{"ai-ocr-ekyc-poc":{"OPEN_FIREWALL":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-06:45","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-06:44","instance_name":"ai-ocr-vpc-allow-http","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-06:45","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-06:44","instance_name":"default-allow-health-check","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-06:46","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-06:44","instance_name":"internet-ai-ocr-poc-win-6969","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-06:46","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-06:44","instance_name":"allow-http-https","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-06:46","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-06:44","instance_name":"twm-security-scan","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-06:45","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-06:44","instance_name":"default-allow-health-check-ipv6","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-06:45","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-06:44","instance_name":"default-allow-http","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"}],"OPEN_HTTP_PORT":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-06:46","description":"Block incoming connections on TCP port 80 from all IP addresses to help prevent undesired traffic and attacks on HTTP services.","event_time":"2026-03-20-06:44","instance_name":"ai-ocr-vpc-allow-http","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-06:46","description":"Block incoming connections on TCP port 80 from all IP addresses to help prevent undesired traffic and attacks on HTTP services.","event_time":"2026-03-20-06:44","instance_name":"allow-http-https","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-06:46","description":"Block incoming connections on TCP port 80 from all IP addresses to help prevent undesired traffic and attacks on HTTP services.","event_time":"2026-03-20-06:44","instance_name":"default-allow-http","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"}],"PUBLIC_IP_ADDRESS":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-06:45","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-06:44","instance_name":"ai-ocr-poc-win-vm1","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-06:45","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-06:44","instance_name":"ai-ocr-poc-lin-vm1","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-06:46","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-06:44","instance_name":"ai-ocr-om","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-06:45","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-06:44","instance_name":"ai-ocr-poc-lin-vm2-1","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-06:45","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-06:44","instance_name":"hwocrvmt01","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"}]},"ai2chatap":{"OPEN_RDP_PORT":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-11:39","description":"Block incoming connections on TCP port 3389 or UDP port 3389 from all IP addresses to help prevent undesired traffic and attacks on RDP server.","event_time":"2026-03-20-11:24","instance_name":"default-allow-rdp","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"}],"OPEN_SSH_PORT":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-11:35","description":"Block incoming connections on TCP port 22 or SCTP port 22 from all IP addresses to help prevent undesired traffic and attacks on SSH server.","event_time":"2026-03-20-11:24","instance_name":"default-allow-ssh","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"}]},"ai2chatap-t":{"OPEN_FIREWALL":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:25","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-03:24","instance_name":"ai2chat-vpc-allow-http","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:25","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-03:24","instance_name":"ai2chat-vpc-allow-health-check-ipv6","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:25","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-03:24","instance_name":"ai2chat-vpc-allow-health-check","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"}],"OPEN_HTTP_PORT":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:24","description":"Block incoming connections on TCP port 80 from all IP addresses to help prevent undesired traffic and attacks on HTTP services.","event_time":"2026-03-20-03:24","instance_name":"ai2chat-vpc-allow-http","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"}],"PUBLIC_BUCKET_ACL":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-14-20:09","description":"This bucket is public and can be accessed by anyone on the Internet. \"allUsers\" represents anyone on the Internet, and \"allAuthenticatedUsers\" represents anyone who is authenticated with a Google account; neither is constrained to users within your organization.","event_time":"2026-04-14-03:06","instance_name":"t-ai2chat-p","instance_type":"google.cloud.storage.Bucket","resource_url":"https://console.cloud.google.com/storage/browser/t-ai2chat-p;tab=permissions","scan_tool":"Security Command Center"}],"PUBLIC_IP_ADDRESS":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:25","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-03:24","instance_name":"mplus-podman-poc","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:25","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-03:24","instance_name":"mpp-test-20250805","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:25","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-03:24","instance_name":"ai-search-poc","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:25","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-03:24","instance_name":"tell-ban-g","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"}]},"aide-416502":{"CONTAINER_IMAGE_VULNERABILITY":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:55","description":"","event_time":"2026-04-15-09:14","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/check-kdata-file-job-csa@sha256:6fdd71d0bd58e204615132fb5777623baa5ea9ff6fb00bc5207b5f5c3552945c","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-06-17:34","description":"","event_time":"2026-04-15-09:28","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:2e37862fb959bdf4c5d1b76b55878620c21e19dddfc6ffa9f2039e72f59e6ef9","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:53","description":"","event_time":"2026-04-15-09:28","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-master-schedule-csa@sha256:7e75643b78443f92aefbb2ae06fd084c073206d8ebaf51b0827d06709e96738e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-09-03:50","description":"","event_time":"2026-04-15-09:28","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:53","description":"","event_time":"2026-04-15-09:30","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/check-kdata-file-job-csa@sha256:6fdd71d0bd58e204615132fb5777623baa5ea9ff6fb00bc5207b5f5c3552945c","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-29-01:40","description":"","event_time":"2026-04-15-09:10","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:f7c69c5b6ac3ce32ea95770d08e73679187001a3d96c85b04ee6285e343dee63","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:53","description":"","event_time":"2026-04-15-09:29","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/check-kdata-file-job-csa@sha256:6fdd71d0bd58e204615132fb5777623baa5ea9ff6fb00bc5207b5f5c3552945c","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:40","description":"","event_time":"2026-04-12-02:40","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-frontend@sha256:6e21c3ed85cc4b83a05a1fee34c45e7403bd8b9e9be299bf8f26a2d17b51fe8f","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:52","description":"","event_time":"2026-04-15-09:26","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-batch-schedul-csa@sha256:1d323f8aec21c74ee7ebc58376523f4f59992e9d3053a38a6fc2cf1737a861a6","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-03-16:48","description":"","event_time":"2026-04-15-09:25","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-master-schedule-csa@sha256:7e75643b78443f92aefbb2ae06fd084c073206d8ebaf51b0827d06709e96738e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-01:21","description":"","event_time":"2026-03-20-01:21","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend@sha256:fd3abce6e00310f35e9c6ad7c087e47764da472f9f30216c59bac52513078244","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:52","description":"","event_time":"2026-04-15-09:15","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-06-16:52","description":"","event_time":"2026-04-15-09:20","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:2e37862fb959bdf4c5d1b76b55878620c21e19dddfc6ffa9f2039e72f59e6ef9","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-06-17:08","description":"","event_time":"2026-04-15-09:25","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:34","description":"","event_time":"2026-04-12-02:34","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-frontend@sha256:6e21c3ed85cc4b83a05a1fee34c45e7403bd8b9e9be299bf8f26a2d17b51fe8f","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:54","description":"","event_time":"2026-04-15-09:28","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/check-kdata-file-job-csa@sha256:6fdd71d0bd58e204615132fb5777623baa5ea9ff6fb00bc5207b5f5c3552945c","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-02-28-16:13","description":"","event_time":"2026-04-15-09:24","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-17-01:30","description":"","event_time":"2026-03-17-01:30","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend@sha256:dbf4e3f02b2e525b1e33f0539ceeba3eb96bbf710659d654fa1bf8e0958c4268","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-15-01:44","description":"","event_time":"2026-04-15-09:30","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:54","description":"","event_time":"2026-04-15-09:15","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/check-kdata-file-job-csa@sha256:6fdd71d0bd58e204615132fb5777623baa5ea9ff6fb00bc5207b5f5c3552945c","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:50","description":"","event_time":"2026-04-15-09:19","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:43","description":"","event_time":"2026-04-12-02:43","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-frontend@sha256:6e21c3ed85cc4b83a05a1fee34c45e7403bd8b9e9be299bf8f26a2d17b51fe8f","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-13-15:07","description":"","event_time":"2026-04-15-09:32","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:f7c69c5b6ac3ce32ea95770d08e73679187001a3d96c85b04ee6285e343dee63","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:56","description":"","event_time":"2026-04-15-09:21","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/check-kdata-file-job-csa@sha256:6fdd71d0bd58e204615132fb5777623baa5ea9ff6fb00bc5207b5f5c3552945c","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:52","description":"","event_time":"2026-04-15-09:29","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-master-schedule-csa@sha256:7e75643b78443f92aefbb2ae06fd084c073206d8ebaf51b0827d06709e96738e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-02-25-16:46","description":"","event_time":"2026-04-15-09:27","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-09-05:06","description":"","event_time":"2026-04-15-09:29","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-27-02:17","description":"","event_time":"2026-03-27-02:17","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-frontend@sha256:6e21c3ed85cc4b83a05a1fee34c45e7403bd8b9e9be299bf8f26a2d17b51fe8f","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:30","description":"","event_time":"2026-04-15-02:30","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend@sha256:fd3abce6e00310f35e9c6ad7c087e47764da472f9f30216c59bac52513078244","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:56","description":"","event_time":"2026-04-15-09:23","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-01-31-16:21","description":"","event_time":"2026-04-15-09:15","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-master-schedule-csa@sha256:7e75643b78443f92aefbb2ae06fd084c073206d8ebaf51b0827d06709e96738e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-02-06-16:00","description":"","event_time":"2026-04-15-09:12","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-master-schedule-csa@sha256:7e75643b78443f92aefbb2ae06fd084c073206d8ebaf51b0827d06709e96738e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-04-02:44","description":"","event_time":"2026-04-15-09:14","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-batch-schedul-csa@sha256:1d323f8aec21c74ee7ebc58376523f4f59992e9d3053a38a6fc2cf1737a861a6","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:29","description":"","event_time":"2026-04-15-09:27","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:2e37862fb959bdf4c5d1b76b55878620c21e19dddfc6ffa9f2039e72f59e6ef9","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-19-01:42","description":"","event_time":"2026-04-15-09:18","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-batch-schedul-csa@sha256:1d323f8aec21c74ee7ebc58376523f4f59992e9d3053a38a6fc2cf1737a861a6","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-10-04:58","description":"","event_time":"2026-04-10-04:58","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend@sha256:fd3abce6e00310f35e9c6ad7c087e47764da472f9f30216c59bac52513078244","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:29","description":"","event_time":"2026-04-15-09:23","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:f7c69c5b6ac3ce32ea95770d08e73679187001a3d96c85b04ee6285e343dee63","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:07","description":"","event_time":"2026-04-15-09:16","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:f7c69c5b6ac3ce32ea95770d08e73679187001a3d96c85b04ee6285e343dee63","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-27-01:54","description":"","event_time":"2026-03-27-01:54","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-frontend@sha256:6e21c3ed85cc4b83a05a1fee34c45e7403bd8b9e9be299bf8f26a2d17b51fe8f","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:51","description":"","event_time":"2026-03-01-15:51","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend@sha256:fd3abce6e00310f35e9c6ad7c087e47764da472f9f30216c59bac52513078244","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:51","description":"","event_time":"2026-04-15-09:16","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:f7c69c5b6ac3ce32ea95770d08e73679187001a3d96c85b04ee6285e343dee63","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-02-18-16:09","description":"","event_time":"2026-04-15-09:18","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-09-03:04","description":"","event_time":"2026-04-15-09:21","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/check-kdata-file-job-csa@sha256:6fdd71d0bd58e204615132fb5777623baa5ea9ff6fb00bc5207b5f5c3552945c","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-06-16:41","description":"","event_time":"2026-03-06-16:41","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend-llm@sha256:9c5a3e76e4653801562d5393570ed38400aa883af435273e634c46cdaf53282b","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-10-04:40","description":"","event_time":"2026-04-15-09:23","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/check-kdata-file-job-csa@sha256:6fdd71d0bd58e204615132fb5777623baa5ea9ff6fb00bc5207b5f5c3552945c","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-10-04:06","description":"","event_time":"2026-04-15-09:26","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-master-schedule-csa@sha256:7e75643b78443f92aefbb2ae06fd084c073206d8ebaf51b0827d06709e96738e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-02-13-16:39","description":"","event_time":"2026-04-15-09:15","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:50","description":"","event_time":"2026-04-15-09:14","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/check-kdata-file-job-csa@sha256:6fdd71d0bd58e204615132fb5777623baa5ea9ff6fb00bc5207b5f5c3552945c","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-10-04:17","description":"","event_time":"2026-04-15-09:23","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-master-schedule-csa@sha256:7e75643b78443f92aefbb2ae06fd084c073206d8ebaf51b0827d06709e96738e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-02-13-16:37","description":"","event_time":"2026-02-13-16:37","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend@sha256:fd3abce6e00310f35e9c6ad7c087e47764da472f9f30216c59bac52513078244","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-02-06-16:38","description":"","event_time":"2026-04-15-09:15","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-batch-schedul-csa@sha256:1d323f8aec21c74ee7ebc58376523f4f59992e9d3053a38a6fc2cf1737a861a6","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:51","description":"","event_time":"2026-04-15-09:17","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-master-schedule-csa@sha256:7e75643b78443f92aefbb2ae06fd084c073206d8ebaf51b0827d06709e96738e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-04-02:17","description":"","event_time":"2026-04-15-09:18","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-29-02:04","description":"","event_time":"2026-03-29-02:04","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend-llm@sha256:9c5a3e76e4653801562d5393570ed38400aa883af435273e634c46cdaf53282b","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-06-17:24","description":"","event_time":"2026-04-15-09:12","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:2e37862fb959bdf4c5d1b76b55878620c21e19dddfc6ffa9f2039e72f59e6ef9","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:55","description":"","event_time":"2026-04-15-09:23","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-master-schedule-csa@sha256:7e75643b78443f92aefbb2ae06fd084c073206d8ebaf51b0827d06709e96738e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:36","description":"","event_time":"2026-04-15-09:12","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:2e37862fb959bdf4c5d1b76b55878620c21e19dddfc6ffa9f2039e72f59e6ef9","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:55","description":"","event_time":"2026-04-15-09:15","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:52","description":"","event_time":"2026-04-15-09:17","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/check-kdata-file-job-csa@sha256:6fdd71d0bd58e204615132fb5777623baa5ea9ff6fb00bc5207b5f5c3552945c","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-04-02:32","description":"","event_time":"2026-04-15-09:18","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/check-kdata-file-job-csa@sha256:6fdd71d0bd58e204615132fb5777623baa5ea9ff6fb00bc5207b5f5c3552945c","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:54","description":"","event_time":"2026-04-15-09:21","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:54","description":"","event_time":"2026-04-15-09:12","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-master-schedule-csa@sha256:7e75643b78443f92aefbb2ae06fd084c073206d8ebaf51b0827d06709e96738e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-17-01:31","description":"","event_time":"2026-04-15-09:29","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-batch-schedul-csa@sha256:1d323f8aec21c74ee7ebc58376523f4f59992e9d3053a38a6fc2cf1737a861a6","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:54","description":"","event_time":"2026-04-15-09:31","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-09-04:15","description":"","event_time":"2026-04-15-09:15","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:51","description":"","event_time":"2026-04-15-09:18","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/check-kdata-file-job-csa@sha256:6fdd71d0bd58e204615132fb5777623baa5ea9ff6fb00bc5207b5f5c3552945c","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:55","description":"","event_time":"2026-04-15-09:20","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-batch-schedul-csa@sha256:1d323f8aec21c74ee7ebc58376523f4f59992e9d3053a38a6fc2cf1737a861a6","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:34","description":"","event_time":"2026-04-15-09:30","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-17-01:33","description":"","event_time":"2026-04-15-09:24","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-master-schedule-csa@sha256:7e75643b78443f92aefbb2ae06fd084c073206d8ebaf51b0827d06709e96738e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-13-15:21","description":"","event_time":"2026-04-15-09:25","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:2e37862fb959bdf4c5d1b76b55878620c21e19dddfc6ffa9f2039e72f59e6ef9","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-05-01:34","description":"","event_time":"2026-04-15-09:14","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:f7c69c5b6ac3ce32ea95770d08e73679187001a3d96c85b04ee6285e343dee63","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:51","description":"","event_time":"2026-04-15-09:26","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-batch-schedul-csa@sha256:1d323f8aec21c74ee7ebc58376523f4f59992e9d3053a38a6fc2cf1737a861a6","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:05","description":"","event_time":"2026-04-15-09:27","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-10-03:58","description":"","event_time":"2026-04-15-09:31","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:f7c69c5b6ac3ce32ea95770d08e73679187001a3d96c85b04ee6285e343dee63","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-06-17:46","description":"","event_time":"2026-04-15-09:20","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:2e37862fb959bdf4c5d1b76b55878620c21e19dddfc6ffa9f2039e72f59e6ef9","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-14-01:41","description":"","event_time":"2026-04-15-09:20","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/check-kdata-file-job-csa@sha256:6fdd71d0bd58e204615132fb5777623baa5ea9ff6fb00bc5207b5f5c3552945c","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:51","description":"","event_time":"2026-04-15-09:18","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-master-schedule-csa@sha256:7e75643b78443f92aefbb2ae06fd084c073206d8ebaf51b0827d06709e96738e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:07","description":"","event_time":"2026-04-15-09:20","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-batch-schedul-csa@sha256:1d323f8aec21c74ee7ebc58376523f4f59992e9d3053a38a6fc2cf1737a861a6","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-01:41","description":"","event_time":"2026-03-20-01:41","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend@sha256:dbf4e3f02b2e525b1e33f0539ceeba3eb96bbf710659d654fa1bf8e0958c4268","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:55","description":"","event_time":"2026-04-15-09:19","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-28-01:29","description":"","event_time":"2026-04-15-09:18","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:21","description":"","event_time":"2026-04-15-09:12","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/check-kdata-file-job-csa@sha256:6fdd71d0bd58e204615132fb5777623baa5ea9ff6fb00bc5207b5f5c3552945c","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:26","description":"","event_time":"2026-04-15-09:26","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-master-schedule-csa@sha256:7e75643b78443f92aefbb2ae06fd084c073206d8ebaf51b0827d06709e96738e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:50","description":"","event_time":"2026-04-15-09:12","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/check-kdata-file-job-csa@sha256:6fdd71d0bd58e204615132fb5777623baa5ea9ff6fb00bc5207b5f5c3552945c","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-09-05:43","description":"","event_time":"2026-04-15-09:26","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-29-02:06","description":"","event_time":"2026-04-15-09:24","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-batch-schedul-csa@sha256:1d323f8aec21c74ee7ebc58376523f4f59992e9d3053a38a6fc2cf1737a861a6","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-02-25-16:45","description":"","event_time":"2026-04-15-09:16","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-11-01:46","description":"","event_time":"2026-04-11-01:46","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-frontend@sha256:6e21c3ed85cc4b83a05a1fee34c45e7403bd8b9e9be299bf8f26a2d17b51fe8f","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-19-01:35","description":"","event_time":"2026-04-15-09:21","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:f7c69c5b6ac3ce32ea95770d08e73679187001a3d96c85b04ee6285e343dee63","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-03-16:18","description":"","event_time":"2026-04-15-09:20","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-batch-schedul-csa@sha256:1d323f8aec21c74ee7ebc58376523f4f59992e9d3053a38a6fc2cf1737a861a6","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-01-31-16:15","description":"","event_time":"2026-04-15-09:30","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/check-kdata-file-job-csa@sha256:6fdd71d0bd58e204615132fb5777623baa5ea9ff6fb00bc5207b5f5c3552945c","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-14-02:18","description":"","event_time":"2026-04-14-02:18","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-frontend@sha256:6e21c3ed85cc4b83a05a1fee34c45e7403bd8b9e9be299bf8f26a2d17b51fe8f","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:42","description":"","event_time":"2026-04-12-02:42","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend@sha256:fd3abce6e00310f35e9c6ad7c087e47764da472f9f30216c59bac52513078244","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-01-30-17:32","description":"","event_time":"2026-04-15-09:30","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:51","description":"","event_time":"2026-04-15-09:17","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-10-04:47","description":"","event_time":"2026-04-15-09:11","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-batch-schedul-csa@sha256:1d323f8aec21c74ee7ebc58376523f4f59992e9d3053a38a6fc2cf1737a861a6","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:52","description":"","event_time":"2026-04-15-09:20","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-master-schedule-csa@sha256:7e75643b78443f92aefbb2ae06fd084c073206d8ebaf51b0827d06709e96738e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:02","description":"","event_time":"2026-04-15-09:29","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-master-schedule-csa@sha256:7e75643b78443f92aefbb2ae06fd084c073206d8ebaf51b0827d06709e96738e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:51","description":"","event_time":"2026-04-15-09:17","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-master-schedule-csa@sha256:7e75643b78443f92aefbb2ae06fd084c073206d8ebaf51b0827d06709e96738e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-10-05:06","description":"","event_time":"2026-04-15-09:28","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:f7c69c5b6ac3ce32ea95770d08e73679187001a3d96c85b04ee6285e343dee63","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:52","description":"","event_time":"2026-04-15-09:19","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/check-kdata-file-job-csa@sha256:6fdd71d0bd58e204615132fb5777623baa5ea9ff6fb00bc5207b5f5c3552945c","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:51","description":"","event_time":"2026-03-01-15:51","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend@sha256:fd3abce6e00310f35e9c6ad7c087e47764da472f9f30216c59bac52513078244","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:49","description":"","event_time":"2026-04-15-09:27","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-02-28-16:23","description":"","event_time":"2026-04-15-09:16","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:54","description":"","event_time":"2026-04-15-09:27","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/check-kdata-file-job-csa@sha256:6fdd71d0bd58e204615132fb5777623baa5ea9ff6fb00bc5207b5f5c3552945c","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-01-30-17:13","description":"","event_time":"2026-04-15-09:28","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/check-kdata-file-job-csa@sha256:6fdd71d0bd58e204615132fb5777623baa5ea9ff6fb00bc5207b5f5c3552945c","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:04","description":"","event_time":"2026-04-15-09:19","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:2e37862fb959bdf4c5d1b76b55878620c21e19dddfc6ffa9f2039e72f59e6ef9","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-02-25-16:54","description":"","event_time":"2026-04-15-09:20","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:53","description":"","event_time":"2026-04-15-09:19","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-batch-schedul-csa@sha256:1d323f8aec21c74ee7ebc58376523f4f59992e9d3053a38a6fc2cf1737a861a6","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:54","description":"","event_time":"2026-04-15-09:29","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-master-schedule-csa@sha256:7e75643b78443f92aefbb2ae06fd084c073206d8ebaf51b0827d06709e96738e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-03-16:41","description":"","event_time":"2026-04-15-09:24","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:f7c69c5b6ac3ce32ea95770d08e73679187001a3d96c85b04ee6285e343dee63","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-17-01:30","description":"","event_time":"2026-03-17-01:30","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend-llm@sha256:9c5a3e76e4653801562d5393570ed38400aa883af435273e634c46cdaf53282b","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-06-16:52","description":"","event_time":"2026-03-06-16:52","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend@sha256:dbf4e3f02b2e525b1e33f0539ceeba3eb96bbf710659d654fa1bf8e0958c4268","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-01-30-17:18","description":"","event_time":"2026-04-15-09:20","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:f7c69c5b6ac3ce32