GCP Connection - User Interface Components

Prev Next

1.0 Introduction

This article describes the user interface (UI) features for the Google Cloud Platform (GCP) cloud connection in Fortanix Key Insight.

2.0 Terminology References

For GCP concepts and supported features, refer to GCP Connection Concepts.

3.0 GCP Connection - Overview

Users can access the GCP connection Overview page after adding a GCP cloud connection. The Overview page displays the scanned GCP keys and services based on the applied Fortanix Key Insight policy.

For more information on the Fortanix Key Insight policy, refer to Cryptographic Policy Management.

NOTE

  • If your Fortanix Armor account is deactivated and you are accessing the Fortanix Key Insight GCP connection, you will not be able to view data under the Overview, Assessments, Keys, Services, or PQC Central pages. You will only have access to view and delete items within the Connections, Policy Center, and Authentication pages.

  • If the count of GCP projects before the scan does not match the number displayed on the Overview page:

    • Verify that all required roles and permissions are correctly configured in the GCP projects before running the scan.

    • After confirming permissions, initiate a re-scan using the RESCAN option on the Overview page. For more information, refer to Section 5.0: Rescan a GCP Connection.

A screenshot of a computer  AI-generated content may be incorrect.

Figure 1: Access GCP Overview

  • Click ASSESSMENT REPORT to navigate to the Assessment page and view the assessment report. This report allows you to assess your key security posture to ensure the safety of your data. For more information, refer to Section 4.0: GCP Connection - Assessments.

The Overview page helps users get a summary of the GCP keys and services, as described in the following sections:

3.1 Discovered GCP Assets

This section summarizes the discovered asset counts for a GCP connection.

It shows the count of:

  • The GCP organizations

  • The folders under all the organizations

  • The projects under all the folders

  • The GCP regions

  • The keys in all the GCP cloud regions

  • The services in all the GCP cloud regions

NOTE

The total number of keys displayed reflects only the count of the current key version for each key in the GCP Cloud Key Management Service (KMS).

Clicking the Keys and Services labels takes you to their list view.

3.2 Keys by Status

This section provides a summary of GCP keys categorized by their status:

  • Keys enabled: The number of GCP keys that are currently enabled and may be used by multiple GCP services.

  • Keys not enabled: The number of GCP keys that are currently inactive.

  • Rotation disabled: The number of GCP keys for which key rotation is turned off.

Click the Keys by Status label to navigate to the corresponding list view for each key category.

3.3 Keys by Type

This section displays a count of key specifications across all GCP projects included in the scan. It shows the total number of keys found in all GCP Cloud KMS locations based on the applied Fortanix Key Insight policy.

Click any key type to navigate to its corresponding list view.

3.4 Top Projects by Key and Status

This section lists, in descending order, the top five GCP projects with the highest number of keys since the most recent key scan. The count for each project includes both enabled and disabled keys.

Blue indicators represent enabled keys, while Orange indicators represent disabled keys.

Click a project name to open the list view showing all keys in that project.

3.5 Key Source

This section provides a summary of GCP keys grouped by their source.

The key counts are categorized as follows:

  • Google Cloud Software Protected Key: Keys and crypto-metadata discovered from Cloud KMS software-based encryption services.

  • Google Cloud HSM Protected Key: Keys backed by Google Cloud HSM or Cloud KMS HSM integrations. These keys provide stronger key isolation and hardware-based safeguards.

Click any key source category to navigate to the corresponding list view.

3.6 Protected Services

This section presents a comparison of GCP services based on their encryption configuration, showing the number of services using:

  • Google-managed keys (purple)

  • Customer-managed keys (CMK) (blue)

  • Unencrypted services (teal blue)

Clicking any service takes you to its respective list view.

4.0 GCP Connection - Assessments

Users can access the Fortanix Key Insight Assessment page after adding a GCP cloud connection.

The Assessment page shows:

  • Key security posture details for Google Cloud projects and organizations.

  • Policy violations and misconfigurations that should be remediated to improve the security posture.

  • Recommended remediation actions to strengthen the overall security status across Google Cloud resources.

A screenshot of a computer  AI-generated content may be incorrect.

Figure 2: GCP assessment report

4.1 Risk Score

This section provides the overall risk score of the GCP keys and services.

