raw log view
, typically in JSON
format, which Chronicle automatically parses into normalized UDM fields
. These fields are categorized as u:unenriched (from the original log)
or e:enriched (contextual data added by Chronicle)
.
For example, user identity details can be enriched by correlating logs with other data sources. This enrichment capability makes it easier to stitch together context and detect malicious patterns across varied inputs. While raw logs can be complex
, normalization ensures
consistency and usability across different security data sources.
Detection rule editor
, where rules can be enabled
, duplicated
, versioned
, or archived
. Rules can also be run in retro hunt mode
, applying logic to historical log data
.
YARA-L
in Google Chronicle is a detection rule language that extends YARA
concepts to security telemetry. Unlike traditional YARA (used mainly for matching files/memory), YARA-L
is designed for SIEM-scale
log hunting and detection.
In normal YARA
, hunting is IOC-driven
you define variables like $a
, $b
with strings/regex, then apply conditions ($a or $b
). It’s aimed at files or memory content, In YARA-L
, the logic structure is similar (rule, meta, condition)
but instead of string variables, you directly reference normalized fields
(process.command_line
, metadata.event_type
) with values.
This makes YARA-L
event-focused you’re not matching raw bytes, you’re matching parsed log attributes, Both share the same spirit of pattern + condition = detection
Response Management and Playbook Creation Essentials
The Response section
in Chronicle SOAR
, which houses integrations and playbooks
. Integrations
connect external tools like Mandiant Threat Intelligence or Jira
, enabling actions such as pulling alerts, creating tickets, or enriching data.
Integrations can be configured per environment
, which is useful for multinational organizations or managed service providers managing multiple clients.
The marketplace
allows easy discovery, installation for environment, and documentation of integrations with prebuilt actions and widgets for analysts.
Analysts can ingest alerts as test cases to safely experiment with playbooks
. This ensures that the alert data, entities, and events are correctly extracted and available for automation before deploying playbooks in a live environment. Simulations help validate actions and AI recommendations without risking operational impact.
When a new playbook is created, it is placed in the selected folder and environment
, with a trigger
defined to determine which alerts will activate it, Actions
are then added from integrations for example, retrieving IOC details from Mandiant TI using file hash entities. Variables
, such as alert or entity identifiers, are piped into actions
to ensure correct enrichment and automation. Each widget action can be tested in the simulator to validate logic and results.
Incident Response Management, Dashboard Creation, and Support Access
Dashboards
can hold up to 12 widgets
, showing metrics such as alert types, analyst workloads, alert reduction, and case handling times. Widgets can be exported
, shared
, or scheduled
as reports
.
Reports
can be automatically generated in formats like PDF or Word for management, enabling SOC teams to track operational metrics and performance efficiently.
Users are encouraged to explore the Chronicle documentation
, join the Google Cloud Security Community for collaboration
, and follow the New to Chronicle
blog series for practical guidance
.