ea95770d08e73679187001a3d96c85b04ee6285e343dee63","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-10-04:44","description":"","event_time":"2026-04-15-09:19","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:2e37862fb959bdf4c5d1b76b55878620c21e19dddfc6ffa9f2039e72f59e6ef9","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:54","description":"","event_time":"2026-04-15-09:13","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-master-schedule-csa@sha256:7e75643b78443f92aefbb2ae06fd084c073206d8ebaf51b0827d06709e96738e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-13-15:17","description":"","event_time":"2026-03-13-15:17","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend@sha256:dbf4e3f02b2e525b1e33f0539ceeba3eb96bbf710659d654fa1bf8e0958c4268","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-02-06-16:13","description":"","event_time":"2026-04-15-09:13","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-02-06-15:51","description":"","event_time":"2026-02-06-15:51","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend@sha256:fd3abce6e00310f35e9c6ad7c087e47764da472f9f30216c59bac52513078244","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-19-01:59","description":"","event_time":"2026-03-19-01:59","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend@sha256:fd3abce6e00310f35e9c6ad7c087e47764da472f9f30216c59bac52513078244","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-02-06-16:17","description":"","event_time":"2026-04-15-09:21","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:f7c69c5b6ac3ce32ea95770d08e73679187001a3d96c85b04ee6285e343dee63","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:13","description":"","event_time":"2026-04-15-09:24","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-master-schedule-csa@sha256:7e75643b78443f92aefbb2ae06fd084c073206d8ebaf51b0827d06709e96738e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:51","description":"","event_time":"2026-04-15-09:27","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-master-schedule-csa@sha256:7e75643b78443f92aefbb2ae06fd084c073206d8ebaf51b0827d06709e96738e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:53","description":"","event_time":"2026-04-15-09:30","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-batch-schedul-csa@sha256:1d323f8aec21c74ee7ebc58376523f4f59992e9d3053a38a6fc2cf1737a861a6","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-02-25-17:01","description":"","event_time":"2026-04-15-09:18","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:54","description":"","event_time":"2026-04-15-09:22","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-batch-schedul-csa@sha256:1d323f8aec21c74ee7ebc58376523f4f59992e9d3053a38a6fc2cf1737a861a6","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-01-27-18:52","description":"","event_time":"2026-04-15-09:19","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-19-01:34","description":"","event_time":"2026-03-19-01:34","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend@sha256:dbf4e3f02b2e525b1e33f0539ceeba3eb96bbf710659d654fa1bf8e0958c4268","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:04","description":"","event_time":"2026-04-15-09:30","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/check-kdata-file-job-csa@sha256:6fdd71d0bd58e204615132fb5777623baa5ea9ff6fb00bc5207b5f5c3552945c","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-17-01:22","description":"","event_time":"2026-04-15-09:15","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:f7c69c5b6ac3ce32ea95770d08e73679187001a3d96c85b04ee6285e343dee63","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-14-01:33","description":"","event_time":"2026-03-14-01:33","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend@sha256:fd3abce6e00310f35e9c6ad7c087e47764da472f9f30216c59bac52513078244","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:15","description":"","event_time":"2026-04-15-09:28","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/check-kdata-file-job-csa@sha256:6fdd71d0bd58e204615132fb5777623baa5ea9ff6fb00bc5207b5f5c3552945c","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:50","description":"","event_time":"2026-04-15-09:25","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-master-schedule-csa@sha256:7e75643b78443f92aefbb2ae06fd084c073206d8ebaf51b0827d06709e96738e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-10-04:33","description":"","event_time":"2026-04-15-09:12","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-batch-schedul-csa@sha256:1d323f8aec21c74ee7ebc58376523f4f59992e9d3053a38a6fc2cf1737a861a6","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-01:45","description":"","event_time":"2026-04-15-09:14","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-batch-schedul-csa@sha256:1d323f8aec21c74ee7ebc58376523f4f59992e9d3053a38a6fc2cf1737a861a6","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:51","description":"","event_time":"2026-04-15-09:12","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-batch-schedul-csa@sha256:1d323f8aec21c74ee7ebc58376523f4f59992e9d3053a38a6fc2cf1737a861a6","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-02-25-17:04","description":"","event_time":"2026-04-15-09:23","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-19-02:08","description":"","event_time":"2026-04-15-09:26","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-master-schedule-csa@sha256:7e75643b78443f92aefbb2ae06fd084c073206d8ebaf51b0827d06709e96738e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-02-26-16:18","description":"","event_time":"2026-04-15-09:17","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:33","description":"","event_time":"2026-04-12-02:33","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend@sha256:fd3abce6e00310f35e9c6ad7c087e47764da472f9f30216c59bac52513078244","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:51","description":"","event_time":"2026-04-15-09:20","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/check-kdata-file-job-csa@sha256:6fdd71d0bd58e204615132fb5777623baa5ea9ff6fb00bc5207b5f5c3552945c","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-11-16:35","description":"","event_time":"2026-04-15-09:14","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-02-06-16:20","description":"","event_time":"2026-04-15-09:13","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-02-26-16:32","description":"","event_time":"2026-04-15-09:31","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:50","description":"","event_time":"2026-04-15-09:13","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-master-schedule-csa@sha256:7e75643b78443f92aefbb2ae06fd084c073206d8ebaf51b0827d06709e96738e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:55","description":"","event_time":"2026-04-15-09:31","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-06-16:52","description":"","event_time":"2026-03-06-16:52","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend@sha256:dbf4e3f02b2e525b1e33f0539ceeba3eb96bbf710659d654fa1bf8e0958c4268","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:54","description":"","event_time":"2026-04-15-09:11","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/check-kdata-file-job-csa@sha256:6fdd71d0bd58e204615132fb5777623baa5ea9ff6fb00bc5207b5f5c3552945c","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-10-04:33","description":"","event_time":"2026-04-15-09:15","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/check-kdata-file-job-csa@sha256:6fdd71d0bd58e204615132fb5777623baa5ea9ff6fb00bc5207b5f5c3552945c","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:53","description":"","event_time":"2026-04-15-09:28","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-batch-schedul-csa@sha256:1d323f8aec21c74ee7ebc58376523f4f59992e9d3053a38a6fc2cf1737a861a6","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-02-06-16:39","description":"","event_time":"2026-04-15-09:20","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:f7c69c5b6ac3ce32ea95770d08e73679187001a3d96c85b04ee6285e343dee63","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-19-01:22","description":"","event_time":"2026-04-15-09:13","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:20","description":"","event_time":"2026-04-15-02:20","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-frontend@sha256:6e21c3ed85cc4b83a05a1fee34c45e7403bd8b9e9be299bf8f26a2d17b51fe8f","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:43","description":"","event_time":"2026-04-15-09:31","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:f7c69c5b6ac3ce32ea95770d08e73679187001a3d96c85b04ee6285e343dee63","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:54","description":"","event_time":"2026-04-15-09:15","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-master-schedule-csa@sha256:7e75643b78443f92aefbb2ae06fd084c073206d8ebaf51b0827d06709e96738e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:52","description":"","event_time":"2026-04-15-09:23","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-master-schedule-csa@sha256:7e75643b78443f92aefbb2ae06fd084c073206d8ebaf51b0827d06709e96738e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:51","description":"","event_time":"2026-04-15-09:22","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:53","description":"","event_time":"2026-04-15-09:26","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-10-04:30","description":"","event_time":"2026-04-15-09:15","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-batch-schedul-csa@sha256:1d323f8aec21c74ee7ebc58376523f4f59992e9d3053a38a6fc2cf1737a861a6","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:53","description":"","event_time":"2026-04-15-09:29","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/check-kdata-file-job-csa@sha256:6fdd71d0bd58e204615132fb5777623baa5ea9ff6fb00bc5207b5f5c3552945c","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:30","description":"","event_time":"2026-04-15-09:23","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-batch-schedul-csa@sha256:1d323f8aec21c74ee7ebc58376523f4f59992e9d3053a38a6fc2cf1737a861a6","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:50","description":"","event_time":"2026-04-15-09:18","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:31","description":"","event_time":"2026-04-15-02:31","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend@sha256:fd3abce6e00310f35e9c6ad7c087e47764da472f9f30216c59bac52513078244","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:50","description":"","event_time":"2026-04-15-09:32","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-master-schedule-csa@sha256:7e75643b78443f92aefbb2ae06fd084c073206d8ebaf51b0827d06709e96738e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-11-16:35","description":"","event_time":"2026-04-15-04:17","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/check-kdata-file-job-csa@sha256:6fdd71d0bd58e204615132fb5777623baa5ea9ff6fb00bc5207b5f5c3552945c","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:52","description":"","event_time":"2026-04-15-09:17","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-03-16:45","description":"","event_time":"2026-03-03-16:45","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend@sha256:fd3abce6e00310f35e9c6ad7c087e47764da472f9f30216c59bac52513078244","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:55","description":"","event_time":"2026-04-15-09:30","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-batch-schedul-csa@sha256:1d323f8aec21c74ee7ebc58376523f4f59992e9d3053a38a6fc2cf1737a861a6","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-11-16:09","description":"","event_time":"2026-03-11-16:09","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend@sha256:dbf4e3f02b2e525b1e33f0539ceeba3eb96bbf710659d654fa1bf8e0958c4268","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-02-06-16:12","description":"","event_time":"2026-04-15-09:15","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/check-kdata-file-job-csa@sha256:6fdd71d0bd58e204615132fb5777623baa5ea9ff6fb00bc5207b5f5c3552945c","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-29-01:57","description":"","event_time":"2026-03-29-01:57","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend@sha256:dbf4e3f02b2e525b1e33f0539ceeba3eb96bbf710659d654fa1bf8e0958c4268","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-01-27-19:02","description":"","event_time":"2026-04-15-09:18","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-master-schedule-csa@sha256:7e75643b78443f92aefbb2ae06fd084c073206d8ebaf51b0827d06709e96738e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:44","description":"","event_time":"2026-04-15-09:20","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:2e37862fb959bdf4c5d1b76b55878620c21e19dddfc6ffa9f2039e72f59e6ef9","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-01-01:22","description":"","event_time":"2026-04-01-01:22","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend@sha256:fd3abce6e00310f35e9c6ad7c087e47764da472f9f30216c59bac52513078244","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:56","description":"","event_time":"2026-04-15-09:21","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/check-kdata-file-job-csa@sha256:6fdd71d0bd58e204615132fb5777623baa5ea9ff6fb00bc5207b5f5c3552945c","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-01-31-16:15","description":"","event_time":"2026-04-15-09:32","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:54","description":"","event_time":"2026-04-15-09:20","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-01-31-16:19","description":"","event_time":"2026-04-15-09:13","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-batch-schedul-csa@sha256:1d323f8aec21c74ee7ebc58376523f4f59992e9d3053a38a6fc2cf1737a861a6","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:56","description":"","event_time":"2026-04-15-09:26","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-master-schedule-csa@sha256:7e75643b78443f92aefbb2ae06fd084c073206d8ebaf51b0827d06709e96738e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-25-02:23","description":"","event_time":"2026-04-15-09:24","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-14-02:30","description":"","event_time":"2026-04-15-09:23","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-batch-schedul-csa@sha256:1d323f8aec21c74ee7ebc58376523f4f59992e9d3053a38a6fc2cf1737a861a6","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:53","description":"","event_time":"2026-04-15-09:25","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-batch-schedul-csa@sha256:1d323f8aec21c74ee7ebc58376523f4f59992e9d3053a38a6fc2cf1737a861a6","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-03-16:50","description":"","event_time":"2026-04-15-09:31","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:53","description":"","event_time":"2026-04-15-09:30","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/check-kdata-file-job-csa@sha256:6fdd71d0bd58e204615132fb5777623baa5ea9ff6fb00bc5207b5f5c3552945c","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-14-02:33","description":"","event_time":"2026-04-14-02:33","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-frontend@sha256:6e21c3ed85cc4b83a05a1fee34c45e7403bd8b9e9be299bf8f26a2d17b51fe8f","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-14-02:29","description":"","event_time":"2026-04-15-09:23","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:2e37862fb959bdf4c5d1b76b55878620c21e19dddfc6ffa9f2039e72f59e6ef9","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:55","description":"","event_time":"2026-04-15-09:19","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-01-01:09","description":"","event_time":"2026-04-01-01:09","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend@sha256:dbf4e3f02b2e525b1e33f0539ceeba3eb96bbf710659d654fa1bf8e0958c4268","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-14-02:21","description":"","event_time":"2026-04-14-02:21","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-frontend@sha256:6e21c3ed85cc4b83a05a1fee34c45e7403bd8b9e9be299bf8f26a2d17b51fe8f","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-02-13-17:14","description":"","event_time":"2026-04-15-09:20","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-batch-schedul-csa@sha256:1d323f8aec21c74ee7ebc58376523f4f59992e9d3053a38a6fc2cf1737a861a6","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-13-15:13","description":"","event_time":"2026-03-13-15:13","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend-llm@sha256:9c5a3e76e4653801562d5393570ed38400aa883af435273e634c46cdaf53282b","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:54","description":"","event_time":"2026-04-15-09:19","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-batch-schedul-csa@sha256:1d323f8aec21c74ee7ebc58376523f4f59992e9d3053a38a6fc2cf1737a861a6","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:54","description":"","event_time":"2026-04-15-09:26","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-batch-schedul-csa@sha256:1d323f8aec21c74ee7ebc58376523f4f59992e9d3053a38a6fc2cf1737a861a6","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:51","description":"","event_time":"2026-04-15-09:19","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-batch-schedul-csa@sha256:1d323f8aec21c74ee7ebc58376523f4f59992e9d3053a38a6fc2cf1737a861a6","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-06-17:12","description":"","event_time":"2026-03-06-17:12","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend@sha256:dbf4e3f02b2e525b1e33f0539ceeba3eb96bbf710659d654fa1bf8e0958c4268","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-14-01:30","description":"","event_time":"2026-04-15-09:27","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:53","description":"","event_time":"2026-04-15-09:13","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-batch-schedul-csa@sha256:1d323f8aec21c74ee7ebc58376523f4f59992e9d3053a38a6fc2cf1737a861a6","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:51","description":"","event_time":"2026-04-15-09:26","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:f7c69c5b6ac3ce32ea95770d08e73679187001a3d96c85b04ee6285e343dee63","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:52","description":"","event_time":"2026-04-15-09:26","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-batch-schedul-csa@sha256:1d323f8aec21c74ee7ebc58376523f4f59992e9d3053a38a6fc2cf1737a861a6","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:54","description":"","event_time":"2026-04-15-09:16","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-master-schedule-csa@sha256:7e75643b78443f92aefbb2ae06fd084c073206d8ebaf51b0827d06709e96738e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:52","description":"","event_time":"2026-04-15-09:20","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:53","description":"","event_time":"2026-04-15-09:30","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:51","description":"","event_time":"2026-04-15-09:15","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-batch-schedul-csa@sha256:1d323f8aec21c74ee7ebc58376523f4f59992e9d3053a38a6fc2cf1737a861a6","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-11-15:46","description":"","event_time":"2026-04-15-09:15","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-04-02:08","description":"","event_time":"2026-04-04-02:08","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend@sha256:fd3abce6e00310f35e9c6ad7c087e47764da472f9f30216c59bac52513078244","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-01-30-17:13","description":"","event_time":"2026-04-15-09:31","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:51","description":"","event_time":"2026-04-15-09:23","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-master-schedule-csa@sha256:7e75643b78443f92aefbb2ae06fd084c073206d8ebaf51b0827d06709e96738e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-10-05:05","description":"","event_time":"2026-04-10-05:05","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend@sha256:fd3abce6e00310f35e9c6ad7c087e47764da472f9f30216c59bac52513078244","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-27-02:03","description":"","event_time":"2026-03-27-02:03","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-frontend@sha256:6e21c3ed85cc4b83a05a1fee34c45e7403bd8b9e9be299bf8f26a2d17b51fe8f","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-01-01:33","description":"","event_time":"2026-04-15-09:21","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/check-kdata-file-job-csa@sha256:6fdd71d0bd58e204615132fb5777623baa5ea9ff6fb00bc5207b5f5c3552945c","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:54","description":"","event_time":"2026-04-15-09:14","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-10-04:37","description":"","event_time":"2026-04-15-09:24","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-master-schedule-csa@sha256:7e75643b78443f92aefbb2ae06fd084c073206d8ebaf51b0827d06709e96738e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:53","description":"","event_time":"2026-04-15-09:29","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-batch-schedul-csa@sha256:1d323f8aec21c74ee7ebc58376523f4f59992e9d3053a38a6fc2cf1737a861a6","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:56","description":"","event_time":"2026-04-15-09:13","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-batch-schedul-csa@sha256:1d323f8aec21c74ee7ebc58376523f4f59992e9d3053a38a6fc2cf1737a861a6","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-01-31-16:19","description":"","event_time":"2026-01-31-16:19","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend@sha256:fd3abce6e00310f35e9c6ad7c087e47764da472f9f30216c59bac52513078244","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:22","description":"","event_time":"2026-04-15-09:22","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:2e37862fb959bdf4c5d1b76b55878620c21e19dddfc6ffa9f2039e72f59e6ef9","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-06-17:12","description":"","event_time":"2026-04-15-09:14","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:2e37862fb959bdf4c5d1b76b55878620c21e19dddfc6ffa9f2039e72f59e6ef9","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:55","description":"","event_time":"2026-04-15-09:12","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-master-schedule-csa@sha256:7e75643b78443f92aefbb2ae06fd084c073206d8ebaf51b0827d06709e96738e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-01:46","description":"","event_time":"2026-04-15-09:22","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:f7c69c5b6ac3ce32ea95770d08e73679187001a3d96c85b04ee6285e343dee63","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-04-01:57","description":"","event_time":"2026-04-15-09:22","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-master-schedule-csa@sha256:7e75643b78443f92aefbb2ae06fd084c073206d8ebaf51b0827d06709e96738e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:26","description":"","event_time":"2026-04-15-09:23","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/check-kdata-file-job-csa@sha256:6fdd71d0bd58e204615132fb5777623baa5ea9ff6fb00bc5207b5f5c3552945c","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-01-30-17:14","description":"","event_time":"2026-03-01-15:53","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend@sha256:fd3abce6e00310f35e9c6ad7c087e47764da472f9f30216c59bac52513078244","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-02-25-16:36","description":"","event_time":"2026-04-15-09:19","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-02-06-16:37","description":"","event_time":"2026-04-15-09:28","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-master-schedule-csa@sha256:7e75643b78443f92aefbb2ae06fd084c073206d8ebaf51b0827d06709e96738e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-05-01:44","description":"","event_time":"2026-04-05-01:44","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend@sha256:dbf4e3f02b2e525b1e33f0539ceeba3eb96bbf710659d654fa1bf8e0958c4268","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-09-05:42","description":"","event_time":"2026-04-15-09:30","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-batch-schedul-csa@sha256:1d323f8aec21c74ee7ebc58376523f4f59992e9d3053a38a6fc2cf1737a861a6","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:37","description":"","event_time":"2026-04-15-09:26","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-28-01:25","description":"","event_time":"2026-04-15-09:17","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-02-06-16:16","description":"","event_time":"2026-04-15-09:27","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-master-schedule-csa@sha256:7e75643b78443f92aefbb2ae06fd084c073206d8ebaf51b0827d06709e96738e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-02-06-16:03","description":"","event_time":"2026-02-06-16:03","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend@sha256:fd3abce6e00310f35e9c6ad7c087e47764da472f9f30216c59bac52513078244","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:51","description":"","event_time":"2026-04-15-09:28","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-01-27-19:20","description":"","event_time":"2026-01-27-19:20","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend@sha256:fd3abce6e00310f35e9c6ad7c087e47764da472f9f30216c59bac52513078244","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-01-30-17:28","description":"","event_time":"2026-04-15-09:32","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/check-kdata-file-job-csa@sha256:6fdd71d0bd58e204615132fb5777623baa5ea9ff6fb00bc5207b5f5c3552945c","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:17","description":"","event_time":"2026-04-15-02:17","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend@sha256:fd3abce6e00310f35e9c6ad7c087e47764da472f9f30216c59bac52513078244","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:51","description":"","event_time":"2026-04-15-09:19","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-01:23","description":"","event_time":"2026-04-15-09:26","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:2e37862fb959bdf4c5d1b76b55878620c21e19dddfc6ffa9f2039e72f59e6ef9","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-11-15:37","description":"","event_time":"2026-04-15-09:20","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-02-25-16:51","description":"","event_time":"2026-04-15-09:12","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-02-06-16:14","description":"","event_time":"2026-04-15-09:17","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:54","description":"","event_time":"2026-04-15-09:21","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-batch-schedul-csa@sha256:1d323f8aec21c74ee7ebc58376523f4f59992e9d3053a38a6fc2cf1737a861a6","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:54","description":"","event_time":"2026-04-15-09:26","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/check-kdata-file-job-csa@sha256:6fdd71d0bd58e204615132fb5777623baa5ea9ff6fb00bc5207b5f5c3552945c","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-01-27-19:09","description":"","event_time":"2026-04-15-09:22","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/check-kdata-file-job-csa@sha256:6fdd71d0bd58e204615132fb5777623baa5ea9ff6fb00bc5207b5f5c3552945c","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-10-04:48","description":"","event_time":"2026-04-15-09:30","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-batch-schedul-csa@sha256:1d323f8aec21c74ee7ebc58376523f4f59992e9d3053a38a6fc2cf1737a861a6","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-06-17:26","description":"","event_time":"2026-03-06-17:26","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend@sha256:dbf4e3f02b2e525b1e33f0539ceeba3eb96bbf710659d654fa1bf8e0958c4268","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-10-05:07","description":"","event_time":"2026-04-15-09:12","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-batch-schedul-csa@sha256:1d323f8aec21c74ee7ebc58376523f4f59992e9d3053a38a6fc2cf1737a861a6","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-01:48","description":"","event_time":"2026-04-15-09:13","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:f7c69c5b6ac3ce32ea95770d08e73679187001a3d96c85b04ee6285e343dee63","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-09-04:27","description":"","event_time":"2026-04-15-09:15","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-14-02:25","description":"","event_time":"2026-04-15-09:22","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:f7c69c5b6ac3ce32ea95770d08e73679187001a3d96c85b04ee6285e343dee63","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:54","description":"","event_time":"2026-04-15-09:25","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-batch-schedul-csa@sha256:1d323f8aec21c74ee7ebc58376523f4f59992e9d3053a38a6fc2cf1737a861a6","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-09-04:28","description":"","event_time":"2026-04-15-09:23","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-11-15:57","description":"","event_time":"2026-03-11-15:57","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend@sha256:fd3abce6e00310f35e9c6ad7c087e47764da472f9f30216c59bac52513078244","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-10-04:50","description":"","event_time":"2026-04-15-09:18","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/check-kdata-file-job-csa@sha256:6fdd71d0bd58e204615132fb5777623baa5ea9ff6fb00bc5207b5f5c3552945c","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-11-01:50","description":"","event_time":"2026-04-11-01:50","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-frontend@sha256:6e21c3ed85cc4b83a05a1fee34c45e7403bd8b9e9be299bf8f26a2d17b51fe8f","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:51","description":"","event_time":"2026-04-15-09:32","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-batch-schedul-csa@sha256:1d323f8aec21c74ee7ebc58376523f4f59992e9d3053a38a6fc2cf1737a861a6","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-11-15:55","description":"","event_time":"2026-04-15-09:28","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:f7c69c5b6ac3ce32ea95770d08e73679187001a3d96c85b04ee6285e343dee63","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:55","description":"","event_time":"2026-04-15-09:18","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/check-kdata-file-job-csa@sha256:6fdd71