The following are the different risk score categories and their associated risks:

  • Critical – A critical risk score indicates the total number of unencrypted GCP services that need attention.

  • High – A high score signifies the total number of shared keys, keys with rotation disabled, keys without expiry, and non-compliant keys in use.

  • Medium – A medium risk score indicates the total number of CSP-generated services that are encrypted with GCP-generated keys.

  • Good – A good risk score signifies that no risks have been identified, or only minimal risks are present

The overall risk score is prioritized based on the number of risks, in order of severity from highest to lowest:

  • Critical

  • High

  • Medium

  • Good

Click each risk label or count to access its corresponding list view.

4.2 Service Violations

This section provides insights into service violations across your GCP cloud environment.

You can view the total number of GCP services, along with the specific violations identified for each service. These violations may result from issues such as the use of shared, deleted, or soon-to-be-deleted keys, excessive permissions, non-compliant configurations, or unencrypted keys

This information helps you identify which services are at risk, enabling you to implement unique, compliant, and encrypted keys to strengthen your security posture.

Additionally:

  • Risk levels for each service are color-coded for easier identification and prioritization.

  • Select VIEW ALL to navigate to the Services page and explore all key-related violations for each service.

  • Click any service to view a detailed list of the top 10 key violations, sorted by severity. Select any violation type to navigate to its corresponding full list.

  • Click BACK to return to the service violations card view.

4.3 Top Security Issues

This section provides the following information about the keys:

  • Shared keys: Displays the total number of Cloud KMS or Cloud HSM keys that are shared by two or more GCP services. Shared keys increase security risk, and this information helps you identify which keys should be replaced with unique, service-specific encryption keys.

  • Expired keys: Displays the number of Cloud KMS keys that have passed their expiration date. This information helps you review expired keys and delete them as needed.

  • Unused keys: Displays the total number of GCP keys that remain unused for encryption in the scanned data and supported services. You can use this information to identify and remove unused keys for enhanced security.

    NOTE

    Fortanix Key Insight recommends removing any unused keys from your GCP cloud as a best practice.

  • Services using Platform Managed Keys: These represent GCP services that automatically encrypt customer data using Google-managed encryption keys, which are fully controlled by Google and are not accessible for customer-based configuration or lifecycle management.

    Fortanix Key Insight detects these services and associates them with their respective platform-managed keys, providing insight into GCP’s default encryption behavior.

  • PQC readiness: Indicates the percentage of your GCP cryptographic assets that are currently post-quantum-safe, showing your environment’s preparedness for post-quantum cryptography (PQC). The percentage reflects the portion of assets using PQC-compliant algorithms or configurations.  

  • Non-compliant keys: Displays the total number of GCP keys that do not meet the cryptographic policies set in your Fortanix Key Insight account. These keys should be replaced with new ones that align with your configured policies and the security requirements defined by the National Institute of Standards and Technology (NIST).

    Fortanix Key Insight classifies a key as non-compliant if it uses any algorithm or key-size combination that is not permitted under NIST 800-57 guidelines, including (but not limited to) the following:

    • AES: Any key size less than 128 bits.

    • 3DES: Keys with sizes 112 bits and 168 bits.

    • DES: Keys with size 56 bits.

    • RSA: Keys with a size less than 2048 bits.

    • DSA: Keys with a size less than 2048 bits.

    • ECC: Keys with a size less than 224 bits.

    • HMAC: Keys with a size less than 112 bits.

    The non-compliant keys increase the data security risk. They will be flagged as vulnerabilities on the Keys page.

    Fortanix Key Insight recommends using stronger key algorithms and ensuring that the key strength aligns with your defined policies and NIST standards.

Click each top security issue to access its corresponding list view.

4.4 Key Count By Sources

This section provides information about the security and risk posture of keys discovered across native Google Cloud encryption services (for example, Cloud KMS and Cloud HSM) as well as any externally managed or integrated key sources.

The visual indicators (circles) represent the total number of keys found in the GCP project or organization.

4.4.1 Cloud Generated

This section displays the details of all natively generated keys in GCP.

