Skip to content

Commit ae0b043

Browse files
authored
GCP account/project terminology update (#3223)
Fixes #837 by updating outdated terminology around GCP projects vs accounts in the CSPM for GCP deployment guide.
1 parent 160454d commit ae0b043

File tree

1 file changed

+11
-11
lines changed

1 file changed

+11
-11
lines changed

solutions/security/cloud/get-started-with-cspm-for-gcp.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -28,21 +28,21 @@ This page explains how to get started monitoring the security posture of your GC
2828

2929
## Set up CSPM for GCP [cspm-setup-gcp]
3030

31-
You can set up CSPM for GCP either by enrolling a single project, or by enrolling an organization containing multiple projects. Either way, you need to first add the CSPM integration, then enable cloud account access.
31+
You can set up CSPM for GCP either by enrolling a single project, or by enrolling an organization containing multiple projects. Either way, you need to first add the CSPM integration, then enable cloud access.
3232

3333
Two deployment technologies are available: agentless and agent-based.
3434

3535
* [Agentless deployment](/solutions/security/cloud/asset-disc-azure.md#cad-azure-agentless) allows you to collect cloud posture data without having to manage the deployment of an agent in your cloud.
36-
* [Agent-based deployment](/solutions/security/cloud/asset-disc-azure.md#cad-azure-agent-based) requires you to deploy and manage an agent in the cloud account you want to monitor.
36+
* [Agent-based deployment](/solutions/security/cloud/asset-disc-azure.md#cad-azure-agent-based) requires you to deploy and manage an agent in the cloud project or projects you want to monitor.
3737

3838

3939
## Agentless deployment [cspm-gcp-agentless]
4040

4141
1. Find **Integrations** in the navigation menu or use the [global search field](/explore-analyze/find-and-organize/find-apps-and-objects.md).
4242
2. Search for `CSPM`, then click on the result.
4343
3. Click **Add Cloud Security Posture Management (CSPM)**.
44-
4. Under **Configure integration**, select **GCP**, then either **GCP Organization** to onboard your whole organization, or **Single Project** to onboard an individual account.
45-
5. Give your integration a name and description that match the purpose or team of the GCP subscription/organization you want to monitor, for example, `dev-gcp-account`.
44+
4. Under **Configure integration**, select **GCP**, then either **GCP Organization** to onboard your whole organization, or **Single Project** to onboard an individual project.
45+
5. Give your integration a name and description that match the purpose or team of the GCP subscription/organization you want to monitor, for example, `dev-gcp-project`.
4646
6. (Optional) Expand **Advanced options** and add a `Namespace` to the integration's data stream.
4747

4848
:::{include} _snippets/cspm-namespace.md
@@ -60,8 +60,8 @@ Two deployment technologies are available: agentless and agent-based.
6060
1. Find **Integrations** in the navigation menu or use the [global search field](/explore-analyze/find-and-organize/find-apps-and-objects.md).
6161
2. Search for `CSPM`, then click on the result.
6262
3. Click **Add Cloud Security Posture Management (CSPM)**.
63-
4. For **Configure integration**, select **GCP**, then either **GCP Organization** to onboard your whole organization, or **Single Project** to onboard an individual account.
64-
5. Give your integration a name and description that match the purpose or team of the GCP account you want to monitor, for example, `dev-gcp-project`.
63+
4. For **Configure integration**, select **GCP**, then either **GCP Organization** to onboard your whole organization, or **Single Project** to onboard an individual project.
64+
5. Give your integration a name and description that match the purpose or team of the GCP project you want to monitor, for example, `dev-gcp-project`.
6565
6. (Optional) Expand the **Advanced options** menu and add a `Namespace` to the integration's data stream.
6666

6767
::::{include} _snippets/cspm-namespace.md
@@ -76,7 +76,7 @@ To set up CSPM for a GCP project, you need admin privileges for the project.
7676
::::
7777

7878

79-
For most users, the simplest option is to use a Google Cloud Shell script to automatically provision the necessary resources and permissions in your GCP account. This method, as well as two manual options, are described next on this page.
79+
For most users, the simplest option is to use a Google Cloud Shell script to automatically provision the necessary GCP resources and permissions. This method, as well as two manual options, are described next on this page.
8080

8181

8282
## Cloud Shell script setup (recommended) [cspm-set-up-cloudshell]
@@ -85,8 +85,8 @@ For most users, the simplest option is to use a Google Cloud Shell script to aut
8585
2. In **Where to add this integration**:
8686

8787
1. Select **New Hosts**.
88-
2. Name the {{agent}} policy. Use a name that matches the purpose or team of the cloud account or accounts you want to monitor. For example, `dev-gcp-account`.
89-
3. Click **Save and continue**, then **Add {{agent}} to your hosts**. The **Add agent** wizard appears and provides {{agent}} binaries, which you can download and deploy to a VM in your GCP account.
88+
2. Name the {{agent}} policy. Use a name that matches the purpose or team of the cloud project or projects you want to monitor. For example, `dev-gcp-project`.
89+
3. Click **Save and continue**, then **Add {{agent}} to your hosts**. The **Add agent** wizard appears and provides {{agent}} binaries, which you can download and deploy to a VM in GCP.
9090

9191
3. Click **Save and continue**.
9292
4. Copy the command that appears, then click **Launch Google Cloud Shell**. It opens in a new window.
@@ -160,7 +160,7 @@ Provide credentials to the CSPM integration:
160160
2. Enter your GCP **Organization ID**. Enter the GCP **Project ID** of the project where you want to provision the compute instance that will run CSPM.
161161
3. Select **Credentials JSON**, and enter the value you generated earlier.
162162
4. For **Where to add this integration**, select **New Hosts**.
163-
5. Name the {{agent}} policy. Use a name that matches the purpose or team of the cloud account or accounts you want to monitor. For example, `dev-gcp-account`.
163+
5. Name the {{agent}} policy. Use a name that matches the purpose or team of the cloud project or projects you want to monitor. For example, `dev-gcp-project`.
164164
6. Click **Save and continue**, then follow the instructions to install {{agent}} in your chosen GCP project.
165165

166166
Wait for the confirmation that {{kib}} received data from your new integration. Then you can click **View Assets** to see your data.
@@ -217,7 +217,7 @@ Provide credentials to the CSPM integration:
217217
2. Enter your GCP **Project ID**.
218218
3. Select **Credentials JSON**, and enter the value you generated earlier.
219219
4. For **Where to add this integration**, select **New Hosts**.
220-
5. Name the {{agent}} policy. Use a name that matches the purpose or team of the cloud account or accounts you want to monitor. For example, `dev-gcp-account`.
220+
5. Name the {{agent}} policy. Use a name that matches the purpose or team of the cloud project or projects you want to monitor. For example, `dev-gcp-project`.
221221
6. Click **Save and continue**, then follow the instructions to install {{agent}} in your chosen GCP project.
222222

223223
Wait for the confirmation that {{kib}} received data from your new integration. Then you can click **View Assets** to see your data.

0 commit comments

Comments
 (0)