d0bd58e204615132fb5777623baa5ea9ff6fb00bc5207b5f5c3552945c","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:52","description":"","event_time":"2026-03-01-15:52","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend@sha256:fd3abce6e00310f35e9c6ad7c087e47764da472f9f30216c59bac52513078244","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-29-02:02","description":"","event_time":"2026-04-15-09:29","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/check-kdata-file-job-csa@sha256:6fdd71d0bd58e204615132fb5777623baa5ea9ff6fb00bc5207b5f5c3552945c","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:56","description":"","event_time":"2026-04-15-09:32","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/check-kdata-file-job-csa@sha256:6fdd71d0bd58e204615132fb5777623baa5ea9ff6fb00bc5207b5f5c3552945c","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-02-11-15:45","description":"","event_time":"2026-04-15-09:25","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:f7c69c5b6ac3ce32ea95770d08e73679187001a3d96c85b04ee6285e343dee63","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-06-17:19","description":"","event_time":"2026-03-06-17:19","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend@sha256:dbf4e3f02b2e525b1e33f0539ceeba3eb96bbf710659d654fa1bf8e0958c4268","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-06-17:07","description":"","event_time":"2026-03-06-17:07","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend@sha256:dbf4e3f02b2e525b1e33f0539ceeba3eb96bbf710659d654fa1bf8e0958c4268","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-10-04:23","description":"","event_time":"2026-04-15-09:26","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-master-schedule-csa@sha256:7e75643b78443f92aefbb2ae06fd084c073206d8ebaf51b0827d06709e96738e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-14-01:40","description":"","event_time":"2026-04-15-09:19","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-master-schedule-csa@sha256:7e75643b78443f92aefbb2ae06fd084c073206d8ebaf51b0827d06709e96738e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:55","description":"","event_time":"2026-04-15-09:31","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-master-schedule-csa@sha256:7e75643b78443f92aefbb2ae06fd084c073206d8ebaf51b0827d06709e96738e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-17-01:23","description":"","event_time":"2026-04-15-09:20","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/check-kdata-file-job-csa@sha256:6fdd71d0bd58e204615132fb5777623baa5ea9ff6fb00bc5207b5f5c3552945c","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:52","description":"","event_time":"2026-04-15-09:12","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-master-schedule-csa@sha256:7e75643b78443f92aefbb2ae06fd084c073206d8ebaf51b0827d06709e96738e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-02-25-17:11","description":"","event_time":"2026-04-15-09:16","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:53","description":"","event_time":"2026-04-15-09:14","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-master-schedule-csa@sha256:7e75643b78443f92aefbb2ae06fd084c073206d8ebaf51b0827d06709e96738e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:29","description":"","event_time":"2026-04-15-09:25","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:2e37862fb959bdf4c5d1b76b55878620c21e19dddfc6ffa9f2039e72f59e6ef9","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:54","description":"","event_time":"2026-04-15-09:23","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-master-schedule-csa@sha256:7e75643b78443f92aefbb2ae06fd084c073206d8ebaf51b0827d06709e96738e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:06","description":"","event_time":"2026-04-15-09:27","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:f7c69c5b6ac3ce32ea95770d08e73679187001a3d96c85b04ee6285e343dee63","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:52","description":"","event_time":"2026-04-15-09:25","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-11-16:31","description":"","event_time":"2026-04-15-09:27","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-master-schedule-csa@sha256:7e75643b78443f92aefbb2ae06fd084c073206d8ebaf51b0827d06709e96738e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-02-06-15:50","description":"","event_time":"2026-02-06-15:50","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend@sha256:fd3abce6e00310f35e9c6ad7c087e47764da472f9f30216c59bac52513078244","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:50","description":"","event_time":"2026-04-12-02:50","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend@sha256:fd3abce6e00310f35e9c6ad7c087e47764da472f9f30216c59bac52513078244","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:53","description":"","event_time":"2026-04-15-09:17","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-02-06-16:21","description":"","event_time":"2026-04-15-09:22","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/check-kdata-file-job-csa@sha256:6fdd71d0bd58e204615132fb5777623baa5ea9ff6fb00bc5207b5f5c3552945c","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-06-17:34","description":"","event_time":"2026-03-06-17:34","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend-llm@sha256:9c5a3e76e4653801562d5393570ed38400aa883af435273e634c46cdaf53282b","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:53","description":"","event_time":"2026-04-15-09:15","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/check-kdata-file-job-csa@sha256:6fdd71d0bd58e204615132fb5777623baa5ea9ff6fb00bc5207b5f5c3552945c","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-29-01:43","description":"","event_time":"2026-04-15-09:29","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:51","description":"","event_time":"2026-04-15-09:24","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-master-schedule-csa@sha256:7e75643b78443f92aefbb2ae06fd084c073206d8ebaf51b0827d06709e96738e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-19-01:38","description":"","event_time":"2026-04-15-09:19","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/check-kdata-file-job-csa@sha256:6fdd71d0bd58e204615132fb5777623baa5ea9ff6fb00bc5207b5f5c3552945c","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-01-30-17:20","description":"","event_time":"2026-04-15-09:28","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:f7c69c5b6ac3ce32ea95770d08e73679187001a3d96c85b04ee6285e343dee63","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-11-16:05","description":"","event_time":"2026-04-15-09:28","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-batch-schedul-csa@sha256:1d323f8aec21c74ee7ebc58376523f4f59992e9d3053a38a6fc2cf1737a861a6","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-14-01:29","description":"","event_time":"2026-04-15-09:21","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-batch-schedul-csa@sha256:1d323f8aec21c74ee7ebc58376523f4f59992e9d3053a38a6fc2cf1737a861a6","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-02-03:12","description":"","event_time":"2026-04-15-09:24","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-02-06-16:22","description":"","event_time":"2026-04-15-09:27","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-batch-schedul-csa@sha256:1d323f8aec21c74ee7ebc58376523f4f59992e9d3053a38a6fc2cf1737a861a6","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-19-01:52","description":"","event_time":"2026-03-19-01:52","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend-llm@sha256:9c5a3e76e4653801562d5393570ed38400aa883af435273e634c46cdaf53282b","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-14-02:44","description":"","event_time":"2026-04-15-09:22","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/check-kdata-file-job-csa@sha256:6fdd71d0bd58e204615132fb5777623baa5ea9ff6fb00bc5207b5f5c3552945c","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-27-02:06","description":"","event_time":"2026-03-27-02:06","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-frontend@sha256:6e21c3ed85cc4b83a05a1fee34c45e7403bd8b9e9be299bf8f26a2d17b51fe8f","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-01-27-18:52","description":"","event_time":"2026-04-15-09:12","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-batch-schedul-csa@sha256:1d323f8aec21c74ee7ebc58376523f4f59992e9d3053a38a6fc2cf1737a861a6","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:56","description":"","event_time":"2026-04-15-09:12","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-master-schedule-csa@sha256:7e75643b78443f92aefbb2ae06fd084c073206d8ebaf51b0827d06709e96738e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-02-06-16:13","description":"","event_time":"2026-04-15-09:23","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/check-kdata-file-job-csa@sha256:6fdd71d0bd58e204615132fb5777623baa5ea9ff6fb00bc5207b5f5c3552945c","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:55","description":"","event_time":"2026-04-15-09:23","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-10-04:49","description":"","event_time":"2026-04-15-09:22","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-master-schedule-csa@sha256:7e75643b78443f92aefbb2ae06fd084c073206d8ebaf51b0827d06709e96738e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-01:52","description":"","event_time":"2026-04-15-09:10","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-19-01:51","description":"","event_time":"2026-04-15-09:20","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:2e37862fb959bdf4c5d1b76b55878620c21e19dddfc6ffa9f2039e72f59e6ef9","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-26-03:01","description":"","event_time":"2026-04-15-09:20","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:26","description":"","event_time":"2026-04-15-09:31","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-29-02:03","description":"","event_time":"2026-04-15-09:25","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-master-schedule-csa@sha256:7e75643b78443f92aefbb2ae06fd084c073206d8ebaf51b0827d06709e96738e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-08-02:50","description":"","event_time":"2026-04-15-09:17","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:55","description":"","event_time":"2026-04-15-09:29","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-master-schedule-csa@sha256:7e75643b78443f92aefbb2ae06fd084c073206d8ebaf51b0827d06709e96738e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-10-04:55","description":"","event_time":"2026-04-15-09:25","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:52","description":"","event_time":"2026-04-15-09:30","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-14-02:22","description":"","event_time":"2026-04-14-02:22","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend@sha256:fd3abce6e00310f35e9c6ad7c087e47764da472f9f30216c59bac52513078244","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-14-02:41","description":"","event_time":"2026-04-15-09:23","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-master-schedule-csa@sha256:7e75643b78443f92aefbb2ae06fd084c073206d8ebaf51b0827d06709e96738e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:38","description":"","event_time":"2026-04-15-09:12","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/check-kdata-file-job-csa@sha256:6fdd71d0bd58e204615132fb5777623baa5ea9ff6fb00bc5207b5f5c3552945c","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-17-01:34","description":"","event_time":"2026-04-15-09:17","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-04-02:26","description":"","event_time":"2026-04-15-09:20","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:2e37862fb959bdf4c5d1b76b55878620c21e19dddfc6ffa9f2039e72f59e6ef9","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-01-27-19:04","description":"","event_time":"2026-04-15-09:15","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-batch-schedul-csa@sha256:1d323f8aec21c74ee7ebc58376523f4f59992e9d3053a38a6fc2cf1737a861a6","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-03-16:16","description":"","event_time":"2026-04-15-09:14","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/check-kdata-file-job-csa@sha256:6fdd71d0bd58e204615132fb5777623baa5ea9ff6fb00bc5207b5f5c3552945c","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:54","description":"","event_time":"2026-04-15-09:29","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-master-schedule-csa@sha256:7e75643b78443f92aefbb2ae06fd084c073206d8ebaf51b0827d06709e96738e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:54","description":"","event_time":"2026-04-15-09:31","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-master-schedule-csa@sha256:7e75643b78443f92aefbb2ae06fd084c073206d8ebaf51b0827d06709e96738e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-11-16:07","description":"","event_time":"2026-04-15-09:24","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-06-16:43","description":"","event_time":"2026-03-06-16:43","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend@sha256:dbf4e3f02b2e525b1e33f0539ceeba3eb96bbf710659d654fa1bf8e0958c4268","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-02-13-17:04","description":"","event_time":"2026-04-15-09:15","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-01-01:13","description":"","event_time":"2026-04-15-09:24","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:f7c69c5b6ac3ce32ea95770d08e73679187001a3d96c85b04ee6285e343dee63","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:17","description":"","event_time":"2026-04-15-09:15","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/check-kdata-file-job-csa@sha256:6fdd71d0bd58e204615132fb5777623baa5ea9ff6fb00bc5207b5f5c3552945c","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-01-01:24","description":"","event_time":"2026-04-01-01:24","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend-llm@sha256:9c5a3e76e4653801562d5393570ed38400aa883af435273e634c46cdaf53282b","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-02-16-16:08","description":"","event_time":"2026-04-15-09:15","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-06-17:14","description":"","event_time":"2026-04-15-09:31","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:2e37862fb959bdf4c5d1b76b55878620c21e19dddfc6ffa9f2039e72f59e6ef9","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-01-30-17:12","description":"","event_time":"2026-03-01-15:52","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend@sha256:fd3abce6e00310f35e9c6ad7c087e47764da472f9f30216c59bac52513078244","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:34","description":"","event_time":"2026-04-15-09:19","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-17-01:24","description":"","event_time":"2026-03-17-01:24","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend@sha256:fd3abce6e00310f35e9c6ad7c087e47764da472f9f30216c59bac52513078244","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:29","description":"","event_time":"2026-04-15-09:13","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:f7c69c5b6ac3ce32ea95770d08e73679187001a3d96c85b04ee6285e343dee63","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-01-27-19:12","description":"","event_time":"2026-04-15-09:26","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-master-schedule-csa@sha256:7e75643b78443f92aefbb2ae06fd084c073206d8ebaf51b0827d06709e96738e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-01-31-16:12","description":"","event_time":"2026-04-15-09:13","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:f7c69c5b6ac3ce32ea95770d08e73679187001a3d96c85b04ee6285e343dee63","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-29-02:00","description":"","event_time":"2026-04-15-09:29","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:2e37862fb959bdf4c5d1b76b55878620c21e19dddfc6ffa9f2039e72f59e6ef9","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-01-27-19:09","description":"","event_time":"2026-04-15-09:30","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:f7c69c5b6ac3ce32ea95770d08e73679187001a3d96c85b04ee6285e343dee63","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-02-06-16:41","description":"","event_time":"2026-04-15-09:19","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-02-25-16:59","description":"","event_time":"2026-04-15-09:16","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:52","description":"","event_time":"2026-04-15-09:27","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/check-kdata-file-job-csa@sha256:6fdd71d0bd58e204615132fb5777623baa5ea9ff6fb00bc5207b5f5c3552945c","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-02-06-16:27","description":"","event_time":"2026-04-15-09:27","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/check-kdata-file-job-csa@sha256:6fdd71d0bd58e204615132fb5777623baa5ea9ff6fb00bc5207b5f5c3552945c","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-27-02:18","description":"","event_time":"2026-03-27-02:18","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-frontend@sha256:6e21c3ed85cc4b83a05a1fee34c45e7403bd8b9e9be299bf8f26a2d17b51fe8f","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-06-16:52","description":"","event_time":"2026-04-15-09:24","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:2e37862fb959bdf4c5d1b76b55878620c21e19dddfc6ffa9f2039e72f59e6ef9","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-01-27-19:08","description":"","event_time":"2026-04-15-09:14","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-02-13-17:07","description":"","event_time":"2026-04-15-09:27","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:f7c69c5b6ac3ce32ea95770d08e73679187001a3d96c85b04ee6285e343dee63","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-01-27-19:10","description":"","event_time":"2026-01-27-19:10","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend@sha256:fd3abce6e00310f35e9c6ad7c087e47764da472f9f30216c59bac52513078244","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:56","description":"","event_time":"2026-04-15-09:25","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-batch-schedul-csa@sha256:1d323f8aec21c74ee7ebc58376523f4f59992e9d3053a38a6fc2cf1737a861a6","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-06-17:11","description":"","event_time":"2026-03-06-17:11","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend@sha256:dbf4e3f02b2e525b1e33f0539ceeba3eb96bbf710659d654fa1bf8e0958c4268","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-14-02:28","description":"","event_time":"2026-04-15-09:12","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-01:45","description":"","event_time":"2026-04-15-01:45","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend@sha256:fd3abce6e00310f35e9c6ad7c087e47764da472f9f30216c59bac52513078244","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-01-01:49","description":"","event_time":"2026-04-15-09:22","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:55","description":"","event_time":"2026-04-15-09:22","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/check-kdata-file-job-csa@sha256:6fdd71d0bd58e204615132fb5777623baa5ea9ff6fb00bc5207b5f5c3552945c","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:53","description":"","event_time":"2026-04-15-09:14","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-master-schedule-csa@sha256:7e75643b78443f92aefbb2ae06fd084c073206d8ebaf51b0827d06709e96738e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-01-27-19:07","description":"","event_time":"2026-04-15-09:19","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:f7c69c5b6ac3ce32ea95770d08e73679187001a3d96c85b04ee6285e343dee63","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-10-05:12","description":"","event_time":"2026-04-15-09:16","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:2e37862fb959bdf4c5d1b76b55878620c21e19dddfc6ffa9f2039e72f59e6ef9","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-06-16:56","description":"","event_time":"2026-04-15-09:29","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:2e37862fb959bdf4c5d1b76b55878620c21e19dddfc6ffa9f2039e72f59e6ef9","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:55","description":"","event_time":"2026-04-15-09:10","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-batch-schedul-csa@sha256:1d323f8aec21c74ee7ebc58376523f4f59992e9d3053a38a6fc2cf1737a861a6","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-09-05:46","description":"","event_time":"2026-04-15-09:26","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-29-01:43","description":"","event_time":"2026-03-29-01:43","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend@sha256:fd3abce6e00310f35e9c6ad7c087e47764da472f9f30216c59bac52513078244","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-02-06-16:30","description":"","event_time":"2026-04-15-09:21","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:f7c69c5b6ac3ce32ea95770d08e73679187001a3d96c85b04ee6285e343dee63","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:55","description":"","event_time":"2026-04-15-09:27","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-batch-schedul-csa@sha256:1d323f8aec21c74ee7ebc58376523f4f59992e9d3053a38a6fc2cf1737a861a6","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:53","description":"","event_time":"2026-04-15-09:18","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-batch-schedul-csa@sha256:1d323f8aec21c74ee7ebc58376523f4f59992e9d3053a38a6fc2cf1737a861a6","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-17-01:39","description":"","event_time":"2026-04-15-09:23","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:2e37862fb959bdf4c5d1b76b55878620c21e19dddfc6ffa9f2039e72f59e6ef9","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-11-16:33","description":"","event_time":"2026-04-15-09:25","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:2e37862fb959bdf4c5d1b76b55878620c21e19dddfc6ffa9f2039e72f59e6ef9","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:54","description":"","event_time":"2026-04-15-09:20","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-batch-schedul-csa@sha256:1d323f8aec21c74ee7ebc58376523f4f59992e9d3053a38a6fc2cf1737a861a6","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:55","description":"","event_time":"2026-04-15-09:16","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-batch-schedul-csa@sha256:1d323f8aec21c74ee7ebc58376523f4f59992e9d3053a38a6fc2cf1737a861a6","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-02-13-17:15","description":"","event_time":"2026-04-15-09:20","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-master-schedule-csa@sha256:7e75643b78443f92aefbb2ae06fd084c073206d8ebaf51b0827d06709e96738e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-02-13-17:10","description":"","event_time":"2026-02-13-17:09","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend@sha256:fd3abce6e00310f35e9c6ad7c087e47764da472f9f30216c59bac52513078244","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:44","description":"","event_time":"2026-04-15-09:22","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:f7c69c5b6ac3ce32ea95770d08e73679187001a3d96c85b04ee6285e343dee63","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:51","description":"","event_time":"2026-04-15-09:19","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-master-schedule-csa@sha256:7e75643b78443f92aefbb2ae06fd084c073206d8ebaf51b0827d06709e96738e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-02-06-16:31","description":"","event_time":"2026-04-15-09:26","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:f7c69c5b6ac3ce32ea95770d08e73679187001a3d96c85b04ee6285e343dee63","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-02-25-17:06","description":"","event_time":"2026-04-15-09:26","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-01-27-18:56","description":"","event_time":"2026-04-15-09:31","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/check-kdata-file-job-csa@sha256:6fdd71d0bd58e204615132fb5777623baa5ea9ff6fb00bc5207b5f5c3552945c","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:55","description":"","event_time":"2026-04-15-09:27","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/check-kdata-file-job-csa@sha256:6fdd71d0bd58e204615132fb5777623baa5ea9ff6fb00bc5207b5f5c3552945c","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-27-01:58","description":"","event_time":"2026-03-27-01:58","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend@sha256:dbf4e3f02b2e525b1e33f0539ceeba3eb96bbf710659d654fa1bf8e0958c4268","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:55","description":"","event_time":"2026-04-15-09:28","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:51","description":"","event_time":"2026-04-15-09:21","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-batch-schedul-csa@sha256:1d323f8aec21c74ee7ebc58376523f4f59992e9d3053a38a6fc2cf1737a861a6","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-09-05:46","description":"","event_time":"2026-04-15-09:17","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-master-schedule-csa@sha256:7e75643b78443f92aefbb2ae06fd084c073206d8ebaf51b0827d06709e96738e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-02-06-16:08","description":"","event_time":"2026-04-15-09:16","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-batch-schedul-csa@sha256:1d323f8aec21c74ee7ebc58376523f4f59992e9d3053a38a6fc2cf1737a861a6","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:52","description":"","event_time":"2026-04-15-09:31","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:f7c69c5b6ac3ce32ea95770d08e73679187001a3d96c85b04ee6285e343dee63","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:56","description":"","event_time":"2026-04-15-09:12","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-02-18-16:03","description":"","event_time":"2026-04-15-09:31","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:55","description":"","event_time":"2026-04-15-09:23","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-batch-schedul-csa@sha256:1d323f8aec21c74ee7ebc58376523f4f59992e9d3053a38a6fc2cf1737a861a6","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:54","description":"","event_time":"2026-04-15-09:18","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-batch-schedul-csa@sha256:1d323f8aec21c74ee7ebc58376523f4f59992e9d3053a38a6fc2cf1737a861a6","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-14-01:37","description":"","event_time":"2026-04-15-09:25","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:f7c69c5b6ac3ce32ea95770d08e73679187001a3d96c85b04ee6285e343dee63","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-10-04:25","description":"","event_time":"2026-04-15-09:23","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-02-06-16:17","description":"","event_time":"2026-02-06-16:17","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend@sha256:fd3abce6e00310f35e9c6ad7c087e47764da472f9f30216c59bac52513078244","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:12","description":"","event_time":"2026-04-15-09:23","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-10-04:00","description":"","event_time":"2026-04-15-09:19","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/check-kdata-file-job-csa@sha256:6fdd71d0bd58e204615132fb5777623baa5ea9ff6fb00bc5207b5f5c3552945c","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-01:41","description":"","event_time":"2026-04-15-09:29","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-13-15:14","description":"","event_time":"2026-03-13-15:14","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend@sha256:fd3abce6e00310f35e9c6ad7c087e47764da472f9f30216c59bac52513078244","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:40","description":"","event_time":"2026-04-15-09:27","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:2e37862fb959bdf4c5d1b76b55878620c21e19dddfc6ffa9f2039e72f59e6ef9","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-01-01:22","description":"","event_time":"2026-04-15-09:30","instance_name":"projects/aide-416502/locations/asia-east1/repositories/genaius-prod/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:2e37862fb959bdf4c5d1b76b55878620c21e19dddfc6ffa9f2039e72f59e6ef9","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-01-15:54","description":"","event_time":"2026-04-15-09:28","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/aide-prod-create-batch-schedul-csa@sha256:1d323f8aec21c74ee7ebc58376523f4f59992e9d3053a38a6fc2cf1737a861a6","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-02-25-16:54","description":"","event_time":"2026-04-15-09:30","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/update-kdata-status-job@sha256:8291608f6b6ff255eb7404fd303900c7b085b116a03f7181e40f406776992d74","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-02-13-16:56","description":"","event_time":"2026-04-15-09:23","instance_name":"projects/aide-416502/locations/asia-east1/repositories/tplusaide/dockerImages/check-kdata-file-job-csa@sha256:6fdd71d0bd58e204615132fb5777623baa5ea9ff6fb00bc5207b5f5c3552945c","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"}]},"asr-appl-t":{"OPEN_FIREWALL":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-04:55","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-04:55","instance_name":"default-allow-health-check-ipv6","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-04:55","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-04:55","instance_name":"default-allow-http","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"}],"OPEN_HTTP_PORT":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-04:55","description":"Block incoming connections on TCP port 80 from all IP addresses to help prevent undesired traffic and attacks on HTTP services.","event_time":"2026-03-20-04:55","instance_name":"default-allow-http","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"}],"OPEN_RDP_PORT":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-04:55","description":"Block incoming connections on TCP port 3389 or UDP port 3389 from all IP addresses to help prevent undesired traffic and attacks on RDP server.","event_time":"2026-03-20-04:55","instance_name":"default-allow-rdp","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"}],"OPEN_SSH_PORT":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-04:55","description":"Block incoming connections on TCP port 22 or SCTP port 22 from all IP addresses to help prevent undesired traffic and attacks on SSH