  • Google Cloud Software Protected Key: These refer to keys and crypto-metadata discovered from Cloud KMS software-based encryption services.
    Since software-protected keys depend on Google-managed, software-based cryptographic modules, they may introduce a higher risk of exposure compared to hardware-backed keys.

    Click the circle or the warning icon to go to the list view of the software-protected keys.

  • Google Cloud HSM Protected Key: These are keys backed by Google Cloud HSM or Cloud KMS HSM integrations. These keys provide stronger key isolation and hardware-based safeguards.

    Click the circle or the warning icon to go to the list view of the HSM-protected keys.

4.4.2 External

This section displays information about externally managed keys.

  • External: These keys refer to cryptographic keys managed outside Google Cloud. These keys never reside within Google Cloud infrastructure, offering enhanced control and enabling compliance with stringent data-sovereignty requirements.

  • Unspecified: These are keys for which Cloud metadata does not clearly identify the originating key source. This can occur due to incomplete API responses or older configurations that no longer map to an active key management system. Administrators should verify and resolve these entities to ensure visibility and enforce governance.

Click the circle or the warning icon to go to the list view of the external keys.

4.5 Download Assessment Report

Click DOWNLOAD REPORT on the top-right corner of the Assessment page to view the Data Security Assessment Report for the GCP connection in PDF format.

The report will open in the Print dialog box, where you can choose to print it or save it locally to your machine as needed.

5.0 Rescan a GCP Connection

Click RESCAN on the top right corner of the Overview page to perform a rescan and verify if any keys have been added, deleted, or updated in your GCP environment.

If you click RESCAN to start the scan, you can monitor the progress bar as it runs. After the scan completes successfully:

  • The Last scanned label will update with the completion date and time.

  • The Overview page will reflect the updated status of the GCP keys and services.

NOTE

  • The RESCAN option is accessible only to users with the Account Administrator and Group Administrator roles.

  • You can also click RESCAN on the top right corner of the Assessment page to perform the rescan. After the scan is completed, the Assessment page will reflect the updated status of the GCP keys and services.

6.0 GCP Connection - Keys

After onboarding the GCP connection, click Keys in the Fortanix Key Insight left navigation panel to view the scanned key details. Selecting Keys will open the Keys page, which displays the details of all scanned GCP keys.

6.1 Keys List View

The keys list view displays all keys in a table, along with details such as key ID, region, state, violations, project ID, owners, usage description, key source, specification, creation date, expiration date, rotation date, and so on.

A screenshot of a computer  AI-generated content may be incorrect.

Figure 3: GCP keys list view

  • Use the Search field to filter keys based on the available criteria and supported values.

    For example:

    • Key ID

    • Key Name

    • Key Rotation: Enabled, Disabled

  • Click in the top-right corner of the table to customize which columns are displayed, beyond the default six.

  • Click EXPORT to export the scanned keys data. For more information, refer to Section 8.0: GCP Connection - Scanned Data Export.

  • Click  in the VIOLATIONS column to view detailed information about the associated vulnerabilities.

6.1.1 Add Key Details

You can assign owners to the scanned keys to enhance key management, simplify tracking, and improve remediation workflows.

Perform the following steps to add the key(s) details:

  1. Select the checkbox () next to the required key(s) in the list.

  2. Click ADD DETAILS in the top right corner of the table.

  3. In the Add Details dialog box, enter the following details:

    • Primary owner: Enter the primary owner’s name or employee ID.

    • Email ID: Enter the primary owner’s valid email ID.

    • Click ADD SECONDARY OWNER to add the secondary owner’s details, if required.

    • Description (Optional): Enter an optional description.

    • Click ADD to add the ownership details to the selected key(s).

NOTE

To add ownership details, specifying a primary owner is mandatory before adding a secondary owner.

On the Keys page, the primary and secondary owners’ names or employee IDs and email addresses will appear in the OWNERS column, and the description will appear in the USAGE DESCRIPTION column.

NOTE

Only users with Account Administrator permissions can add or edit key details.

6.1.2 Edit Key Details

You can modify the details of the selected key(s).

Perform the following steps to edit the key(s) details:

  1. Select the checkbox () next to the required key(s) in the list.

  2. Click EDIT DETAILS in the top right corner.

  3. In the Edit Details dialog box, update the required values and click UPDATE to apply the changes.

6.1.3 View Key Details

Click any Key Identifier in the Keys list to view its properties, rotation history, associated violations, and service mappings.

