Chronicle is Google's cloud-native security operations platform, leveraging Google infrastructure for massive-scale log analysis.
Key capabilities
- Log ingestion: Petabyte-scale data storage and search.
- Detection: Rules engine with YARA-L detection language.
- Investigation: Unified timeline view of entities and events.
- Threat intelligence: Integrated Google and VirusTotal intelligence.
- SOAR: Automated response workflows.
Chronicle components
- Chronicle SIEM: Log management and detection.
- Chronicle SOAR: Security orchestration and automation.
- Threat Intelligence: Curated threat feeds.
Data sources
- Google Cloud audit and flow logs.
- Workspace (Gmail, Drive) security logs.
- Third-party security products.
- Custom log sources via ingestion API.
Integration with GCP
- Security Command Center findings.
- Cloud Audit Logs ingestion.
- VPC Flow Logs analysis.
- Google Workspace security events.
Unique advantages
- Fixed pricing regardless of data volume.
- 12-month hot data retention standard.
- Google-scale search performance.
- Pre-built detection rules and parsers.
Use cases
- Threat hunting across massive datasets.
- Incident investigation and response.
- Compliance log retention.
- Security operations center (SOC) modernization.
Explore More Security Operations
View all termsEndpoint Detection and Response (EDR)
Security software that monitors endpoints for malicious activity, enabling rapid detection and containment.
Read more →Managed Detection and Response (MDR)
A security service that combines technology and human expertise to detect, investigate, and respond to threats 24/7.
Read more →Microsoft Sentinel
Microsoft cloud-native SIEM and SOAR solution that provides intelligent security analytics and threat detection across the enterprise.
Read more →SBOM (Software Bill of Materials)
A comprehensive inventory of all components, libraries, and dependencies that make up a software application, enabling transparency in the software supply chain.
Read more →Secrets Management
The practice and tooling for securely storing, accessing, rotating, and auditing sensitive credentials like API keys, passwords, certificates, and encryption keys.
Read more →Security Information and Event Management (SIEM)
A platform that ingests security telemetry, correlates events, and surfaces alerts for investigation.
Read more →