server.","event_time":"2026-03-20-04:55","instance_name":"default-allow-ssh","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"}],"PUBLIC_IP_ADDRESS":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-22-08:57","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-26-10:18","instance_name":"asr-web","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-05:01","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-04:55","instance_name":"ai-portal-league","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"}]},"brandportal-poc":{"OPEN_FIREWALL":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-06:45","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-06:44","instance_name":"default-allow-http","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"}],"OPEN_HTTP_PORT":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-06:46","description":"Block incoming connections on TCP port 80 from all IP addresses to help prevent undesired traffic and attacks on HTTP services.","event_time":"2026-03-20-06:44","instance_name":"default-allow-http","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"}],"PUBLIC_BUCKET_ACL":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-14-15:37","description":"This bucket is public and can be accessed by anyone on the Internet. \"allUsers\" represents anyone on the Internet, and \"allAuthenticatedUsers\" represents anyone who is authenticated with a Google account; neither is constrained to users within your organization.","event_time":"2026-04-14-03:06","instance_name":"twmbcp.com","instance_type":"google.cloud.storage.Bucket","resource_url":"https://console.cloud.google.com/storage/browser/twmbcp.com;tab=permissions","scan_tool":"Security Command Center"}],"PUBLIC_IP_ADDRESS":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-06:45","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-06:44","instance_name":"instance-1","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"}]},"bronci-c":{"OPEN_FIREWALL":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-04:56","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-04:56","instance_name":"default-allow-health-check","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-05:00","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-04:56","instance_name":"default-allow-http","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-04:56","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-04:56","instance_name":"default-allow-health-check-ipv6","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"}],"OPEN_HTTP_PORT":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-04:59","description":"Block incoming connections on TCP port 80 from all IP addresses to help prevent undesired traffic and attacks on HTTP services.","event_time":"2026-03-20-04:56","instance_name":"default-allow-http","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"}],"OPEN_RDP_PORT":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-04:56","description":"Block incoming connections on TCP port 3389 or UDP port 3389 from all IP addresses to help prevent undesired traffic and attacks on RDP server.","event_time":"2026-03-20-04:56","instance_name":"default-allow-rdp","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"}],"OPEN_SSH_PORT":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-04:56","description":"Block incoming connections on TCP port 22 or SCTP port 22 from all IP addresses to help prevent undesired traffic and attacks on SSH server.","event_time":"2026-03-20-04:56","instance_name":"default-allow-ssh","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"}]},"bronci-poc":{"OPEN_FIREWALL":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-11:41","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-11:41","instance_name":"rick-twcc-monitor","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-11:41","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-11:41","instance_name":"bronci-poc-peering-allow-health-check","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-11:41","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-11:41","instance_name":"default-allow-health-check","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-11:41","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-11:41","instance_name":"default-allow-health-check-ipv6","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-11:41","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-11:41","instance_name":"allow-b3-model-7443","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-11:41","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-11:41","instance_name":"vpn-indo","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-12:04","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-11:46","instance_name":"twcc-asr-in-bound","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-12:05","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-11:46","instance_name":"bronci-poc-peering-allow-health-check-ipv6","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-11:41","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-11:41","instance_name":"default-allow-http","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"}],"OPEN_HTTP_PORT":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-12:05","description":"Block incoming connections on TCP port 80 from all IP addresses to help prevent undesired traffic and attacks on HTTP services.","event_time":"2026-03-20-11:46","instance_name":"default-allow-http","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"}],"OPEN_RDP_PORT":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-12:03","description":"Block incoming connections on TCP port 3389 or UDP port 3389 from all IP addresses to help prevent undesired traffic and attacks on RDP server.","event_time":"2026-03-20-11:46","instance_name":"default-allow-rdp","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"}],"PUBLIC_IP_ADDRESS":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-04:05","description":"To reduce the attack surface, avoid assigning public IP addresses to your VMs. Stopped instances may still be flagged with a Public IP finding, e.g. if the network interfaces are configured to assign an ephemeral public IP on start. Ensure the network configurations for stopped instances do not include external access.","event_time":"2026-04-15-04:05","instance_name":"mplus-meet-whisper","instance_type":"google.compute.Instance","resource_url":"https://console.cloud.google.com/compute/instancesDetail/zones/asia-east1-c/instances/mplus-meet-whisper?project=bronci-poc","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-10-16:39","description":"To reduce the attack surface, avoid assigning public IP addresses to your VMs. Stopped instances may still be flagged with a Public IP finding, e.g. if the network interfaces are configured to assign an ephemeral public IP on start. Ensure the network configurations for stopped instances do not include external access.","event_time":"2026-03-16-09:36","instance_name":"votextai-prod-app","instance_type":"google.compute.Instance","resource_url":"https://console.cloud.google.com/compute/instancesDetail/zones/asia-east1-c/instances/votextai-prod-app?project=bronci-poc","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-07-09:26","description":"To reduce the attack surface, avoid assigning public IP addresses to your VMs. Stopped instances may still be flagged with a Public IP finding, e.g. if the network interfaces are configured to assign an ephemeral public IP on start. Ensure the network configurations for stopped instances do not include external access.","event_time":"2026-04-08-06:15","instance_name":"bronci-poc","instance_type":"google.compute.Instance","resource_url":"https://console.cloud.google.com/compute/instancesDetail/zones/asia-east1-c/instances/bronci-poc?project=bronci-poc","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-19-01:36","description":"To reduce the attack surface, avoid assigning public IP addresses to your VMs. Stopped instances may still be flagged with a Public IP finding, e.g. if the network interfaces are configured to assign an ephemeral public IP on start. Ensure the network configurations for stopped instances do not include external access.","event_time":"2026-03-19-03:46","instance_name":"instance-20260319-013226","instance_type":"google.compute.Instance","resource_url":"https://console.cloud.google.com/compute/instancesDetail/zones/asia-east1-c/instances/ent-20260317?project=bronci-poc","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-05-03:20","description":"To reduce the attack surface, avoid assigning public IP addresses to your VMs. Stopped instances may still be flagged with a Public IP finding, e.g. if the network interfaces are configured to assign an ephemeral public IP on start. Ensure the network configurations for stopped instances do not include external access.","event_time":"2026-03-20-02:54","instance_name":"test","instance_type":"google.compute.Instance","resource_url":"https://console.cloud.google.com/compute/instancesDetail/zones/asia-east1-a/instances/asr-deploy-package?project=bronci-poc","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-07-03:44","description":"To reduce the attack surface, avoid assigning public IP addresses to your VMs. Stopped instances may still be flagged with a Public IP finding, e.g. if the network interfaces are configured to assign an ephemeral public IP on start. Ensure the network configurations for stopped instances do not include external access.","event_time":"2026-04-07-06:36","instance_name":"gce-monitoring","instance_type":"google.compute.Instance","resource_url":"https://console.cloud.google.com/compute/instancesDetail/zones/asia-east1-c/instances/gce-monitoring?project=bronci-poc","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-16-14:21","description":"To reduce the attack surface, avoid assigning public IP addresses to your VMs. Stopped instances may still be flagged with a Public IP finding, e.g. if the network interfaces are configured to assign an ephemeral public IP on start. Ensure the network configurations for stopped instances do not include external access.","event_time":"2026-03-17-01:49","instance_name":"test-twm","instance_type":"google.compute.Instance","resource_url":"https://console.cloud.google.com/compute/instancesDetail/zones/asia-east1-c/instances/twm-staff-20260316?project=bronci-poc","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-25-02:24","description":"To reduce the attack surface, avoid assigning public IP addresses to your VMs. Stopped instances may still be flagged with a Public IP finding, e.g. if the network interfaces are configured to assign an ephemeral public IP on start. Ensure the network configurations for stopped instances do not include external access.","event_time":"2026-03-25-02:24","instance_name":"asr-dictionary-api-20260325-021634","instance_type":"google.compute.Instance","resource_url":"https://console.cloud.google.com/compute/instancesDetail/zones/asia-east1-c/instances/asr-dictionary-api-20260325-021634?project=bronci-poc","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-10-16:43","description":"To reduce the attack surface, avoid assigning public IP addresses to your VMs. Stopped instances may still be flagged with a Public IP finding, e.g. if the network interfaces are configured to assign an ephemeral public IP on start. Ensure the network configurations for stopped instances do not include external access.","event_time":"2026-04-06-19:03","instance_name":"bronci-meeting-twm-prod","instance_type":"google.compute.Instance","resource_url":"https://console.cloud.google.com/compute/instancesDetail/zones/asia-east1-c/instances/votextai-prod-process?project=bronci-poc","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-12:05","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-11:46","instance_name":"bronci-tts","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-11:42","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-11:42","instance_name":"llm--error-correction","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-11:42","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-11:42","instance_name":"asr-dictionary-staging","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-12:06","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-28-04:59","instance_name":"twm-staff-20260316","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-11:42","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-11:42","instance_name":"asr-system-backend","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-07-13:03","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-04-07-13:03","instance_name":"bronci-poc","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-11:42","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-11:42","instance_name":"ai-mplus2-genaius-fubon-demo-20250918","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-11:42","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-11:42","instance_name":"votextai-mover","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-11:42","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-11:42","instance_name":"prometheus-poc","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-11:41","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-11:41","instance_name":"bronci-meeting-nfs","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-28-04:59","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-28-04:59","instance_name":"asr-dictionary-api-20260325-021634","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-11:42","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-11:42","instance_name":"votextai-prod-app","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-12:06","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-11:42","instance_name":"bronci-meeting","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-07-13:03","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-04-07-13:03","instance_name":"gce-monitoring","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-12:06","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-11:42","instance_name":"bronci-meeting-poc-to-b-20250424","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-28-04:59","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-28-04:59","instance_name":"asr-deploy-package","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-11:42","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-11:42","instance_name":"chris-bot-poc","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-11:42","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-11:42","instance_name":"asr-dictionary","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-12:06","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-11:42","instance_name":"bronci-meeting-twm-mplus-meet-prod-20250430","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-11:42","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-11:42","instance_name":"monitor-prometheus","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-28-04:59","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-28-04:59","instance_name":"votextai-prod-process","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-11:42","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-11:42","instance_name":"asr-b3-ai-coach-poc","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-28-04:59","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-28-04:59","instance_name":"ent-20260317","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"}],"SSL_NOT_ENFORCED":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-11:41","description":"Use SSL for all incoming connections to your SQL database instance to secure data in transit. This control doesn't apply to on-premises databases or external instances.","event_time":"2026-03-20-11:41","instance_name":"meetingrecord-dev","instance_type":"google.cloud.sql.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-12:04","description":"Use SSL for all incoming connections to your SQL database instance to secure data in transit. This control doesn't apply to on-premises databases or external instances.","event_time":"2026-03-20-11:46","instance_name":"meetingrecord-prod","instance_type":"google.cloud.sql.Instance","resource_url":"","scan_tool":"Security Command Center"}]},"ccs-dialer":{"OPEN_FIREWALL":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:26","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-03:25","instance_name":"allow-ccs-local-fg-public227","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:25","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-03:25","instance_name":"allow-ccs-local-fg-public","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"}],"PUBLIC_IP_ADDRESS":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:25","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-03:25","instance_name":"gcppbxdialer01","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:25","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-03:25","instance_name":"gcppbxdialer02","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"}]},"cloudmonitor-384201":{"OPEN_FIREWALL":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-16-08:14","description":"Firewall rules that allow connections from all IP addresses or on all ports may expose resources to attackers.","event_time":"2026-03-16-08:14","instance_name":"allow-twm-scan","instance_type":"google.compute.Firewall","resource_url":"https://console.cloud.google.com/networking/firewalls/details/allow-twm-scan?project=cloudmonitor-384201","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-12:06","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-28-04:59","instance_name":"allow-twm-scan","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"}],"PUBLIC_IP_ADDRESS":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-11:42","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-11:42","instance_name":"cloudmonitor","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"}]},"cm-ds-dialer":{"OPEN_FIREWALL":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-21-03:52","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-21-03:52","instance_name":"allow-ccs-fortinet-vpn","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-21-03:53","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-21-03:52","instance_name":"allow-twm-hostscan","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"}],"PUBLIC_BUCKET_ACL":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-14-17:07","description":"Anyone on the internet can change the IAM policy of this bucket, as well as edit and read its content. \"allUsers\" represents anyone on the Internet, and \"allAuthenticatedUsers\" represents anyone who is authenticated with a Google account; neither is constrained to users within your organization.","event_time":"2026-04-14-03:06","instance_name":"gce-backup","instance_type":"google.cloud.storage.Bucket","resource_url":"https://console.cloud.google.com/storage/browser/gce-backup;tab=permissions","scan_tool":"Security Command Center"}],"PUBLIC_IP_ADDRESS":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-21-03:53","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-21-03:52","instance_name":"gcppbxdialer03","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"}],"SSL_NOT_ENFORCED":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-21-03:52","description":"Use SSL for all incoming connections to your SQL database instance to secure data in transit. This control doesn't apply to on-premises databases or external instances.","event_time":"2026-03-21-03:52","instance_name":"cloudsqlapdialer02","instance_type":"google.cloud.sql.Instance","resource_url":"","scan_tool":"Security Command Center"}]},"cm-fs-dialer":{"OPEN_FIREWALL":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-06:19","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-06:11","instance_name":"allow-twm-hostscan","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-06:17","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-06:11","instance_name":"allow-ccs-fortinet-vpn","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"}],"PUBLIC_IP_ADDRESS":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-06:19","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-06:11","instance_name":"gcppbxdialer04","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"}],"SSL_NOT_ENFORCED":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-06:13","description":"Use SSL for all incoming connections to your SQL database instance to secure data in transit. This control doesn't apply to on-premises databases or external instances.","event_time":"2026-03-20-06:11","instance_name":"cloudsqlapdialer03","instance_type":"google.cloud.sql.Instance","resource_url":"","scan_tool":"Security Command Center"}]},"cos-399102":{"OPEN_FIREWALL":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-04:53","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-04:53","instance_name":"allow-twm-hostscan","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"}],"PUBLIC_IP_ADDRESS":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-04:53","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-04:53","instance_name":"gcp-cosomu01","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"}]},"cos-p-427009":{"OPEN_FIREWALL":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-23:14","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-21:53","instance_name":"allow-twm-hostscan","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"}],"PUBLIC_IP_ADDRESS":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-23:05","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-21:53","instance_name":"gcp-cosomp01","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"}]},"dacs-390408":{"OPEN_FIREWALL":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-11:42","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-11:42","instance_name":"allow-twm-scan","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"}],"PUBLIC_IP_ADDRESS":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-11:42","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-11:42","instance_name":"dacsomp01","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"}]},"dat-t-377202":{"CONTAINER_IMAGE_VULNERABILITY":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-29-01:56","description":"","event_time":"2026-04-15-04:16","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/twmdat-biqs-job-sit/dockerImages/biqs-job-sit@sha256:a58b4dade6da11949a8be29b91f7a17bd0a70dc23528aff1b685701e3fc6ea71","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-01:50","description":"","event_time":"2026-04-15-09:20","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:80ec88f754dce4d83b2bd51a8ae17d55a9222b68ac9dc318421a384b0d440421","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-01:53","description":"","event_time":"2026-04-15-09:13","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:ec0557f5cf66cce6ec6b0d9fc132ff21e7c066f929707466ffc122a8e718fe5e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:30","description":"","event_time":"2026-04-15-09:28","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/upload-kdata-file-job@sha256:42ecb8f676795dc842637735324aff920c7826e836d3188b21f57db10d1deec9","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-14-02:38","description":"","event_time":"2026-04-14-02:38","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/twmdat-biqs/dockerImages/twmdat-biqs-uat@sha256:93bc03c40ddbf4f2b5cdc93776e0a7b7fb65df738d59409a29071ff45c4f5cdd","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-11-02:11","description":"","event_time":"2026-04-11-02:11","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-frontend@sha256:4d6e7706a71b512ad3ca857cebaed1bb8dec98f833219ce6e2620037d4a42f38","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:51","description":"","event_time":"2026-04-15-09:16","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:c4ba8037b943f0a28b1ac50783b64eb64ccaec7dd88dd10c71d102a70e7130c8","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-14-02:18","description":"","event_time":"2026-04-14-02:18","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/twmdat-biqs/dockerImages/twmdat-biqs-api-uat@sha256:4fb8c6eca605e24d64291259cbd8a50b17592dd23ad14b38c597e1009a8e805e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:45","description":"","event_time":"2026-04-12-02:45","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-3-backend-local-k8s@sha256:19c79d835dbbfd6acc874336267bd61a0a476fcecd088a0d60c7f962658b7693","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:17","description":"","event_time":"2026-04-12-02:17","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-3-gateway-local-k8s@sha256:8b9bd7301112d8d90df1dfad67f95091ec254849f266547c8c250f25a2d2201d","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-03-02:29","description":"","event_time":"2026-04-03-02:29","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/twmdat-biqs/dockerImages/twmdat-biqs-uat@sha256:93bc03c40ddbf4f2b5cdc93776e0a7b7fb65df738d59409a29071ff45c4f5cdd","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-03-01:56","description":"","event_time":"2026-04-03-01:56","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/twmdat-biqs/dockerImages/twmdat-biqs-sit@sha256:550cfbe17d280b17e296da939353764231f46d49fa92de364ff7bc7a81465699","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:35","description":"","event_time":"2026-04-12-02:35","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-3-backend-local-k8s@sha256:19c79d835dbbfd6acc874336267bd61a0a476fcecd088a0d60c7f962658b7693","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-14-02:21","description":"","event_time":"2026-04-14-02:21","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/twmdat-biqs/dockerImages/twmdat-biqs-sit@sha256:550cfbe17d280b17e296da939353764231f46d49fa92de364ff7bc7a81465699","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-08-02:40","description":"","event_time":"2026-04-15-09:16","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/upload-kdata-file-job@sha256:42ecb8f676795dc842637735324aff920c7826e836d3188b21f57db10d1deec9","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:39","description":"","event_time":"2026-04-15-09:17","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/check-kdata-file-job@sha256:7facaa3230a6add85e830a626ec5b2561a84d0efd3c14598da347c1b5cd36508","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-02-02:25","description":"","event_time":"2026-04-14-16:24","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/crawler-stocks/dockerImages/crawler-stocks@sha256:50b1784d50cf5ee3c1c8850ed3a76fd2c17ac488b51708f2fd4665ed53514798","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:38","description":"","event_time":"2026-04-15-09:21","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/check-kdata-file-job@sha256:7facaa3230a6add85e830a626ec5b2561a84d0efd3c14598da347c1b5cd36508","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-02-02:41","description":"","event_time":"2026-04-15-09:12","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/update-kdata-status-job@sha256:a425365302115ba5304e038aab5a1095b8523945798b8ef04183c8cd4bb6bb8d","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-26-04:14","description":"","event_time":"2026-03-26-04:14","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/cloud-run-source-deploy/dockerImages/function-twm-tamedia-invoices-exchange-v2@sha256:4b00f3774bfc181299959e7476071ae2e625093b32d113b824c00918a42808b4","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-10-03:51","description":"","event_time":"2026-04-15-09:21","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/check-kdata-file-job@sha256:7facaa3230a6add85e830a626ec5b2561a84d0efd3c14598da347c1b5cd36508","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-05-01:45","description":"","event_time":"2026-04-15-09:27","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/update-kdata-status-job@sha256:a425365302115ba5304e038aab5a1095b8523945798b8ef04183c8cd4bb6bb8d","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-29-01:45","description":"","event_time":"2026-04-15-04:16","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/twmdat-biqs-job-sit/dockerImages/biqs-job-sit@sha256:a58b4dade6da11949a8be29b91f7a17bd0a70dc23528aff1b685701e3fc6ea71","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-11-02:03","description":"","event_time":"2026-04-15-09:17","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/upload-kdata-file-job@sha256:42ecb8f676795dc842637735324aff920c7826e836d3188b21f57db10d1deec9","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-19-01:37","description":"","event_time":"2026-04-15-09:15","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/create-batch-schedule@sha256:7bd798d7938c93a85b5c6632a0325a09b4524fd5f6b940a3b8335e1ca526f3a5","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-14-02:30","description":"","event_time":"2026-04-15-09:22","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/upload-kdata-file-job@sha256:42ecb8f676795dc842637735324aff920c7826e836d3188b21f57db10d1deec9","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-01:48","description":"","event_time":"2026-04-15-01:48","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/aide-backend-provider-uat-littlemy@sha256:c4e1bf90de3a0199356a6fcadb934e20f50515130f2a273f482f06bc1033f32c","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:05","description":"","event_time":"2026-04-15-09:16","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:c4ba8037b943f0a28b1ac50783b64eb64ccaec7dd88dd10c71d102a70e7130c8","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:39","description":"","event_time":"2026-04-12-02:39","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-frontend@sha256:4660b396a8671c3a59af67f7055afc6fb27fa75e99e4b0e49d3a70146266b3ae","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:28","description":"","event_time":"2026-04-15-09:18","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:366048eadf49f907a1d8770e367a0485a1a7a6d7e072b106ae7556b275f313f3","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-01:53","description":"","event_time":"2026-04-15-09:15","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/aide-backend-uat-littlemy@sha256:48d40dd9839ec8a54edb9b94be6af3d14f89e5f5b2f16e64085837c5970ed89e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-14-02:43","description":"","event_time":"2026-04-14-02:43","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