  • The KEY DETAILS tab displays the key’s properties, ownership information (if provided), and automatic rotation policy details.

    If required, click EDIT DETAILS on the Ownership section to update the ownership details for the selected key.

    A screenshot of a computer  AI-generated content may be incorrect.

    Figure 4: Access key details view

  • The VIOLATIONS tab displays violation details associated with the key.

    A screenshot of a computer  AI-generated content may be incorrect.

    Figure 5: View key violations

7.0 GCP Connection - Services

After onboarding the GCP connection, click Services in the Fortanix Key Insight left navigation panel to view the scanned service details. Selecting Services will open the Services page, which displays the details of all scanned GCP services.

7.1 Services List View

The services list view displays all services in a table, along with details such as name, type, region, encryption, violations, and project ID.

Figure 6: GCP services list view

  • Use the Search field to filter services based on the available criteria and supported values.

    For example:

    • Region

    • Name

    • Key Rotation: Enabled, Disabled

  • Click EXPORT to export the scanned services data. For more information, refer to Section 8.0: GCP Connection - Scanned Data Export.

  • Click in the VIOLATIONS column to view detailed information about the associated vulnerabilities.

7.1.1 View Service Details

You can click any GCP service name in the Services list to view its configuration details and associated violations.

  • The SERVICE DETAILS tab displays the service configurations and key data.

    Figure 7: Access services details view

  • The VIOLATIONS tab displays the violations associated with the service.

    Figure 8: View service violations

8.0 GCP Connection - Scanned Data Export

This feature allows you to export the GCP scanned key and service-related data from Fortanix Key Insight in Comma-Separated Values (CSV) format. Also, it provides flexibility, enabling you to download data for detailed analysis, audits, or reporting, and to access real-time status.

A screenshot of a computer  AI-generated content may be incorrect.

Figure 9: Access Data Export feature

In the GCP Keys and Services list view, click EXPORT to export the scanned data using any of the available options:

  • Export current page: Use this option to export all column data from the current page in CSV format.

    NOTE

    You can download a maximum of 100 items at a time, based on the settings specified in the Items per page drop down.

  • Export all raw data: Use this option to export all scanned data shown in the keys and services tables in CSV format. If you select this option, you can read the details on the Export All Raw Data dialog box and click PROCEED to export all the data.

    After the export process begins, you can track its progress. The export status will be logged with a message under the Activities tab in Fortanix Key Insight. For more information, refer to Section 8.1: View Export Activities.

  • Export selected rows: This option is disabled by default. You can select the checkbox () next to the required rows on the current page and export them in CSV format using this option.

NOTE

  • Users with the Account Administrator and Group Administrator roles can only perform the scanned data export.

  • Within the same account, you can have multiple exports running simultaneously from different cloud, on-premises, and external key source connections.

8.1 View Export Activities

After you initiate the export process using Export All Raw Data, you can track the export status in the Activities tab located on the Fortanix Key Insight left navigation panel.

You can view the following details for each export:

  • Name of the activity. For example, Export_all_gcp_keys.

  • Name of the file. For example, GCP Keys.csv.

  • Activity status: This indicates the current state of the data export. This can be,

    • Completed: The data export has been successful, and the CSV file will automatically download to the location specified on your local machine.

    • In Progress: The data export is in progress, and you can cancel it using if required.

    • Cancelled: The data export has been cancelled due to switching accounts or manually cancelling it while it was in progress.

    • Failed: The data export was not completed and failed due to errors.

  • Name of the connection.

  • Export creation date and time.

A screenshot of a computer  AI-generated content may be incorrect.

Figure 10: View export details

NOTE

  • If you switch to a different account during export, the export will be cancelled and logged in the Activities tab.

  • If you navigate to a different solution (for example, Identity and Access Management), the export will continue, but no logs will appear in the Activities tab. The export status will be confirmed using a toast message.

  • If you refresh the web page during the export, the confirmation dialog box will appear. If you refresh, the export will be cancelled, and all entries in the Activities tab will be removed. Therefore, it is recommended not to refresh the page during the export.