Enterprise Software Supply Chain Manager (ESSCM)IntegrationsContainer Images
GCP Cloud Source
Connect Google Cloud container sources to generate SBOMs
GCP Cloud Source Integration
Connect your Google Cloud Container Registry (GCR) or Artifact Registry to Safeguard for container image SBOM generation and vulnerability scanning.
Prerequisites
- A Google Cloud account with container images
- Service Account with appropriate permissions
Public Images
Google Cloud public images can be scanned without authentication.
Step 1: Navigate to Integrations
Go to Integrations from the sidebar and click Connect on the GCP Cloud Source card.
Step 2: Enter Image Reference
- Select the Public tab
- Enter a Name for this configuration
- Optionally add a Description
- Enter the GCR/Artifact Registry image URI:
- GCR:
gcr.io/project-id/image:tag - Artifact Registry:
us-docker.pkg.dev/project-id/repo/image:tag
- GCR:
- Click Add
Step 3: Review & Connect
- Configure Project Name and Version
- Click Connect to complete
Private Images
Step 1: Navigate to Integrations
Go to Integrations from the sidebar and click Connect on the GCP Cloud Source card.
Step 2: Enter Service Account Credentials
- Select the Private tab
- Enter a Name for this configuration
- Optionally add a Description
- Upload or paste your Service Account JSON Key
- Click Verify Credentials
Step 3: Select Images
- Once verified, select the GCP project
- Browse available repositories and images
- Select the images you want to scan
Step 4: Configure & Connect
- Set Project Name and Version for each image
- Click Connect to complete
Creating a Service Account
Step 1: Create Service Account
- Go to Google Cloud Console then IAM & Admin then Service Accounts
- Click Create Service Account
- Enter a name (e.g., "safeguard-gcr-reader")
- Click Create and Continue
Step 2: Assign Roles
Add the following roles:
- Artifact Registry Reader (for Artifact Registry)
- Storage Object Viewer (for Container Registry)
Step 3: Create Key
- Click on the service account
- Go to Keys tab
- Click Add Key then Create new key
- Select JSON format
- Click Create
- Save the downloaded JSON file securely
Required IAM Roles
For Container Registry (GCR)
| Role | Description |
|---|---|
roles/storage.objectViewer | Read access to container images |
For Artifact Registry
| Role | Description |
|---|---|
roles/artifactregistry.reader | Read access to artifacts |
Image Reference Formats
| Registry | Format |
|---|---|
| Container Registry | gcr.io/PROJECT_ID/IMAGE:TAG |
| Container Registry (regional) | us.gcr.io/PROJECT_ID/IMAGE:TAG |
| Artifact Registry | REGION-docker.pkg.dev/PROJECT_ID/REPO/IMAGE:TAG |
Troubleshooting
"Credentials verification failed"
- Verify the JSON key is valid and complete
- Check that the service account exists and is active
- Ensure the key hasn't been deleted or revoked
"Permission denied"
- Verify the service account has the required roles
- Check that the roles are assigned at the correct level (project/repository)
- Ensure the project ID is correct
"Image not found"
- Verify the image URI format is correct
- Check that the image exists in the specified registry
- Ensure the tag or digest is valid