/twmdat-biqs/dockerImages/twmdat-biqs-api-sit@sha256:4fb8c6eca605e24d64291259cbd8a50b17592dd23ad14b38c597e1009a8e805e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-03-02:01","description":"","event_time":"2026-04-03-02:01","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-frontend@sha256:341e489dd450b8ac5fc72a1afd58ac2405c5f29561c48962c4ff549362f2c37a","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-10-04:30","description":"","event_time":"2026-04-15-09:19","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:366048eadf49f907a1d8770e367a0485a1a7a6d7e072b106ae7556b275f313f3","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-09-02:33","description":"","event_time":"2026-04-15-09:21","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/update-kdata-status-job@sha256:a425365302115ba5304e038aab5a1095b8523945798b8ef04183c8cd4bb6bb8d","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-09-03:57","description":"","event_time":"2026-04-15-09:26","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/check-kdata-file-job@sha256:7facaa3230a6add85e830a626ec5b2561a84d0efd3c14598da347c1b5cd36508","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-02-02:21","description":"","event_time":"2026-04-14-16:26","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/crawler-stocks/dockerImages/crawler-stocks@sha256:50b1784d50cf5ee3c1c8850ed3a76fd2c17ac488b51708f2fd4665ed53514798","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-02-02:19","description":"","event_time":"2026-04-14-16:26","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/crawler-stocks/dockerImages/crawler-stocks@sha256:50b1784d50cf5ee3c1c8850ed3a76fd2c17ac488b51708f2fd4665ed53514798","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-02-02:27","description":"","event_time":"2026-04-14-16:30","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/crawler-stocks/dockerImages/crawler-stocks@sha256:50b1784d50cf5ee3c1c8850ed3a76fd2c17ac488b51708f2fd4665ed53514798","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-01:56","description":"","event_time":"2026-04-15-01:56","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/aide-backend-provider-uat-littlemy@sha256:c4e1bf90de3a0199356a6fcadb934e20f50515130f2a273f482f06bc1033f32c","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:53","description":"","event_time":"2026-04-15-09:29","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:80ec88f754dce4d83b2bd51a8ae17d55a9222b68ac9dc318421a384b0d440421","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:07","description":"","event_time":"2026-04-15-09:14","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/aide-backend-uat-littlemy@sha256:48d40dd9839ec8a54edb9b94be6af3d14f89e5f5b2f16e64085837c5970ed89e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:22","description":"","event_time":"2026-04-15-09:27","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/aide-backend-uat-littlemy@sha256:48d40dd9839ec8a54edb9b94be6af3d14f89e5f5b2f16e64085837c5970ed89e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-14-02:25","description":"","event_time":"2026-04-14-02:25","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/cloud-run-source-deploy/dockerImages/genaius3-test-call-backend@sha256:f6b4003689d8bea74948dcbb297ab0e813fa7dba375c293d564cbefce1995615","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:38","description":"","event_time":"2026-04-12-02:38","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-3-gateway-local-k8s@sha256:8b9bd7301112d8d90df1dfad67f95091ec254849f266547c8c250f25a2d2201d","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:33","description":"","event_time":"2026-04-12-02:33","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-frontend@sha256:341e489dd450b8ac5fc72a1afd58ac2405c5f29561c48962c4ff549362f2c37a","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-01:41","description":"","event_time":"2026-04-15-09:22","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/aide-backend-uat-littlemy@sha256:48d40dd9839ec8a54edb9b94be6af3d14f89e5f5b2f16e64085837c5970ed89e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:37","description":"","event_time":"2026-04-15-09:29","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/create-master-schedule@sha256:cad50a37e82192dec187d804fd590208567165d105865358571c18ff28e06c7f","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-02-02:57","description":"","event_time":"2026-04-14-16:28","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/crawler-stocks/dockerImages/crawler-stocks@sha256:50b1784d50cf5ee3c1c8850ed3a76fd2c17ac488b51708f2fd4665ed53514798","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:33","description":"","event_time":"2026-04-15-09:22","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/check-kdata-file-job@sha256:7facaa3230a6add85e830a626ec5b2561a84d0efd3c14598da347c1b5cd36508","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-29-01:38","description":"","event_time":"2026-04-15-09:29","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/create-master-schedule@sha256:cad50a37e82192dec187d804fd590208567165d105865358571c18ff28e06c7f","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-02-03:12","description":"","event_time":"2026-04-14-16:23","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/crawler-stocks/dockerImages/crawler-stocks@sha256:50b1784d50cf5ee3c1c8850ed3a76fd2c17ac488b51708f2fd4665ed53514798","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-09-03:53","description":"","event_time":"2026-04-15-09:29","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/upload-kdata-file-job@sha256:42ecb8f676795dc842637735324aff920c7826e836d3188b21f57db10d1deec9","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-22-01:24","description":"","event_time":"2026-03-22-01:24","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-frontend@sha256:341e489dd450b8ac5fc72a1afd58ac2405c5f29561c48962c4ff549362f2c37a","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-10-05:10","description":"","event_time":"2026-04-15-09:22","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:80ec88f754dce4d83b2bd51a8ae17d55a9222b68ac9dc318421a384b0d440421","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:19","description":"","event_time":"2026-04-15-02:19","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/cloud-run-source-deploy/dockerImages/genaius3-test-call-backend@sha256:f6b4003689d8bea74948dcbb297ab0e813fa7dba375c293d564cbefce1995615","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:00","description":"","event_time":"2026-04-15-09:17","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/aide-backend-uat-littlemy@sha256:48d40dd9839ec8a54edb9b94be6af3d14f89e5f5b2f16e64085837c5970ed89e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-14-02:37","description":"","event_time":"2026-04-14-02:37","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-frontend@sha256:341e489dd450b8ac5fc72a1afd58ac2405c5f29561c48962c4ff549362f2c37a","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-02-02:42","description":"","event_time":"2026-04-15-09:12","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/check-kdata-file-job@sha256:7facaa3230a6add85e830a626ec5b2561a84d0efd3c14598da347c1b5cd36508","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:52","description":"","event_time":"2026-04-15-09:26","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:366048eadf49f907a1d8770e367a0485a1a7a6d7e072b106ae7556b275f313f3","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-10-04:07","description":"","event_time":"2026-04-15-09:26","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:c4ba8037b943f0a28b1ac50783b64eb64ccaec7dd88dd10c71d102a70e7130c8","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:45","description":"","event_time":"2026-04-15-09:12","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:80ec88f754dce4d83b2bd51a8ae17d55a9222b68ac9dc318421a384b0d440421","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-28-01:55","description":"","event_time":"2026-04-15-09:11","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/check-kdata-file-job@sha256:7facaa3230a6add85e830a626ec5b2561a84d0efd3c14598da347c1b5cd36508","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-03-02:01","description":"","event_time":"2026-04-03-02:01","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/twmdat-biqs/dockerImages/twmdat-biqs-api-sit@sha256:4fb8c6eca605e24d64291259cbd8a50b17592dd23ad14b38c597e1009a8e805e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-09-04:28","description":"","event_time":"2026-04-15-09:21","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/update-kdata-status-job@sha256:a425365302115ba5304e038aab5a1095b8523945798b8ef04183c8cd4bb6bb8d","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-02-02:52","description":"","event_time":"2026-04-14-16:26","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/crawler-stocks/dockerImages/crawler-stocks@sha256:50b1784d50cf5ee3c1c8850ed3a76fd2c17ac488b51708f2fd4665ed53514798","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:53","description":"","event_time":"2026-04-15-09:15","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:c4ba8037b943f0a28b1ac50783b64eb64ccaec7dd88dd10c71d102a70e7130c8","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-14-02:29","description":"","event_time":"2026-04-15-09:29","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/create-master-schedule@sha256:cad50a37e82192dec187d804fd590208567165d105865358571c18ff28e06c7f","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:10","description":"","event_time":"2026-04-15-09:28","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/aide-backend-uat-littlemy@sha256:48d40dd9839ec8a54edb9b94be6af3d14f89e5f5b2f16e64085837c5970ed89e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:32","description":"","event_time":"2026-04-15-09:16","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/aide-backend-uat-littlemy@sha256:48d40dd9839ec8a54edb9b94be6af3d14f89e5f5b2f16e64085837c5970ed89e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-14-02:33","description":"","event_time":"2026-04-14-02:33","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/twmdat-biqs/dockerImages/twmdat-biqs-api-uat@sha256:4fb8c6eca605e24d64291259cbd8a50b17592dd23ad14b38c597e1009a8e805e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-29-01:54","description":"","event_time":"2026-04-15-09:19","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:80ec88f754dce4d83b2bd51a8ae17d55a9222b68ac9dc318421a384b0d440421","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-19-01:45","description":"","event_time":"2026-03-19-01:45","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/aide-backend-uat-littlemy@sha256:0863b849fca862bec39c61b6809f0b38fcc02723caa7d1c1181f494c06c4130a","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-14-02:17","description":"","event_time":"2026-04-14-02:17","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/twmdat-biqs/dockerImages/twmdat-biqs-api-uat@sha256:4fb8c6eca605e24d64291259cbd8a50b17592dd23ad14b38c597e1009a8e805e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:09","description":"","event_time":"2026-04-15-02:09","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/aide-backend-provider-uat-littlemy@sha256:c4e1bf90de3a0199356a6fcadb934e20f50515130f2a273f482f06bc1033f32c","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-03-02:12","description":"","event_time":"2026-04-03-02:12","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/twmdat-biqs/dockerImages/twmdat-biqs-api-sit@sha256:4fb8c6eca605e24d64291259cbd8a50b17592dd23ad14b38c597e1009a8e805e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-03-02:00","description":"","event_time":"2026-04-03-02:00","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/twmdat-biqs/dockerImages/twmdat-biqs-sit@sha256:550cfbe17d280b17e296da939353764231f46d49fa92de364ff7bc7a81465699","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-11-01:41","description":"","event_time":"2026-04-11-01:41","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-frontend@sha256:341e489dd450b8ac5fc72a1afd58ac2405c5f29561c48962c4ff549362f2c37a","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:45","description":"","event_time":"2026-04-12-02:45","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/cloud-run-source-deploy/dockerImages/twm-tamedia-invoices-exchange@sha256:462e7237212221808da30a618b497b01f89415f237737fe901920a557802bd66","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-26-03:33","description":"","event_time":"2026-03-26-03:33","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/twmdat-biqs/dockerImages/twmdat-biqs-api-uat@sha256:4fb8c6eca605e24d64291259cbd8a50b17592dd23ad14b38c597e1009a8e805e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-01:59","description":"","event_time":"2026-04-15-09:30","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:80ec88f754dce4d83b2bd51a8ae17d55a9222b68ac9dc318421a384b0d440421","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:20","description":"","event_time":"2026-04-15-09:32","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/create-batch-schedule@sha256:7bd798d7938c93a85b5c6632a0325a09b4524fd5f6b940a3b8335e1ca526f3a5","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:49","description":"","event_time":"2026-04-15-09:15","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/upload-kdata-file-job@sha256:42ecb8f676795dc842637735324aff920c7826e836d3188b21f57db10d1deec9","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-10-03:53","description":"","event_time":"2026-04-15-09:16","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/create-batch-schedule@sha256:7bd798d7938c93a85b5c6632a0325a09b4524fd5f6b940a3b8335e1ca526f3a5","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:44","description":"","event_time":"2026-04-12-02:44","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-frontend@sha256:4d6e7706a71b512ad3ca857cebaed1bb8dec98f833219ce6e2620037d4a42f38","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-26-03:38","description":"","event_time":"2026-03-26-03:38","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/twmdat-biqs/dockerImages/twmdat-biqs-api-uat@sha256:4fb8c6eca605e24d64291259cbd8a50b17592dd23ad14b38c597e1009a8e805e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-09-05:40","description":"","event_time":"2026-04-15-09:28","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/update-kdata-status-job@sha256:a425365302115ba5304e038aab5a1095b8523945798b8ef04183c8cd4bb6bb8d","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-01:45","description":"","event_time":"2026-04-15-09:28","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/aide-backend-uat-littlemy@sha256:48d40dd9839ec8a54edb9b94be6af3d14f89e5f5b2f16e64085837c5970ed89e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:44","description":"","event_time":"2026-04-12-02:44","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-frontend@sha256:4d6e7706a71b512ad3ca857cebaed1bb8dec98f833219ce6e2620037d4a42f38","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-28-01:36","description":"","event_time":"2026-04-15-09:19","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/upload-kdata-file-job@sha256:42ecb8f676795dc842637735324aff920c7826e836d3188b21f57db10d1deec9","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-19-02:02","description":"","event_time":"2026-04-15-09:28","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:c4ba8037b943f0a28b1ac50783b64eb64ccaec7dd88dd10c71d102a70e7130c8","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-04-02:20","description":"","event_time":"2026-04-15-09:28","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:c4ba8037b943f0a28b1ac50783b64eb64ccaec7dd88dd10c71d102a70e7130c8","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-10-05:15","description":"","event_time":"2026-04-15-09:28","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:ec0557f5cf66cce6ec6b0d9fc132ff21e7c066f929707466ffc122a8e718fe5e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-26-04:20","description":"","event_time":"2026-03-26-04:20","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/twmdat-biqs/dockerImages/twmdat-biqs-api-uat@sha256:4fb8c6eca605e24d64291259cbd8a50b17592dd23ad14b38c597e1009a8e805e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-03-02:15","description":"","event_time":"2026-04-03-02:15","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/twmdat-biqs/dockerImages/twmdat-biqs-api-sit@sha256:4fb8c6eca605e24d64291259cbd8a50b17592dd23ad14b38c597e1009a8e805e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:38","description":"","event_time":"2026-04-15-09:21","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:80ec88f754dce4d83b2bd51a8ae17d55a9222b68ac9dc318421a384b0d440421","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-02-02:50","description":"","event_time":"2026-04-14-16:28","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/crawler-stocks/dockerImages/crawler-stocks@sha256:50b1784d50cf5ee3c1c8850ed3a76fd2c17ac488b51708f2fd4665ed53514798","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-14-02:26","description":"","event_time":"2026-04-14-02:26","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-frontend@sha256:4d6e7706a71b512ad3ca857cebaed1bb8dec98f833219ce6e2620037d4a42f38","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-02-03:05","description":"","event_time":"2026-04-14-16:24","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/crawler-stocks/dockerImages/crawler-stocks@sha256:50b1784d50cf5ee3c1c8850ed3a76fd2c17ac488b51708f2fd4665ed53514798","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-02-03:01","description":"","event_time":"2026-04-14-16:23","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/crawler-stocks/dockerImages/crawler-stocks@sha256:50b1784d50cf5ee3c1c8850ed3a76fd2c17ac488b51708f2fd4665ed53514798","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-05-01:38","description":"","event_time":"2026-04-15-09:18","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:366048eadf49f907a1d8770e367a0485a1a7a6d7e072b106ae7556b275f313f3","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:30","description":"","event_time":"2026-04-15-09:22","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/update-kdata-status-job@sha256:a425365302115ba5304e038aab5a1095b8523945798b8ef04183c8cd4bb6bb8d","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-09-05:11","description":"","event_time":"2026-04-15-09:27","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/upload-kdata-file-job@sha256:42ecb8f676795dc842637735324aff920c7826e836d3188b21f57db10d1deec9","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:53","description":"","event_time":"2026-04-15-09:26","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/check-kdata-file-job@sha256:7facaa3230a6add85e830a626ec5b2561a84d0efd3c14598da347c1b5cd36508","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:35","description":"","event_time":"2026-04-12-02:35","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-frontend@sha256:4660b396a8671c3a59af67f7055afc6fb27fa75e99e4b0e49d3a70146266b3ae","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-01-01:50","description":"","event_time":"2026-04-15-09:30","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/update-kdata-status-job@sha256:a425365302115ba5304e038aab5a1095b8523945798b8ef04183c8cd4bb6bb8d","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:16","description":"","event_time":"2026-04-15-09:30","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/update-kdata-status-job@sha256:a425365302115ba5304e038aab5a1095b8523945798b8ef04183c8cd4bb6bb8d","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-03-02:14","description":"","event_time":"2026-04-03-02:14","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/twmdat-biqs/dockerImages/twmdat-biqs-sit@sha256:550cfbe17d280b17e296da939353764231f46d49fa92de364ff7bc7a81465699","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:18","description":"","event_time":"2026-04-15-02:18","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/cloud-run-source-deploy/dockerImages/function-twm-tamedia-invoices-exchange-v2@sha256:4b00f3774bfc181299959e7476071ae2e625093b32d113b824c00918a42808b4","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-09-05:48","description":"","event_time":"2026-04-15-09:31","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/upload-kdata-file-job@sha256:42ecb8f676795dc842637735324aff920c7826e836d3188b21f57db10d1deec9","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-03-02:27","description":"","event_time":"2026-04-03-02:27","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/twmdat-biqs/dockerImages/twmdat-biqs-uat@sha256:93bc03c40ddbf4f2b5cdc93776e0a7b7fb65df738d59409a29071ff45c4f5cdd","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-27-01:46","description":"","event_time":"2026-03-27-01:46","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/cloud-run-source-deploy/dockerImages/twm-tamedia-invoices-exchange@sha256:462e7237212221808da30a618b497b01f89415f237737fe901920a557802bd66","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:43","description":"","event_time":"2026-04-15-09:20","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/check-kdata-file-job@sha256:7facaa3230a6add85e830a626ec5b2561a84d0efd3c14598da347c1b5cd36508","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-14-02:34","description":"","event_time":"2026-04-15-09:27","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:ec0557f5cf66cce6ec6b0d9fc132ff21e7c066f929707466ffc122a8e718fe5e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-14-02:39","description":"","event_time":"2026-04-14-02:39","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/twmdat-biqs/dockerImages/twmdat-biqs-uat@sha256:93bc03c40ddbf4f2b5cdc93776e0a7b7fb65df738d59409a29071ff45c4f5cdd","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-02-02:15","description":"","event_time":"2026-04-14-16:28","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/crawler-stocks/dockerImages/crawler-stocks@sha256:50b1784d50cf5ee3c1c8850ed3a76fd2c17ac488b51708f2fd4665ed53514798","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-21-02:08","description":"","event_time":"2026-04-15-04:23","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/twmdat-biqs-job-sit/dockerImages/biqs-job-sit@sha256:a58b4dade6da11949a8be29b91f7a17bd0a70dc23528aff1b685701e3fc6ea71","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-03-02:15","description":"","event_time":"2026-04-03-02:15","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/twmdat-biqs/dockerImages/twmdat-biqs-uat@sha256:93bc03c40ddbf4f2b5cdc93776e0a7b7fb65df738d59409a29071ff45c4f5cdd","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-03-02:15","description":"","event_time":"2026-04-03-02:15","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/twmdat-biqs/dockerImages/twmdat-biqs-uat@sha256:93bc03c40ddbf4f2b5cdc93776e0a7b7fb65df738d59409a29071ff45c4f5cdd","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:12","description":"","event_time":"2026-04-15-09:24","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/update-kdata-status-job@sha256:a425365302115ba5304e038aab5a1095b8523945798b8ef04183c8cd4bb6bb8d","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-26-03:56","description":"","event_time":"2026-03-26-03:56","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/twmdat-biqs/dockerImages/twmdat-biqs-api-uat@sha256:4fb8c6eca605e24d64291259cbd8a50b17592dd23ad14b38c597e1009a8e805e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-29-01:59","description":"","event_time":"2026-03-29-01:59","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-frontend@sha256:341e489dd450b8ac5fc72a1afd58ac2405c5f29561c48962c4ff549362f2c37a","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:09","description":"","event_time":"2026-04-15-09:15","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:ec0557f5cf66cce6ec6b0d9fc132ff21e7c066f929707466ffc122a8e718fe5e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-22-01:32","description":"","event_time":"2026-03-22-01:32","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-frontend@sha256:4660b396a8671c3a59af67f7055afc6fb27fa75e99e4b0e49d3a70146266b3ae","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-10-05:05","description":"","event_time":"2026-04-15-09:15","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/upload-kdata-file-job@sha256:42ecb8f676795dc842637735324aff920c7826e836d3188b21f57db10d1deec9","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-28-01:55","description":"","event_time":"2026-04-15-09:19","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/update-kdata-status-job@sha256:a425365302115ba5304e038aab5a1095b8523945798b8ef04183c8cd4bb6bb8d","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:24","description":"","event_time":"2026-04-15-09:14","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/upload-kdata-file-job@sha256:42ecb8f676795dc842637735324aff920c7826e836d3188b21f57db10d1deec9","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-28-01:36","description":"","event_time":"2026-04-15-09:29","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/check-kdata-file-job@sha256:7facaa3230a6add85e830a626ec5b2561a84d0efd3c14598da347c1b5cd36508","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-13-15:17","description":"","event_time":"2026-03-13-15:17","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/aide-backend-uat-littlemy@sha256:0863b849fca862bec39c61b6809f0b38fcc02723caa7d1c1181f494c06c4130a","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:19","description":"","event_time":"2026-04-15-09:25","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:ec0557f5cf66cce6ec6b0d9fc132ff21e7c066f929707466ffc122a8e718fe5e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-01:58","description":"","event_time":"2026-04-15-09:30","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/upload-kdata-file-job@sha256:42ecb8f676795dc842637735324aff920c7826e836d3188b21f57db10d1deec9","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:04","description":"","event_time":"2026-04-15-09:25","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/aide-backend-uat-littlemy@sha256:48d40dd9839ec8a54edb9b94be6af3d14f89e5f5b2f16e64085837c5970ed89e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-14-02:34","description":"","event_time":"2026-04-14-02:34","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-frontend@sha256:4d6e7706a71b512ad3ca857cebaed1bb8dec98f833219ce6e2620037d4a42f38","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-14-02:37","description":"","event_time":"2026-04-15-09:16","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/create-batch-schedule@sha256:7bd798d7938c93a85b5c6632a0325a09b4524fd5f6b940a3b8335e1ca526f3a5","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-14-02:39","description":"","event_time":"2026-04-15-09:29","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/update-kdata-status-job@sha256:a425365302115ba5304e038aab5a1095b8523945798b8ef04183c8cd4bb6bb8d","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-14-02:19","description":"","event_time":"2026-04-15-09:26","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/check-kdata-file-job@sha256:7facaa3230a6add85e830a626ec5b2561a84d0efd3c14598da347c1b5cd36508","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-26-04:15","description":"","event_time":"2026-03-26-04:15","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/twmdat-biqs/dockerImages/twmdat-biqs-api-uat@sha256:4fb8c6eca605e24d64291259cbd8a50b17592dd23ad14b38c597e1009a8e805e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-02-03:05","description":"","event_time":"2026-04-15-09:19","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/upload-kdata-file-job@sha256:42ecb8f676795dc842637735324aff920c7826e836d3188b21f57db10d1deec9","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-10-04:36","description":"","event_time":"2026-04-15-09:29","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/update-kdata-status-job@sha256:a425365302115ba5304e038aab5a1095b8523945798b8ef04183c8cd4bb6bb8d","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:20","description":"","event_time":"2026-04-15-09:31","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:80ec88f754dce4d83b2bd51a8ae17d55a9222b68ac9dc318421a384b0d440421","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-13-04:27","description":"","event_time":"2026-04-14-16:26","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/crawler-stocks/dockerImages/crawler-stocks@sha256:50b1784d50cf5ee3c1c8850ed3a76fd2c17ac488b51708f2fd4665ed53514798","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:20","description":"","event_time":"2026-04-15-09:17","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/aide-backend-uat-littlemy@sha256:48d40dd9839ec8a54edb9b94be6af3d14f89e5f5b2f16e64085837c5970ed89e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:21","description":"","event_time":"2026-04-12-02:21","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-3-agent-local-k8s@sha256:be49cfe3cbd895153af61c3d524378d4f9f20b6a9f6065d32320ea1cefeb265f","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-03-02:23","description":"","event_time":"2026-04-03-02:23","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/twmdat-biqs/dockerImages/twmdat-biqs-sit@sha256:550cfbe17d280b17e296da939353764231f46d49fa92de364ff7bc7a81465699","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-26-03:20","description":"","event_time":"2026-03-26-03:20","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/cloud-run-source-deploy/dockerImages/function-twm-tamedia-invoices-exchange-v2@sha256:4b00f3774bfc181299959e7476071ae2e625093b32d113b824c00918a42808b4","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:49","description":"","event_time":"2026-04-15-09:16","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:ec0557f5cf66cce6ec6b0d9fc132ff21e7c066f929707466ffc122a8e718fe5e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:11","description":"","event_time":"2026-04-15-02:11","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/aide-backend-provider-uat-littlemy@sha256:c4e1bf90de3a0199356a6fcadb934e20f50515130f2a273f482f06bc1033f32c","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-01-01:38","description":"","event_time":"2026-04-15-09:26","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:ec0557f5cf66cce6ec6b0d9fc132ff21e7c066f929707466ffc122a8e718fe5e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-03-02:07","description":"","event_time":"2026-04-03-02:07","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/twmdat-biqs/dockerImages/twmdat-biqs-uat@sha256:93bc03c40ddbf4f2b5cdc93776e0a7b7fb65df738d59409a29071ff45c4f5cdd","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-03-02:18","description":"","event_time":"2026-04-03-02:18","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/twmdat-biqs/dockerImages/twmdat-biqs-sit@sha256:550cfbe17d280b17e296da939353764231f46d49fa92de364ff7bc7a81465699","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:21","description":"","event_time":"2026-04-15-09:29","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:c4ba8037b943f0a28b1ac50783b64eb64ccaec7dd88dd10c71d102a70e7130c8","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-01-01:55","description":"","event_time":"2026-04-15-09:21","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:80ec88f754dce4d83b2bd51a8ae17d55a9222b68ac9dc318421a384b0d440421","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-10-04:08","description":"","event_time":"2026-04-15-09:17","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/check-kdata-file-job@sha256:7facaa3230a6add85e830a626ec5b2561a84d0efd3c14598da347c1b5cd36508","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-03-02:28","description":"","event_time":"2026-04-03-02:28","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/twmdat-biqs/dockerImages/twmdat-biqs-uat@sha256:93bc03c40ddbf4f2b5cdc93776e0a7b7fb65df738d59409a29071ff45c4f5cdd","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-03-01:57","description":"","event_time":"2026-04-03-01:57","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/twmdat-biqs/dockerImages/twmdat-biqs-uat@sha256:93bc03c40ddbf4f2b5cdc93776e0a7b7fb65df738d59409a29071ff45c4f5cdd","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-10-04:24","description":"","event_time":"2026-04-15-09:25","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:366048eadf49f907a1d8770e367a0485a1a7a6d7e072b106ae7556b275f313f3","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-02-02:35","description":"","event_time":"2026-04-14-16:27","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/crawler-stocks/dockerImages/crawler-stocks@sha256:50b1784d50cf5ee3c1c8850ed3a76fd2c17ac488b51708f2fd4665ed53514798","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-29-01:35","description":"","event_time":"2026-03-29-01:35","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/twmdat-biqs/dockerImages/twmdat-biqs-api-uat@sha256:4fb8c6eca605e24d64291259cbd8a50b17592dd23ad14b38c597e1009a8e805e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:31","description":"","event_time":"2026-04-12-02:31","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-frontend@sha256:341e489dd450b8ac5fc72a1afd58ac2405c5f29561c48962c4ff549362f2c37a","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-28-01:58","description":"","event_time":"2026-04-15-09:25","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/update-kdata-status-job@sha256:a425365302115ba5304e038aab5a1095b8523945798b8ef04183c8cd4bb6bb8d","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:33","description":"","event_time":"2026-04-15-09:30","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/aide-backend-uat-littlemy@sha256:48d40dd9839ec8a54edb9b94be6af3d14f89e5f5b2f16e64085837c5970ed89e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-03-01:58","description":"","event_time":"2026-04-03-01:58","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/twmdat-biqs/dockerImages/twmdat-biqs-api-sit@sha256:4fb8c6eca605e24d64291259cbd8a50b17592dd23ad14b38c597e1009a8e805e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-01:56","description":"","event_time":"2026-04-15-09:30","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/update-kdata-status-job@sha256:a425365302115ba5304e038aab5a1095b8523945798b8ef04183c8cd4bb6bb8d","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-03-02:23","description":"","event_time":"2026-04-03-02:23","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/twmdat-biqs/dockerImages/twmdat-biqs-uat@sha256:93bc03c40ddbf4f2b5cdc93776e0a7b7fb65df738d59409a29071ff45c4f5cdd","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-02-02:56","description":"","event_time":"2026-04-14-16:23","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/crawler-stocks/dockerImages/crawler-stocks@sha256:50b1784d50cf5ee3c1c8850ed3a76fd2c17ac488b51708f2fd4665ed53514798","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-10-05:10","description":"","event_time":"2026-04-15-09:29","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:ec0557f5cf66cce6ec6b0d9fc132ff21e7c066f929707466ffc122a8e718fe5e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-01:51","description":"","event_time":"2026-04-15-01:51","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/cloud-run-source-deploy/dockerImages/function-twm-tamedia-invoices-exchange-v2@sha256:4b00f3774bfc181299959e7476071ae2e625093b32d113b824c00918a42808b4","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-12-16:02","description":"","event_time":"2026-03-12-16:02","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-frontend@sha256:341e489dd450b8ac5fc72a1afd58ac2405c5f29561c48962c4ff549362f2c37a","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-14-02:31","description":"","event_time":"2026-04-14-02:31","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/cloud-run-source-deploy/dockerImages/function-twm-tamedia-invoices-exchange-v2@sha256:4b00f3774bfc181299959e7476071ae2e625093b32d113b824c00918a42808b4","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-09-04:01","description":"","event_time":"2026-04-15-09:26","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/check-kdata-file-job@sha256:7facaa3230a6add85e830a626ec5b2561a84d0efd3c14598da347c1b5cd36508","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-02-02:54","description":"","event_time":"2026-04-14-16:24","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/crawler-stocks/dockerImages/crawler-stocks@sha256:50b1784d50cf5ee3c1c8850ed3a76fd2c17ac488b51708f2fd4665ed53514798","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-10-04:07","description":"","event_time":"2026-04-15-09:31","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/create-batch-schedule@sha256:7bd798d7938c93a85b5c6632a0325a09b4524fd5f6b940a3b8335e1ca526f3a5","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-13-15:24","description":"","event_time":"2026-04-15-09:21","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:ec0557f5cf66cce6ec6b0d9fc132ff21e7c066f929707466ffc122a8e718fe5e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:24","description":"","event_time":"2026-04-15-02:24","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/cloud-run-source-deploy/dockerImages/function-twm-tamedia-invoices-exchange-v2@sha256:4b00f3774bfc181299959e7476071ae2e625093b32d113b824c00918a42808b4","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-02-03:11","description":"","event_time":"2026-04-14-16:25","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/crawler-stocks/dockerImages/crawler-stocks@sha256:50b1784d50cf5ee3c1c8850ed3a76fd2c17ac488b51708f2fd4665ed53514798","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:11","description":"","event_time":"2026-04-15-09:20","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/check-kdata-file-job@sha256:7facaa3230a6add85e830a626ec5b2561a84d0efd3c14598da347c1b5cd36508","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-25-02:31","description":"","event_time":"2026-04-15-09:11","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/upload-kdata-file-job@sha256:42ecb8f676795dc842637735324aff920c7826e836d3188b21f57db10d1deec9","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-02-02:14","description":"","event_time":"2026-04-14-16:29","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/crawler-stocks/dockerImages/crawler-stocks@sha256:50b1784d50cf5ee3c1c8850ed3a76fd2c17ac488b51708f2fd4665ed53514798","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:24","description":"","event_time":"2026-04-15-09:15","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:ec0557f5cf66cce6ec6b0d9fc132ff21e7c066f929707466ffc122a8e718fe5e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-11-01:48","description":"","event_time":"2026-04-11-01:48","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-frontend@sha256:341e489dd450b8ac5fc72a1afd58ac2405c5f29561c48962c4ff549362f2c37a","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-26-02:59","description":"","event_time":"2026-04-15-09:14","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/update-kdata-status-job@sha256:a425365302115ba5304e038aab5a1095b8523945798b8ef04183c8cd4bb6bb8d","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-29-01:55","description":"","event_time":"2026-04-15-09:31","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:366048eadf49f907a1d8770e367a0485a1a7a6d7e072b106ae7556b275f313f3","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:47","description":"","event_time":"2026-04-15-09:31","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:c4ba8037b943f0a28b1ac50783b64eb64ccaec7dd88dd10c71d102a70e7130c8","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-01:51","description":"","event_time":"2026-04-15-09:27","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:c4ba8037b943f0a28b1ac50783b64eb64ccaec7dd88dd10c71d102a70e7130c8","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-01:53","description":"","event_time":"2026-04-15-01:53","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/cloud-run-source-deploy/dockerImages/function-twm-tamedia-invoices-exchange-v2@sha256:4b00f3774bfc181299959e7476071ae2e625093b32d113b824c00918a42808b4","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-10-04:59","description":"","event_time":"2026-04-10-04:59","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/cloud-run-source-deploy/dockerImages/function-twm-tamedia-invoices-exchange-v2@sha256:4b00f3774bfc181299959e7476071ae2e625093b32d113b824c00918a42808b4","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-03-01:41","description":"","event_time":"2026-04-03-01:41","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/twmdat-biqs/dockerImages/twmdat-biqs-uat@sha256:93bc03c40ddbf4f2b5cdc93776e0a7b7fb65df738d59409a29071ff45c4f5cdd","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-01:53","description":"","event_time":"2026-04-15-09:20","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/create-batch-schedule@sha256:7bd798d7938c93a85b5c6632a0325a09b4524fd5f6b940a3b8335e1ca526f3a5","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-03-01:48","description":"","event_time":"2026-04-03-01:48","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/twmdat-biqs/dockerImages/twmdat-biqs-sit@sha256:550cfbe17d280b17e296da939353764231f46d49fa92de364ff7bc7a81465699","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-09-03:43","description":"","event_time":"2026-04-15-09:31","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/upload-kdata-file-job@sha256:42ecb8f676795dc842637735324aff920c7826e836d3188b21f57db10d1deec9","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-02-03:05","description":"","event_time":"2026-04-14-16:28","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/crawler-stocks/dockerImages/crawler-stocks@sha256:50b1784d50cf5ee3c1c8850ed3a76fd2c17ac488b51708f2fd4665ed53514798","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:16","description":"","event_time":"2026-04-12-02:16","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-frontend@sha256:341e489dd450b8ac5fc72a1afd58ac2405c5f29561c48962c4ff549362f2c37a","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:35","description":"","event_time":"2026-04-12-02:35","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/cloud-run-source-deploy/dockerImages/twm-tamedia-invoices-exchange@sha256:462e7237212221808da30a618b497b01f89415f237737fe901920a557802bd66","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-01:30","description":"","event_time":"2026-04-15-09:20","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/upload-kdata-file-job@sha256:42ecb8f676795dc842637735324aff920c7826e836d3188b21f57db10d1deec9","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:47","description":"","event_time":"2026-04-15-09:12","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:366048eadf49f907a1d8770e367a0485a1a7a6d7e072b106ae7556b275f313f3","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:13","description":"","event_time":"2026-04-15-09:30","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/aide-backend-uat-littlemy@sha256:48d40dd9839ec8a54edb9b94be6af3d14f89e5f5b2f16e64085837c5970ed89e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-02-02:29","description":"","event_time":"2026-04-14-16:28","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/crawler-stocks/dockerImages/crawler-stocks@sha256:50b1784d50cf5ee3c1c8850ed3a76fd2c17ac488b51708f2fd4665ed53514798","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-14-02:16","description":"","event_time":"2026-04-14-02:16","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/twmdat-biqs/dockerImages/twmdat-biqs-uat@sha256:93bc03c40ddbf4f2b5cdc93776e0a7b7fb65df738d59409a29071ff45c4f5cdd","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-02-02:24","description":"","event_time":"2026-04-14-16:24","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/crawler-stocks/dockerImages/crawler-stocks@sha256:50b1784d50cf5ee3c1c8850ed3a76fd2c17ac488b51708f2fd4665ed53514798","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-03-02:00","description":"","event_time":"2026-04-03-02:00","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/twmdat-biqs/dockerImages/twmdat-biqs-api-sit@sha256:4fb8c6eca605e24d64291259cbd8a50b17592dd23ad14b38c597e1009a8e805e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:45","description":"","event_time":"2026-04-12-02:45","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-3-backend-local-k8s@sha256:19c79d835dbbfd6acc874336267bd61a0a476fcecd088a0d60c7f962658b7693","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:32","description":"","event_time":"2026-04-12-02:32","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/cloud-run-source-deploy/dockerImages/twm-tamedia-invoices-exchange@sha256:462e7237212221808da30a618b497b01f89415f237737fe901920a557802bd66","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-02-02:14","description":"","event_time":"2026-04-14-16:23","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/crawler-stocks/dockerImages/crawler-stocks@sha256:50b1784d50cf5ee3c1c8850ed3a76fd2c17ac488b51708f2fd4665ed53514798","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-09-05:11","description":"","event_time":"2026-04-15-09:24","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/check-kdata-file-job@sha256:7facaa3230a6add85e830a626ec5b2561a84d0efd3c14598da347c1b5cd36508","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-29-02:00","description":"","event_time":"2026-04-15-09:28","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:ec0557f5cf66cce6ec6b0d9fc132ff21e7c066f929707466ffc122a8e718fe5e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:31","description":"","event_time":"2026-04-15-09:14","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:366048eadf49f907a1d8770e367a0485a1a7a6d7e072b106ae7556b275f313f3","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-01:44","description":"","event_time":"2026-04-15-09:20","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/check-kdata-file-job@sha256:7facaa3230a6add85e830a626ec5b2561a84d0efd3c14598da347c1b5cd36508","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-02-02:42","description":"","event_time":"2026-04-14-16:24","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/crawler-stocks/dockerImages/crawler-stocks@sha256:50b1784d50cf5ee3c1c8850ed3a76fd2c17ac488b51708f2fd4665ed53514798","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-25-02:00","description":"","event_time":"2026-04-15-09:28","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/check-kdata-file-job@sha256:7facaa3230a6add85e830a626ec5b2561a84d0efd3c14598da347c1b5cd36508","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-10-03:44","description":"","event_time":"2026-04-15-09:18","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/upload-kdata-file-job@sha256:42ecb8f676795dc842637735324aff920c7826e836d3188b21f57db10d1deec9","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-02-02:32","description":"","event_time":"2026-04-14-16:27","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/crawler-stocks/dockerImages/crawler-stocks@sha256:50b1784d50cf5ee3c1c8850ed3a76fd2c17ac488b51708f2fd4665ed53514798","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-29-02:01","description":"","event_time":"2026-04-15-09:18","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:c4ba8037b943f0a28b1ac50783b64eb64ccaec7dd88dd10c71d102a70e7130c8","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:51","description":"","event_time":"2026-04-15-09:25","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/update-kdata-status-job@sha256:a425365302115ba5304e038aab5a1095b8523945798b8ef04183c8cd4bb6bb8d","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-01-01:20","description":"","event_time":"2026-04-15-09:22","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/upload-kdata-file-job@sha256:42ecb8f676795dc842637735324aff920c7826e836d3188b21f57db10d1deec9","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-01:22","description":"","event_time":"2026-04-15-09:17","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:366048eadf49f907a1d8770e367a0485a1a7a6d7e072b106ae7556b275f313f3","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-29-01:50","description":"","event_time":"2026-03-29-01:50","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/twmdat-biqs/dockerImages/twmdat-biqs-api-uat@sha256:4fb8c6eca605e24d64291259cbd8a50b17592dd23ad14b38c597e1009a8e805e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-01-01:29","description":"","event_time":"2026-04-15-09:24","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/check-kdata-file-job@sha256:7facaa3230a6add85e830a626ec5b2561a84d0efd3c14598da347c1b5cd36508","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-03-02:19","description":"","event_time":"2026-04-03-02:19","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/twmdat-biqs/dockerImages/twmdat-biqs-api-sit@sha256:4fb8c6eca605e24d64291259cbd8a50b17592dd23ad14b38c597e1009a8e805e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:16","description":"","event_time":"2026-04-15-02:16","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/cloud-run-source-deploy/dockerImages/genaius3-test-call-backend@sha256:f6b4003689d8bea74948dcbb297ab0e813fa7dba375c293d564cbefce1995615","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-09-04:00","description":"","event_time":"2026-04-15-09:26","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/update-kdata-status-job@sha256:a425365302115ba5304e038aab5a1095b8523945798b8ef04183c8cd4bb6bb8d","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-29-02:01","description":"","event_time":"2026-04-15-09:15","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/check-kdata-file-job@sha256:7facaa3230a6add85e830a626ec5b2561a84d0efd3c14598da347c1b5cd36508","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-26-03:21","description":"","event_time":"2026-03-26-03:21","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/twmdat-biqs/dockerImages/twmdat-biqs-api-uat@sha256:4fb8c6eca605e24d64291259cbd8a50b17592dd23ad14b38c597e1009a8e805e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:02","description":"","event_time":"2026-04-15-02:02","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/aide-backend-provider-uat-littlemy@sha256:c4e1bf90de3a0199356a6fcadb934e20f50515130f2a273f482f06bc1033f32c","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-19-01:52","description":"","event_time":"2026-04-15-09:15","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:80ec88f754dce4d83b2bd51a8ae17d55a9222b68ac9dc318421a384b0d440421","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-13-04:29","description":"","event_time":"2026-04-14-16:30","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/crawler-stocks/dockerImages/crawler-stocks@sha256:50b1784d50cf5ee3c1c8850ed3a76fd2c17ac488b51708f2fd4665ed53514798","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-14-02:15","description":"","event_time":"2026-04-14-02:15","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/twmdat-biqs/dockerImages/twmdat-biqs-sit@sha256:550cfbe17d280b17e296da939353764231f46d49fa92de364ff7bc7a81465699","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-02-02:26","description":"","event_time":"2026-04-14-16:24","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/crawler-stocks/dockerImages/crawler-stocks@sha256:50b1784d50cf5ee3c1c8850ed3a76fd2c17ac488b51708f2fd4665ed53514798","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-10-04:02","description":"","event_time":"2026-04-15-09:20","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/create-master-schedule@sha256:cad50a37e82192dec187d804fd590208567165d105865358571c18ff28e06c7f","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-08-02:12","description":"","event_time":"2026-04-15-09:19","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/check-kdata-file-job@sha256:7facaa3230a6add85e830a626ec5b2561a84d0efd3c14598da347c1b5cd36508","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:17","description":"","event_time":"2026-04-15-09:28","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/aide-backend-uat-littlemy@sha256:48d40dd9839ec8a54edb9b94be6af3d14f89e5f5b2f16e64085837c5970ed89e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-27-01:34","description":"","event_time":"2026-03-27-01:34","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/cloud-run-source-deploy/dockerImages/twm-tamedia-invoices-exchange@sha256:462e7237212221808da30a618b497b01f89415f237737fe901920a557802bd66","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-01:58","description":"","event_time":"2026-04-15-01:58","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/aide-backend-provider-uat-littlemy@sha256:c4e1bf90de3a0199356a6fcadb934e20f50515130f2a273f482f06bc1033f32c","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-02-02:20","description":"","event_time":"2026-04-14-16:27","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/crawler-stocks/dockerImages/crawler-stocks@sha256:50b1784d50cf5ee3c1c8850ed3a76fd2c17ac488b51708f2fd4665ed53514798","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:24","description":"","event_time":"2026-04-15-09:20","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/aide-backend-uat-littlemy@sha256:48d40dd9839ec8a54edb9b94be6af3d14f89e5f5b2f16e64085837c5970ed89e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-05-01:33","description":"","event_time":"2026-04-15-09:15","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:80ec88f754dce4d83b2bd51a8ae17d55a9222b68ac9dc318421a384b0d440421","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-28-01:43","description":"","event_time":"2026-04-15-09:27","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/upload-kdata-file-job@sha256:42ecb8f676795dc842637735324aff920c7826e836d3188b21f57db10d1deec9","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-02-02:59","description":"","event_time":"2026-04-14-16:27","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/crawler-stocks/dockerImages/crawler-stocks@sha256:50b1784d50cf5ee3c1c8850ed3a76fd2c17ac488b51708f2fd4665ed53514798","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:35","description":"","event_time":"2026-04-15-09:18","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/check-kdata-file-job@sha256:7facaa3230a6add85e830a626ec5b2561a84d0efd3c14598da347c1b5cd36508","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-01-01:48","description":"","event_time":"2026-04-15-09:15","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:366048eadf49f907a1d8770e367a0485a1a7a6d7e072b106ae7556b275f313f3","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-01:52","description":"","event_time":"2026-04-15-01:52","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/cloud-run-source-deploy/dockerImages/genaius3-test-call-backend@sha256:f6b4003689d8bea74948dcbb297ab0e813fa7dba375c293d564cbefce1995615","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-14-02:34","description":"","event_time":"2026-04-15-09:22","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:c4ba8037b943f0a28b1ac50783b64eb64ccaec7dd88dd10c71d102a70e7130c8","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-11-01:42","description":"","event_time":"2026-04-15-09:26","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:ec0557f5cf66cce6ec6b0d9fc132ff21e7c066f929707466ffc122a8e718fe5e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-13-04:30","description":"","event_time":"2026-04-14-16:26","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/crawler-stocks/dockerImages/crawler-stocks@sha256:50b1784d50cf5ee3c1c8850ed3a76fd2c17ac488b51708f2fd4665ed53514798","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-10-05:13","description":"","event_time":"2026-04-15-09:22","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/create-batch-schedule@sha256:7bd798d7938c93a85b5c6632a0325a09b4524fd5f6b940a3b8335e1ca526f3a5","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-01:59","description":"","event_time":"2026-04-15-09:13","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/aide-backend-uat-littlemy@sha256:48d40dd9839ec8a54edb9b94be6af3d14f89e5f5b2f16e64085837c5970ed89e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-03-02:23","description":"","event_time":"2026-04-03-02:23","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/twmdat-biqs/dockerImages/twmdat-biqs-api-sit@sha256:4fb8c6eca605e24d64291259cbd8a50b17592dd23ad14b38c597e1009a8e805e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-01:41","description":"","event_time":"2026-04-15-01:41","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/cloud-run-source-deploy/dockerImages/genaius3-test-call-backend@sha256:f6b4003689d8bea74948dcbb297ab0e813fa7dba375c293d564cbefce1995615","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-14-02:17","description":"","event_time":"2026-04-14-02:17","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/twmdat-biqs/dockerImages/twmdat-biqs-sit@sha256:550cfbe17d280b17e296da939353764231f46d49fa92de364ff7bc7a81465699","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-01:47","description":"","event_time":"2026-04-15-09:16","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:80ec88f754dce4d83b2bd51a8ae17d55a9222b68ac9dc318421a384b0d440421","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-14-02:41","description":"","event_time":"2026-04-14-02:41","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/twmdat-biqs/dockerImages/twmdat-biqs-api-sit@sha256:4fb8c6eca605e24d64291259cbd8a50b17592dd23ad14b38c597e1009a8e805e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-10-04:01","description":"","event_time":"2026-04-10-04:01","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-frontend@sha256:4d6e7706a71b512ad3ca857cebaed1bb8dec98f833219ce6e2620037d4a42f38","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-19-01:51","description":"","event_time":"2026-04-15-09:29","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/check-kdata-file-job@sha256:7facaa3230a6add85e830a626ec5b2561a84d0efd3c14598da347c1b5cd36508","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:06","description":"","event_time":"2026-04-15-09:17","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/check-kdata-file-job@sha256:7facaa3230a6add85e830a626ec5b2561a84d0efd3c14598da347c1b5cd36508","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-01:42","description":"","event_time":"2026-04-15-09:18","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:c4ba8037b943f0a28b1ac50783b64eb64ccaec7dd88dd10c71d102a70e7130c8","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-26-03:32","description":"","event_time":"2026-04-15-09:27","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/upload-kdata-file-job@sha256:42ecb8f676795dc842637735324aff920c7826e836d3188b21f57db10d1deec9","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:35","description":"","event_time":"2026-04-15-09:12","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/create-batch-schedule@sha256:7bd798d7938c93a85b5c6632a0325a09b4524fd5f6b940a3b8335e1ca526f3a5","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-29-02:06","description":"","event_time":"2026-04-15-09:28","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/create-batch-schedule@sha256:7bd798d7938c93a85b5c6632a0325a09b4524fd5f6b940a3b8335e1ca526f3a5","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-01:52","description":"","event_time":"2026-04-15-01:52","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/aide-backend-provider-uat-littlemy@sha256:c4e1bf90de3a0199356a6fcadb934e20f50515130f2a273f482f06bc1033f32c","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-03-01:54","description":"","event_time":"2026-04-03-01:54","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/twmdat-biqs/dockerImages/twmdat-biqs-api-sit@sha256:4fb8c6eca605e24d64291259cbd8a50b17592dd23ad14b38c597e1009a8e805e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-19-01:23","description":"","event_time":"2026-03-19-01:23","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-3-agent-local-k8s@sha256:be49cfe3cbd895153af61c3d524378d4f9f20b6a9f6065d32320ea1cefeb265f","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-01-01:47","description":"","event_time":"2026-04-01-01:47","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-3-agent-local-k8s@sha256:be49cfe3cbd895153af61c3d524378d4f9f20b6a9f6065d32320ea1cefeb265f","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:18","description":"","event_time":"2026-04-15-09:24","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:ec0557f5cf66cce6ec6b0d9fc132ff21e7c066f929707466ffc122a8e718fe5e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-02-02:43","description":"","event_time":"2026-04-14-16:31","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/crawler-stocks/dockerImages/crawler-stocks@sha256:50b1784d50cf5ee3c1c8850ed3a76fd2c17ac488b51708f2fd4665ed53514798","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-01:50","description":"","event_time":"2026-04-15-09:27","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/check-kdata-file-job@sha256:7facaa3230a6add85e830a626ec5b2561a84d0efd3c14598da347c1b5cd36508","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-29-01:51","description":"","event_time":"2026-04-15-09:31","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/update-kdata-status-job@sha256:a425365302115ba5304e038aab5a1095b8523945798b8ef04183c8cd4bb6bb8d","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-09-05:13","description":"","event_time":"2026-04-15-09:16","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/check-kdata-file-job@sha256:7facaa3230a6add85e830a626ec5b2561a84d0efd3c14598da347c1b5cd36508","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-03-02:20","description":"","event_time":"2026-04-03-02:20","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/twmdat-biqs/dockerImages/twmdat-biqs-uat@sha256:93bc03c40ddbf4f2b5cdc93776e0a7b7fb65df738d59409a29071ff45c4f5cdd","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-01-01:32","description":"","event_time":"2026-04-01-01:32","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/cloud-run-source-deploy/dockerImages/twm-tamedia-invoices-exchange@sha256:462e7237212221808da30a618b497b01f89415f237737fe901920a557802bd66","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-01-01:57","description":"","event_time":"2026-04-01-01:57","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-3-backend-local-k8s@sha256:19c79d835dbbfd6acc874336267bd61a0a476fcecd088a0d60c7f962658b7693","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:13","description":"","event_time":"2026-04-15-09:25","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/aide-backend-uat-littlemy@sha256:48d40dd9839ec8a54edb9b94be6af3d14f89e5f5b2f16e64085837c5970ed89e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-10-04:02","description":"","event_time":"2026-04-15-09:28","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/create-master-schedule@sha256:cad50a37e82192dec187d804fd590208567165d105865358571c18ff28e06c7f","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-10-03:42","description":"","event_time":"2026-04-10-03:42","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/cloud-run-source-deploy/dockerImages/genaius3-test-call-backend@sha256:f6b4003689d8bea74948dcbb297ab0e813fa7dba375c293d564cbefce1995615","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-10-05:02","description":"","event_time":"2026-04-15-09:21","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:c4ba8037b943f0a28b1ac50783b64eb64ccaec7dd88dd10c71d102a70e7130c8","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-13-15:19","description":"","event_time":"2026-04-15-09:24","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:c4ba8037b943f0a28b1ac50783b64eb64ccaec7dd88dd10c71d102a70e7130c8","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-14-02:45","description":"","event_time":"2026-04-14-02:45","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-frontend@sha256:4d6e7706a71b512ad3ca857cebaed1bb8dec98f833219ce6e2620037d4a42f38","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-01-01:54","description":"","event_time":"2026-04-15-09:26","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:c4ba8037b943f0a28b1ac50783b64eb64ccaec7dd88dd10c71d102a70e7130c8","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:07","description":"","event_time":"2026-04-15-02:07","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/aide-backend-provider-uat-littlemy@sha256:c4e1bf90de3a0199356a6fcadb934e20f50515130f2a273f482f06bc1033f32c","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:38","description":"","event_time":"2026-04-15-09:20","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:366048eadf49f907a1d8770e367a0485a1a7a6d7e072b106ae7556b275f313f3","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:03","description":"","event_time":"2026-04-15-09:15","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/aide-backend-uat-littlemy@sha256:48d40dd9839ec8a54edb9b94be6af3d14f89e5f5b2f16e64085837c5970ed89e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-25-02:09","description":"","event_time":"2026-04-15-09:14","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/update-kdata-status-job@sha256:a425365302115ba5304e038aab5a1095b8523945798b8ef04183c8cd4bb6bb8d","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-01:50","description":"","event_time":"2026-04-15-09:21","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/aide-backend-uat-littlemy@sha256:48d40dd9839ec8a54edb9b94be6af3d14f89e5f5b2f16e64085837c5970ed89e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:29","description":"","event_time":"2026-04-15-09:26","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:366048eadf49f907a1d8770e367a0485a1a7a6d7e072b106ae7556b275f313f3","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:36","description":"","event_time":"2026-04-15-09:13","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/create-master-schedule@sha256:cad50a37e82192dec187d804fd590208567165d105865358571c18ff28e06c7f","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-02-02:48","description":"","event_time":"2026-04-14-16:29","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/crawler-stocks/dockerImages/crawler-stocks@sha256:50b1784d50cf5ee3c1c8850ed3a76fd2c17ac488b51708f2fd4665ed53514798","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-10-04:06","description":"","event_time":"2026-04-15-09:15","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/check-kdata-file-job@sha256:7facaa3230a6add85e830a626ec5b2561a84d0efd3c14598da347c1b5cd36508","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-26-04:23","description":"","event_time":"2026-04-15-09:25","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/check-kdata-file-job@sha256:7facaa3230a6add85e830a626ec5b2561a84d0efd3c14598da347c1b5cd36508","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:20","description":"","event_time":"2026-04-15-09:21","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/update-kdata-status-job@sha256:a425365302115ba5304e038aab5a1095b8523945798b8ef04183c8cd4bb6bb8d","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-14-02:26","description":"","event_time":"2026-04-15-09:19","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:80ec88f754dce4d83b2bd51a8ae17d55a9222b68ac9dc318421a384b0d440421","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-08-03:30","description":"","event_time":"2026-04-15-09:16","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/update-kdata-status-job@sha256:a425365302115ba5304e038aab5a1095b8523945798b8ef04183c8cd4bb6bb8d","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:35","description":"","event_time":"2026-04-12-02:35","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-3-gateway-local-k8s@sha256:8b9bd7301112d8d90df1dfad67f95091ec254849f266547c8c250f25a2d2201d","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-03-01:57","description":"","event_time":"2026-04-03-01:57","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/twmdat-biqs/dockerImages/twmdat-biqs-api-sit@sha256:4fb8c6eca605e24d64291259cbd8a50b17592dd23ad14b38c597e1009a8e805e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-01:53","description":"","event_time":"2026-04-15-09:13","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/create-master-schedule@sha256:cad50a37e82192dec187d804fd590208567165d105865358571c18ff28e06c7f","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:25","description":"","event_time":"2026-04-15-09:19","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/upload-kdata-file-job@sha256:42ecb8f676795dc842637735324aff920c7826e836d3188b21f57db10d1deec9","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-02-03:05","description":"","event_time":"2026-04-14-16:24","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/crawler-stocks/dockerImages/crawler-stocks@sha256:50b1784d50cf5ee3c1c8850ed3a76fd2c17ac488b51708f2fd4665ed53514798","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-02-02:38","description":"","event_time":"2026-04-14-16:25","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/crawler-stocks/dockerImages/crawler-stocks@sha256:50b1784d50cf5ee3c1c8850ed3a76fd2c17ac488b51708f2fd4665ed53514798","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-19-01:53","description":"","event_time":"2026-04-15-09:17","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/upload-kdata-file-job@sha256:42ecb8f676795dc842637735324aff920c7826e836d3188b21f57db10d1deec9","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-01:57","description":"","event_time":"2026-04-15-09:18","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/aide-backend-uat-littlemy@sha256:48d40dd9839ec8a54edb9b94be6af3d14f89e5f5b2f16e64085837c5970ed89e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-02:02","description":"","event_time":"2026-04-15-09:26","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:80ec88f754dce4d83b2bd51a8ae17d55a9222b68ac9dc318421a384b0d440421","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-05-01:43","description":"","event_time":"2026-04-15-09:12","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/check-kdata-file-job@sha256:7facaa3230a6add85e830a626ec5b2561a84d0efd3c14598da347c1b5cd36508","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:32","description":"","event_time":"2026-04-15-09:26","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/aide-backend-uat-littlemy@sha256:48d40dd9839ec8a54edb9b94be6af3d14f89e5f5b2f16e64085837c5970ed89e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:01","description":"","event_time":"2026-04-15-09:24","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/upload-kdata-file-job@sha256:42ecb8f676795dc842637735324aff920c7826e836d3188b21f57db10d1deec9","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:21","description":"","event_time":"2026-04-15-09:25","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/upload-kdata-file-job@sha256:42ecb8f676795dc842637735324aff920c7826e836d3188b21f57db10d1deec9","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-01:43","description":"","event_time":"2026-04-15-09:31","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/update-kdata-status-job@sha256:a425365302115ba5304e038aab5a1095b8523945798b8ef04183c8cd4bb6bb8d","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-02-02:16","description":"","event_time":"2026-04-14-16:30","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/crawler-stocks/dockerImages/crawler-stocks@sha256:50b1784d50cf5ee3c1c8850ed3a76fd2c17ac488b51708f2fd4665ed53514798","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-11-02:11","description":"","event_time":"2026-04-11-02:11","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-frontend@sha256:4d6e7706a71b512ad3ca857cebaed1bb8dec98f833219ce6e2620037d4a42f38","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-10-04:55","description":"","event_time":"2026-04-15-09:19","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/create-master-schedule@sha256:cad50a37e82192dec187d804fd590208567165d105865358571c18ff28e06c7f","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-19-01:41","description":"","event_time":"2026-03-19-01:41","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/aide-backend-provider-uat-littlemy@sha256:232d94a992234ea5da8ab40f1cb3c567ffeb46b6d286bbc9630769665e3a252b","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:22","description":"","event_time":"2026-04-12-02:22","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-frontend@sha256:4660b396a8671c3a59af67f7055afc6fb27fa75e99e4b0e49d3a70146266b3ae","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:10","description":"","event_time":"2026-04-15-09:16","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:ec0557f5cf66cce6ec6b0d9fc132ff21e7c066f929707466ffc122a8e718fe5e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-11-02:00","description":"","event_time":"2026-04-11-02:00","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-frontend@sha256:4660b396a8671c3a59af67f7055afc6fb27fa75e99e4b0e49d3a70146266b3ae","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-02-02:53","description":"","event_time":"2026-04-14-16:31","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/crawler-stocks/dockerImages/crawler-stocks@sha256:50b1784d50cf5ee3c1c8850ed3a76fd2c17ac488b51708f2fd4665ed53514798","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-02-02:27","description":"","event_time":"2026-04-14-16:24","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/crawler-stocks/dockerImages/crawler-stocks@sha256:50b1784d50cf5ee3c1c8850ed3a76fd2c17ac488b51708f2fd4665ed53514798","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-26-03:47","description":"","event_time":"2026-03-26-03:47","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/cloud-run-source-deploy/dockerImages/function-twm-tamedia-invoices-exchange-v2@sha256:4b00f3774bfc181299959e7476071ae2e625093b32d113b824c00918a42808b4","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-29-01:48","description":"","event_time":"2026-04-15-09:31","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/upload-kdata-file-job@sha256:42ecb8f676795dc842637735324aff920c7826e836d3188b21f57db10d1deec9","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-19-01:42","description":"","event_time":"2026-04-15-09:19","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/update-kdata-status-job@sha256:a425365302115ba5304e038aab5a1095b8523945798b8ef04183c8cd4bb6bb8d","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:07","description":"","event_time":"2026-04-15-02:07","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/aide-backend-provider-uat-littlemy@sha256:c4e1bf90de3a0199356a6fcadb934e20f50515130f2a273f482f06bc1033f32c","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-10-04:26","description":"","event_time":"2026-04-15-09:19","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:c4ba8037b943f0a28b1ac50783b64eb64ccaec7dd88dd10c71d102a70e7130c8","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-01-01:37","description":"","event_time":"2026-04-01-01:37","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-3-gateway-local-k8s@sha256:8b9bd7301112d8d90df1dfad67f95091ec254849f266547c8c250f25a2d2201d","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:14","description":"","event_time":"2026-04-15-09:21","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/aide-backend-uat-littlemy@sha256:48d40dd9839ec8a54edb9b94be6af3d14f89e5f5b2f16e64085837c5970ed89e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-19-01:43","description":"","event_time":"2026-04-15-09:12","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:366048eadf49f907a1d8770e367a0485a1a7a6d7e072b106ae7556b275f313f3","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-02-02:23","description":"","event_time":"2026-04-14-16:29","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/crawler-stocks/dockerImages/crawler-stocks@sha256:50b1784d50cf5ee3c1c8850ed3a76fd2c17ac488b51708f2fd4665ed53514798","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-10-04:55","description":"","event_time":"2026-04-15-09:26","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/update-kdata-status-job@sha256:a425365302115ba5304e038aab5a1095b8523945798b8ef04183c8cd4bb6bb8d","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-14-02:30","description":"","event_time":"2026-04-15-09:21","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:366048eadf49f907a1d8770e367a0485a1a7a6d7e072b106ae7556b275f313f3","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-02-02:16","description":"","event_time":"2026-04-14-16:27","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/crawler-stocks/dockerImages/crawler-stocks@sha256:50b1784d50cf5ee3c1c8850ed3a76fd2c17ac488b51708f2fd4665ed53514798","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-01:47","description":"","event_time":"2026-04-15-09:28","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/update-kdata-status-job@sha256:a425365302115ba5304e038aab5a1095b8523945798b8ef04183c8cd4bb6bb8d","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:39","description":"","event_time":"2026-04-15-02:39","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/aide-backend-provider-uat-littlemy@sha256:c4e1bf90de3a0199356a6fcadb934e20f50515130f2a273f482f06bc1033f32c","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-13-15:14","description":"","event_time":"2026-04-15-09:27","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:366048eadf49f907a1d8770e367a0485a1a7a6d7e072b106ae7556b275f313f3","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-26-03:53","description":"","event_time":"2026-03-26-03:53","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/twmdat-biqs/dockerImages/twmdat-biqs-api-uat@sha256:4fb8c6eca605e24d64291259cbd8a50b17592dd23ad14b38c597e1009a8e805e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:36","description":"","event_time":"2026-04-15-09:31","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/upload-kdata-file-job@sha256:42ecb8f676795dc842637735324aff920c7826e836d3188b21f57db10d1deec9","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-14-02:14","description":"","event_time":"2026-04-14-02:14","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-frontend@sha256:4d6e7706a71b512ad3ca857cebaed1bb8dec98f833219ce6e2620037d4a42f38","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:30","description":"","event_time":"2026-04-12-02:30","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-3-agent-local-k8s@sha256:be49cfe3cbd895153af61c3d524378d4f9f20b6a9f6065d32320ea1cefeb265f","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-01:51","description":"","event_time":"2026-04-15-09:22","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/update-kdata-status-job@sha256:a425365302115ba5304e038aab5a1095b8523945798b8ef04183c8cd4bb6bb8d","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-13-15:12","description":"","event_time":"2026-04-15-09:12","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:80ec88f754dce4d83b2bd51a8ae17d55a9222b68ac9dc318421a384b0d440421","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-13-15:10","description":"","event_time":"2026-03-13-15:10","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/aide-backend-provider-uat-littlemy@sha256:232d94a992234ea5da8ab40f1cb3c567ffeb46b6d286bbc9630769665e3a252b","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-29-02:07","description":"","event_time":"2026-03-29-02:07","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-3-agent-local-k8s@sha256:be49cfe3cbd895153af61c3d524378d4f9f20b6a9f6065d32320ea1cefeb265f","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:21","description":"","event_time":"2026-04-15-09:16","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/aide-backend-uat-littlemy@sha256:48d40dd9839ec8a54edb9b94be6af3d14f89e5f5b2f16e64085837c5970ed89e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-02-02:48","description":"","event_time":"2026-04-14-16:27","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/crawler-stocks/dockerImages/crawler-stocks@sha256:50b1784d50cf5ee3c1c8850ed3a76fd2c17ac488b51708f2fd4665ed53514798","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-19-02:02","description":"","event_time":"2026-04-15-09:26","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/create-master-schedule@sha256:cad50a37e82192dec187d804fd590208567165d105865358571c18ff28e06c7f","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-05-01:43","description":"","event_time":"2026-04-15-09:25","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/upload-kdata-file-job@sha256:42ecb8f676795dc842637735324aff920c7826e836d3188b21f57db10d1deec9","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:21","description":"","event_time":"2026-04-12-02:21","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-frontend@sha256:4d6e7706a71b512ad3ca857cebaed1bb8dec98f833219ce6e2620037d4a42f38","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:43","description":"","event_time":"2026-04-12-02:43","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-3-agent-local-k8s@sha256:be49cfe3cbd895153af61c3d524378d4f9f20b6a9f6065d32320ea1cefeb265f","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-03-01:59","description":"","event_time":"2026-04-03-01:59","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/twmdat-biqs/dockerImages/twmdat-biqs-api-sit@sha256:4fb8c6eca605e24d64291259cbd8a50b17592dd23ad14b38c597e1009a8e805e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-10-05:06","description":"","event_time":"2026-04-15-09:25","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/update-kdata-status-job@sha256:a425365302115ba5304e038aab5a1095b8523945798b8ef04183c8cd4bb6bb8d","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:52","description":"","event_time":"2026-04-15-09:31","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/update-kdata-status-job@sha256:a425365302115ba5304e038aab5a1095b8523945798b8ef04183c8cd4bb6bb8d","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-11-02:08","description":"","event_time":"2026-04-11-02:08","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-frontend@sha256:4660b396a8671c3a59af67f7055afc6fb27fa75e99e4b0e49d3a70146266b3ae","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-14-02:14","description":"","event_time":"2026-04-14-02:14","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-frontend@sha256:4d6e7706a71b512ad3ca857cebaed1bb8dec98f833219ce6e2620037d4a42f38","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:01","description":"","event_time":"2026-04-15-09:12","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:c4ba8037b943f0a28b1ac50783b64eb64ccaec7dd88dd10c71d102a70e7130c8","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-14-02:31","description":"","event_time":"2026-04-14-02:31","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/twmdat-biqs/dockerImages/twmdat-biqs-api-sit@sha256:4fb8c6eca605e24d64291259cbd8a50b17592dd23ad14b38c597e1009a8e805e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:34","description":"","event_time":"2026-04-15-09:29","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:366048eadf49f907a1d8770e367a0485a1a7a6d7e072b106ae7556b275f313f3","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-01:52","description":"","event_time":"2026-03-20-01:52","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/aide-backend-uat-littlemy@sha256:0863b849fca862bec39c61b6809f0b38fcc02723caa7d1c1181f494c06c4130a","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:00","description":"","event_time":"2026-04-15-09:31","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/aide-backend-uat-littlemy@sha256:48d40dd9839ec8a54edb9b94be6af3d14f89e5f5b2f16e64085837c5970ed89e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-10-04:21","description":"","event_time":"2026-04-15-09:23","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:80ec88f754dce4d83b2bd51a8ae17d55a9222b68ac9dc318421a384b0d440421","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-01:59","description":"","event_time":"2026-04-15-09:23","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:ec0557f5cf66cce6ec6b0d9fc132ff21e7c066f929707466ffc122a8e718fe5e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-02-02:32","description":"","event_time":"2026-04-14-16:25","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/crawler-stocks/dockerImages/crawler-stocks@sha256:50b1784d50cf5ee3c1c8850ed3a76fd2c17ac488b51708f2fd4665ed53514798","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-19-01:54","description":"","event_time":"2026-04-15-09:28","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:ec0557f5cf66cce6ec6b0d9fc132ff21e7c066f929707466ffc122a8e718fe5e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:44","description":"","event_time":"2026-04-15-09:26","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/eaas-gar/dockerImages/upload-kdata-file-job@sha256:42ecb8f676795dc842637735324aff920c7826e836d3188b21f57db10d1deec9","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-04-02:39","description":"","event_time":"2026-04-15-09:22","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/genaius-gar/dockerImages/genaius-backend-job-upload_doc_file_job@sha256:ec0557f5cf66cce6ec6b0d9fc132ff21e7c066f929707466ffc122a8e718fe5e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-26-04:14","description":"","event_time":"2026-03-26-04:14","instance_name":"projects/dat-t-377202/locations/asia-east1/repositories/twmdat-biqs/dockerImages/twmdat-biqs-api-uat@sha256:4fb8c6eca605e24d64291259cbd8a50b17592dd23ad14b38c597e1009a8e805e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"}],"OPEN_FIREWALL":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-11:41","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-11:31","instance_name":"allow-twm-scan","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"}],"PUBLIC_IP_ADDRESS":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-11:35","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-11:31","instance_name":"datcospacet01","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-11:36","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-11:31","instance_name":"dattomt01","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-11:39","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-11:31","instance_name":"apbiqsomt01","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"}],"SSL_NOT_ENFORCED":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-11:36","description":"Use SSL for all incoming connections to your SQL database instance to secure data in transit. This control doesn't apply to on-premises databases or external instances.","event_time":"2026-03-20-11:31","instance_name":"aide-test-postgres","instance_type":"google.cloud.sql.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-11:41","description":"Use SSL for all incoming connections to your SQL database instance to secure data in transit. This control doesn't apply to on-premises databases or external instances.","event_time":"2026-03-20-11:31","instance_name":"aide-uat-400-postgres","instance_type":"google.cloud.sql.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-11:41","description":"Use SSL for all incoming connections to your SQL database instance to secure data in transit. This control doesn't apply to on-premises databases or external instances.","event_time":"2026-03-20-11:31","instance_name":"aide-sit-littlemy","instance_type":"google.cloud.sql.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-11:36","description":"Use SSL for all incoming connections to your SQL database instance to secure data in transit. This control doesn't apply to on-premises databases or external instances.","event_time":"2026-03-20-11:31","instance_name":"aide-sit","instance_type":"google.cloud.sql.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-11:41","description":"Use SSL for all incoming connections to your SQL database instance to secure data in transit. This control doesn't apply to on-premises databases or external instances.","event_time":"2026-03-20-11:31","instance_name":"aide-uat-ebg","instance_type":"google.cloud.sql.Instance","resource_url":"","scan_tool":"Security Command Center"}]},"ekyc-aiocr":{"OPEN_FIREWALL":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-06:46","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-06:44","instance_name":"twm-security-scan","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-06:45","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-06:44","instance_name":"default-allow-health-check-ipv6","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-06:46","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-06:44","instance_name":"default-allow-http","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-06:45","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-06:44","instance_name":"default-allow-health-check","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-06:46","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-06:44","instance_name":"ekyc-aiocr-prod-vm-ai","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-06:46","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-06:44","instance_name":"ekyc-aiocr-prod-vm-ocr","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"}],"OPEN_HTTP_PORT":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-06:46","description":"Block incoming connections on TCP port 80 from all IP addresses to help prevent undesired traffic and attacks on HTTP services.","event_time":"2026-03-20-06:44","instance_name":"ekyc-aiocr-prod-vm-ocr","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-06:45","description":"Block incoming connections on TCP port 80 from all IP addresses to help prevent undesired traffic and attacks on HTTP services.","event_time":"2026-03-20-06:44","instance_name":"ekyc-aiocr-prod-vm-ai","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-06:45","description":"Block incoming connections on TCP port 80 from all IP addresses to help prevent undesired traffic and attacks on HTTP services.","event_time":"2026-03-20-06:44","instance_name":"default-allow-http","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"}],"PUBLIC_IP_ADDRESS":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-06:46","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-06:44","instance_name":"ekyc-om-p-01","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"}]},"fms-p-202411":{"GKE_SECURITY_BULLETIN":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-21-03:54","description":"Three vulnerabilities (CVE-2025-31133, CVE-2025-52565, and CVE-2025-52881) in runc may allow an attacker to execute a full container breakout, leading to root privilege escalation on the host node.","event_time":"2026-03-20-23:00","instance_name":"fms-gke-cluster","instance_type":"google.container.Cluster","resource_url":"https://console.cloud.google.com/kubernetes/security/dashboard?project=fms-p-202411","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-03-12:46","description":"A vulnerability (CVE-2025-40214) has been discovered in the Linux kernel that can lead to privilege escalation on Container-Optimized OS nodes.","event_time":"2026-04-03-08:25","instance_name":"fms-gke-cluster","instance_type":"google.container.Cluster","resource_url":"https://console.cloud.google.com/kubernetes/security/dashboard?project=fms-p-202411","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-30-22:50","description":"A vulnerability (CVE-2025-38616) has been discovered in the Linux kernel that can lead to privilege escalation on Container-Optimized OS and Ubuntu nodes.","event_time":"2026-04-06-23:17","instance_name":"fms-gke-cluster","instance_type":"google.container.Cluster","resource_url":"https://console.cloud.google.com/kubernetes/security/dashboard?project=fms-p-202411","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-21-04:18","description":"A vulnerability (CVE-2025-39946) has been discovered in the Linux kernel that can lead to privilege escalation on Container-Optimized OS and Ubuntu nodes.","event_time":"2026-03-23-23:09","instance_name":"fms-gke-cluster","instance_type":"google.container.Cluster","resource_url":"https://console.cloud.google.com/kubernetes/security/dashboard?project=fms-p-202411","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-23-23:09","description":"A vulnerability (CVE-2025-38678) has been discovered in the Linux kernel that can lead to privilege escalation on Container-Optimized OS and Ubuntu nodes.","event_time":"2026-03-30-23:44","instance_name":"fms-gke-cluster","instance_type":"google.container.Cluster","resource_url":"https://console.cloud.google.com/kubernetes/security/dashboard?project=fms-p-202411","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-31-12:18","description":"Vulnerabilities in openssl, particularly CVE-2025-15467 which might result in denial of service or code execution.","event_time":"2026-03-31-08:46","instance_name":"fms-gke-cluster","instance_type":"google.container.Cluster","resource_url":"https://console.cloud.google.com/kubernetes/security/dashboard?project=fms-p-202411","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-14-20:26","description":"A vulnerability (CVE-2025-39964) has been discovered in the Linux kernel that can lead to privilege escalation on Container-Optimized OS and Ubuntu nodes.","event_time":"2026-04-14-08:15","instance_name":"fms-gke-cluster","instance_type":"google.container.Cluster","resource_url":"https://console.cloud.google.com/kubernetes/security/dashboard?project=fms-p-202411","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-13-23:39","description":"A vulnerability (CVE-2026-23111) has been discovered in the Linux kernel that can lead to privilege escalation on Container-Optimized OS nodes.","event_time":"2026-04-13-23:38","instance_name":"fms-gke-cluster","instance_type":"google.container.Cluster","resource_url":"https://console.cloud.google.com/kubernetes/security/dashboard?project=fms-p-202411","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-02-27-02:20","description":"A vulnerability (CVE-2025-40215) has been discovered in the Linux kernel that can lead to privilege escalation on Container-Optimized OS and Ubuntu nodes.","event_time":"2026-03-23-23:09","instance_name":"fms-gke-cluster","instance_type":"google.container.Cluster","resource_url":"https://console.cloud.google.com/kubernetes/security/dashboard?project=fms-p-202411","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-18-18:03","description":"A vulnerability (CVE-2025-40297) has been discovered in the Linux kernel that can lead to privilege escalation on Container-Optimized OS and Ubuntu nodes.","event_time":"2026-03-23-23:09","instance_name":"fms-gke-cluster","instance_type":"google.container.Cluster","resource_url":"https://console.cloud.google.com/kubernetes/security/dashboard?project=fms-p-202411","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-06-23:18","description":"A vulnerability (CVE-2026-23273) has been discovered in the Linux kernel that can lead to privilege escalation on Container-Optimized OS nodes.","event_time":"2026-04-06-23:17","instance_name":"fms-gke-cluster","instance_type":"google.container.Cluster","resource_url":"https://console.cloud.google.com/kubernetes/security/dashboard?project=fms-p-202411","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-12-21:01","description":"A vulnerability (CVE-2025-39682) has been discovered in the Linux kernel that can lead to privilege escalation on Container-Optimized OS and Ubuntu nodes.","event_time":"2026-03-12-20:49","instance_name":"fms-gke-cluster","instance_type":"google.container.Cluster","resource_url":"https://console.cloud.google.com/kubernetes/security/dashboard?project=fms-p-202411","scan_tool":"Security Command Center"}],"OPEN_FIREWALL":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-22-10:05","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-22-08:47","instance_name":"allow-twm-scan","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"}],"PUBLIC_IP_ADDRESS":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-22-08:58","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-22-08:47","instance_name":"fmspomp01","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"}],"SSL_NOT_ENFORCED":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-22-10:05","description":"Use SSL for all incoming connections to your SQL database instance to secure data in transit. This control doesn't apply to on-premises databases or external instances.","event_time":"2026-03-22-08:47","instance_name":"fms-db","instance_type":"google.cloud.sql.Instance","resource_url":"","scan_tool":"Security Command Center"}]},"fms-p2":{"GKE_SECURITY_BULLETIN":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-23-23:20","description":"A vulnerability (CVE-2025-38678) has been discovered in the Linux kernel that can lead to privilege escalation on Container-Optimized OS and Ubuntu nodes.","event_time":"2026-03-30-23:50","instance_name":"fms-gke-cluster","instance_type":"google.container.Cluster","resource_url":"https://console.cloud.google.com/kubernetes/security/dashboard?project=fms-p2","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-30-23:51","description":"A vulnerability (CVE-2025-38616) has been discovered in the Linux kernel that can lead to privilege escalation on Container-Optimized OS and Ubuntu nodes.","event_time":"2026-04-06-23:20","instance_name":"fms-gke-cluster","instance_type":"google.container.Cluster","resource_url":"https://console.cloud.google.com/kubernetes/security/dashboard?project=fms-p2","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-06-23:21","description":"A vulnerability (CVE-2026-23273) has been discovered in the Linux kernel that can lead to privilege escalation on Container-Optimized OS nodes.","event_time":"2026-04-06-23:20","instance_name":"fms-gke-cluster","instance_type":"google.container.Cluster","resource_url":"https://console.cloud.google.com/kubernetes/security/dashboard?project=fms-p2","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-13-23:24","description":"A vulnerability (CVE-2026-23111) has been discovered in the Linux kernel that can lead to privilege escalation on Container-Optimized OS nodes.","event_time":"2026-04-13-23:24","instance_name":"fms-gke-cluster","instance_type":"google.container.Cluster","resource_url":"https://console.cloud.google.com/kubernetes/security/dashboard?project=fms-p2","scan_tool":"Security Command Center"}],"PUBLIC_IP_ADDRESS":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-06:05","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-05:40","instance_name":"fmsp2omp01","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"}],"SSL_NOT_ENFORCED":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-06:14","description":"Use SSL for all incoming connections to your SQL database instance to secure data in transit. This control doesn't apply to on-premises databases or external instances.","event_time":"2026-03-20-05:40","instance_name":"fms-db","instance_type":"google.cloud.sql.Instance","resource_url":"","scan_tool":"Security Command Center"}]},"fms-t-408202":{"GKE_SECURITY_BULLETIN":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-13-22:54","description":"A vulnerability (CVE-2026-23111) has been discovered in the Linux kernel that can lead to privilege escalation on Container-Optimized OS nodes.","event_time":"2026-04-13-23:54","instance_name":"fms-gke-cluster","instance_type":"google.container.Cluster","resource_url":"https://console.cloud.google.com/kubernetes/security/dashboard?project=fms-t-408202","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-23-23:32","description":"A vulnerability (CVE-2025-38678) has been discovered in the Linux kernel that can lead to privilege escalation on Container-Optimized OS and Ubuntu nodes.","event_time":"2026-03-30-23:24","instance_name":"fms-gke-cluster","instance_type":"google.container.Cluster","resource_url":"https://console.cloud.google.com/kubernetes/security/dashboard?project=fms-t-408202","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-06-23:17","description":"A vulnerability (CVE-2026-23273) has been discovered in the Linux kernel that can lead to privilege escalation on Container-Optimized OS nodes.","event_time":"2026-04-06-23:17","instance_name":"fms-gke-cluster","instance_type":"google.container.Cluster","resource_url":"https://console.cloud.google.com/kubernetes/security/dashboard?project=fms-t-408202","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-30-23:24","description":"A vulnerability (CVE-2025-38616) has been discovered in the Linux kernel that can lead to privilege escalation on Container-Optimized OS and Ubuntu nodes.","event_time":"2026-04-06-23:17","instance_name":"fms-gke-cluster","instance_type":"google.container.Cluster","resource_url":"https://console.cloud.google.com/kubernetes/security/dashboard?project=fms-t-408202","scan_tool":"Security Command Center"}],"OPEN_FIREWALL":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-06:04","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-05:33","instance_name":"allow-twm-scan","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"}],"PUBLIC_IP_ADDRESS":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-06:04","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-05:33","instance_name":"fmstomt01","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"}],"SSL_NOT_ENFORCED":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-06:12","description":"Use SSL for all incoming connections to your SQL database instance to secure data in transit. This control doesn't apply to on-premises databases or external instances.","event_time":"2026-03-20-05:33","instance_name":"fms-db","instance_type":"google.cloud.sql.Instance","resource_url":"","scan_tool":"Security Command Center"}]},"isharing-p":{"CONTAINER_IMAGE_VULNERABILITY":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-29-01:30","description":"","event_time":"2026-03-29-01:30","instance_name":"projects/isharing-p/locations/asia-east1/repositories/isharing-artifacts/dockerImages/asia-east1-docker.pkg.dev%2Fisharing-p%2Fisharing-artifacts%2Fapi@sha256:6818790771dde213a6724815d69525ba41a10d7322fcfb525b91b09ba0250dec","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-29-01:59","description":"","event_time":"2026-03-29-01:59","instance_name":"projects/isharing-p/locations/asia-east1/repositories/isharing-artifacts/dockerImages/asia-east1-docker.pkg.dev%2Fisharing-p%2Fisharing-artifacts%2Fapi@sha256:6818790771dde213a6724815d69525ba41a10d7322fcfb525b91b09ba0250dec","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-22-01:40","description":"","event_time":"2026-03-22-01:40","instance_name":"projects/isharing-p/locations/asia-east1/repositories/isharing-artifacts/dockerImages/asia-east1-docker.pkg.dev%2Fisharing-p%2Fisharing-artifacts%2Fapi@sha256:6818790771dde213a6724815d69525ba41a10d7322fcfb525b91b09ba0250dec","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"}]},"istms-431606":{"OPEN_FIREWALL":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-06:46","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-06:44","instance_name":"allow-twm-scan","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"}],"PUBLIC_IP_ADDRESS":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-06:46","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-06:44","instance_name":"istmsomp01","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"}]},"istms-poc":{"OPEN_FIREWALL":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-22-08:53","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-22-08:47","instance_name":"allow-twm-scan","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"}],"PUBLIC_IP_ADDRESS":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-21:51","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-21:37","instance_name":"istmspocomt01","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"}]},"itfa-286907":{"PUBLIC_IP_ADDRESS":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-06:46","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-06:44","instance_name":"project-b","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"}],"SSL_NOT_ENFORCED":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-06:45","description":"Use SSL for all incoming connections to your SQL database instance to secure data in transit. This control doesn't apply to on-premises databases or external instances.","event_time":"2026-03-20-06:44","instance_name":"planb","instance_type":"google.cloud.sql.Instance","resource_url":"","scan_tool":"Security Command Center"}]},"iti-poc-372910":{"GKE_SECURITY_BULLETIN":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-13-23:41","description":"A vulnerability (CVE-2026-23111) has been discovered in the Linux kernel that can lead to privilege escalation on Container-Optimized OS nodes.","event_time":"2026-04-13-23:41","instance_name":"autopilot-cluster-stage","instance_type":"google.container.Cluster","resource_url":"https://console.cloud.google.com/kubernetes/security/dashboard?project=iti-poc-372910","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-13-23:41","description":"A vulnerability (CVE-2026-23111) has been discovered in the Linux kernel that can lead to privilege escalation on Container-Optimized OS nodes.","event_time":"2026-04-13-23:41","instance_name":"autopilot-cluster-stage","instance_type":"google.container.Cluster","resource_url":"https://console.cloud.google.com/kubernetes/security/dashboard?project=iti-poc-372910","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-07-00:00","description":"A vulnerability (CVE-2026-23273) has been discovered in the Linux kernel that can lead to privilege escalation on Container-Optimized OS nodes.","event_time":"2026-04-06-23:59","instance_name":"autopilot-cluster-stage","instance_type":"google.container.Cluster","resource_url":"https://console.cloud.google.com/kubernetes/security/dashboard?project=iti-poc-372910","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-13-23:41","description":"A vulnerability (CVE-2026-23111) has been discovered in the Linux kernel that can lead to privilege escalation on Container-Optimized OS nodes.","event_time":"2026-04-13-23:41","instance_name":"autopilot-cluster-stage","instance_type":"google.container.Cluster","resource_url":"https://console.cloud.google.com/kubernetes/security/dashboard?project=iti-poc-372910","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-07-00:00","description":"A vulnerability (CVE-2026-23273) has been discovered in the Linux kernel that can lead to privilege escalation on Container-Optimized OS nodes.","event_time":"2026-04-06-23:59","instance_name":"autopilot-cluster-stage","instance_type":"google.container.Cluster","resource_url":"https://console.cloud.google.com/kubernetes/security/dashboard?project=iti-poc-372910","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-13-23:41","description":"A vulnerability (CVE-2026-23111) has been discovered in the Linux kernel that can lead to privilege escalation on Container-Optimized OS nodes.","event_time":"2026-04-13-23:41","instance_name":"autopilot-cluster-stage","instance_type":"google.container.Cluster","resource_url":"https://console.cloud.google.com/kubernetes/security/dashboard?project=iti-poc-372910","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-07-00:00","description":"A vulnerability (CVE-2026-23273) has been discovered in the Linux kernel that can lead to privilege escalation on Container-Optimized OS nodes.","event_time":"2026-04-06-23:59","instance_name":"autopilot-cluster-stage","instance_type":"google.container.Cluster","resource_url":"https://console.cloud.google.com/kubernetes/security/dashboard?project=iti-poc-372910","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-07-00:00","description":"A vulnerability (CVE-2026-23273) has been discovered in the Linux kernel that can lead to privilege escalation on Container-Optimized OS nodes.","event_time":"2026-04-06-23:59","instance_name":"autopilot-cluster-stage","instance_type":"google.container.Cluster","resource_url":"https://console.cloud.google.com/kubernetes/security/dashboard?project=iti-poc-372910","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-07-00:00","description":"A vulnerability (CVE-2026-23273) has been discovered in the Linux kernel that can lead to privilege escalation on Container-Optimized OS nodes.","event_time":"2026-04-06-23:59","instance_name":"autopilot-cluster-stage","instance_type":"google.container.Cluster","resource_url":"https://console.cloud.google.com/kubernetes/security/dashboard?project=iti-poc-372910","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-13-23:41","description":"A vulnerability (CVE-2026-23111) has been discovered in the Linux kernel that can lead to privilege escalation on Container-Optimized OS nodes.","event_time":"2026-04-13-23:41","instance_name":"autopilot-cluster-stage","instance_type":"google.container.Cluster","resource_url":"https://console.cloud.google.com/kubernetes/security/dashboard?project=iti-poc-372910","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-13-23:41","description":"A vulnerability (CVE-2026-23111) has been discovered in the Linux kernel that can lead to privilege escalation on Container-Optimized OS nodes.","event_time":"2026-04-13-23:41","instance_name":"autopilot-cluster-stage","instance_type":"google.container.Cluster","resource_url":"https://console.cloud.google.com/kubernetes/security/dashboard?project=iti-poc-372910","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-13-23:41","description":"A vulnerability (CVE-2026-23111) has been discovered in the Linux kernel that can lead to privilege escalation on Container-Optimized OS nodes.","event_time":"2026-04-13-23:41","instance_name":"autopilot-cluster-stage","instance_type":"google.container.Cluster","resource_url":"https://console.cloud.google.com/kubernetes/security/dashboard?project=iti-poc-372910","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-07-00:00","description":"A vulnerability (CVE-2026-23273) has been discovered in the Linux kernel that can lead to privilege escalation on Container-Optimized OS nodes.","event_time":"2026-04-06-23:59","instance_name":"autopilot-cluster-stage","instance_type":"google.container.Cluster","resource_url":"https://console.cloud.google.com/kubernetes/security/dashboard?project=iti-poc-372910","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-13-23:41","description":"A vulnerability (CVE-2026-23111) has been discovered in the Linux kernel that can lead to privilege escalation on Container-Optimized OS nodes.","event_time":"2026-04-13-23:41","instance_name":"autopilot-cluster-stage","instance_type":"google.container.Cluster","resource_url":"https://console.cloud.google.com/kubernetes/security/dashboard?project=iti-poc-372910","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-07-00:00","description":"A vulnerability (CVE-2026-23273) has been discovered in the Linux kernel that can lead to privilege escalation on Container-Optimized OS nodes.","event_time":"2026-04-06-23:59","instance_name":"autopilot-cluster-stage","instance_type":"google.container.Cluster","resource_url":"https://console.cloud.google.com/kubernetes/security/dashboard?project=iti-poc-372910","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-07-00:00","description":"A vulnerability (CVE-2026-23273) has been discovered in the Linux kernel that can lead to privilege escalation on Container-Optimized OS nodes.","event_time":"2026-04-06-23:59","instance_name":"autopilot-cluster-stage","instance_type":"google.container.Cluster","resource_url":"https://console.cloud.google.com/kubernetes/security/dashboard?project=iti-poc-372910","scan_tool":"Security Command Center"}],"OPEN_FIREWALL":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-04:55","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-04:55","instance_name":"sodavpc","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-04:57","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-04:55","instance_name":"allow-twm-tenable","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-04:58","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-04:55","instance_name":"default-allow-http","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-04:58","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-04:55","instance_name":"soda-demo-allow-health-check-ipv6","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-04:57","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-04:55","instance_name":"soda-demo-allow-health-check","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-04:56","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-04:55","instance_name":"soda-demo-2","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-05:01","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-04:55","instance_name":"default-allow-health-check-ipv6","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-04:55","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-04:55","instance_name":"soda-demo","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-04:55","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-04:55","instance_name":"soda-demo-allow-http","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-04:55","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-04:55","instance_name":"soda","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-04:55","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-04:55","instance_name":"allow-http-https","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"}],"OPEN_HTTP_PORT":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-04:55","description":"Block incoming connections on TCP port 80 from all IP addresses to help prevent undesired traffic and attacks on HTTP services.","event_time":"2026-03-20-04:55","instance_name":"soda-demo-allow-http","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-04:55","description":"Block incoming connections on TCP port 80 from all IP addresses to help prevent undesired traffic and attacks on HTTP services.","event_time":"2026-03-20-04:55","instance_name":"allow-http-https","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-05:00","description":"Block incoming connections on TCP port 80 from all IP addresses to help prevent undesired traffic and attacks on HTTP services.","event_time":"2026-03-20-04:55","instance_name":"default-allow-http","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"}],"PUBLIC_BUCKET_ACL":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-01-12:03","description":"This bucket is public and can be accessed by anyone on the Internet. \"allUsers\" represents anyone on the Internet, and \"allAuthenticatedUsers\" represents anyone who is authenticated with a Google account; neither is constrained to users within your organization.","event_time":"2026-03-31-23:13","instance_name":"cfr-lab-bucket","instance_type":"google.cloud.storage.Bucket","resource_url":"https://console.cloud.google.com/storage/browser/cfr-lab-bucket;tab=permissions","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-14-15:23","description":"This bucket is public and can be accessed by anyone on the Internet. \"allUsers\" represents anyone on the Internet, and \"allAuthenticatedUsers\" represents anyone who is authenticated with a Google account; neither is constrained to users within your organization.","event_time":"2026-04-14-03:06","instance_name":"soda-test-gcs","instance_type":"google.cloud.storage.Bucket","resource_url":"https://console.cloud.google.com/storage/browser/soda-test-gcs;tab=permissions","scan_tool":"Security Command Center"}],"PUBLIC_IP_ADDRESS":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-10:17","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-10:17","instance_name":"itipocomt01","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-10:15","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-10:15","instance_name":"instance-20240829-072254","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-10:18","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-10:17","instance_name":"poc-terraform","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-10:17","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-10:17","instance_name":"james-test","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-10:17","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-10:17","instance_name":"poc-gitlab","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"}],"SSL_NOT_ENFORCED":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-04:55","description":"Use SSL for all incoming connections to your SQL database instance to secure data in transit. This control doesn't apply to on-premises databases or external instances.","event_time":"2026-03-20-04:55","instance_name":"jamestest","instance_type":"google.cloud.sql.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-04:55","description":"Use SSL for all incoming connections to your SQL database instance to secure data in transit. This control doesn't apply to on-premises databases or external instances.","event_time":"2026-03-20-04:55","instance_name":"jeff-labs","instance_type":"google.cloud.sql.Instance","resource_url":"","scan_tool":"Security Command Center"}]},"kycaas-t":{"OPEN_RDP_PORT":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-05:22","description":"Block incoming connections on TCP port 3389 or UDP port 3389 from all IP addresses to help prevent undesired traffic and attacks on RDP server.","event_time":"2026-03-20-05:17","instance_name":"twm-test","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"}]},"maip-poc":{"OPEN_FIREWALL":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-11:32","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-11:24","instance_name":"allow-twm-scan","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"}],"PUBLIC_IP_ADDRESS":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-11:36","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-11:24","instance_name":"maipvmp02","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-11:30","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-11:24","instance_name":"maipomp01","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-11:37","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-11:24","instance_name":"maipvmp01","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"}],"SSL_NOT_ENFORCED":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-11:34","description":"Use SSL for all incoming connections to your SQL database instance to secure data in transit. This control doesn't apply to on-premises databases or external instances.","event_time":"2026-03-20-11:24","instance_name":"phish-poc","instance_type":"google.cloud.sql.Instance","resource_url":"","scan_tool":"Security Command Center"}]},"maip-t":{"OPEN_FIREWALL":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-05:00","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-04:58","instance_name":"allow-twm-scan","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"}],"PUBLIC_BUCKET_ACL":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-14-17:04","description":"This bucket is public and can be accessed by anyone on the Internet. \"allUsers\" represents anyone on the Internet, and \"allAuthenticatedUsers\" represents anyone who is authenticated with a Google account; neither is constrained to users within your organization.","event_time":"2026-04-14-03:06","instance_name":"social_engineering_html_content_t","instance_type":"google.cloud.storage.Bucket","resource_url":"https://console.cloud.google.com/storage/browser/social_engineering_html_content_t;tab=permissions","scan_tool":"Security Command Center"}],"PUBLIC_IP_ADDRESS":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-04:59","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-04:58","instance_name":"maiptomt01","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-04:59","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-04:58","instance_name":"maiptvmt01","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"}],"SSL_NOT_ENFORCED":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-05:00","description":"Use SSL for all incoming connections to your SQL database instance to secure data in transit. This control doesn't apply to on-premises databases or external instances.","event_time":"2026-03-20-04:58","instance_name":"social-engineer-t-upgrade","instance_type":"google.cloud.sql.Instance","resource_url":"","scan_tool":"Security Command Center"}]},"mars-376509":{"SSL_NOT_ENFORCED":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-21:48","description":"Use SSL for all incoming connections to your SQL database instance to secure data in transit. This control doesn't apply to on-premises databases or external instances.","event_time":"2026-03-20-21:30","instance_name":"mars-psql","instance_type":"google.cloud.sql.Instance","resource_url":"","scan_tool":"Security Command Center"}]},"mfo-t-405906":{"OPEN_RDP_PORT":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-05:27","description":"Block incoming connections on TCP port 3389 or UDP port 3389 from all IP addresses to help prevent undesired traffic and attacks on RDP server.","event_time":"2026-03-20-05:15","instance_name":"default-allow-rdp","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"}],"OPEN_SSH_PORT":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-05:18","description":"Block incoming connections on TCP port 22 or SCTP port 22 from all IP addresses to help prevent undesired traffic and attacks on SSH server.","event_time":"2026-03-20-05:15","instance_name":"default-allow-ssh","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"}]},"moiari-bes-poc":{"PUBLIC_BUCKET_ACL":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-12-20:47","description":"This bucket is public and can be accessed by anyone on the Internet. \"allUsers\" represents anyone on the Internet, and \"allAuthenticatedUsers\" represents anyone who is authenticated with a Google account; neither is constrained to users within your organization.","event_time":"2026-03-12-01:53","instance_name":"fullsynergynr-dev-public","instance_type":"google.cloud.storage.Bucket","resource_url":"https://console.cloud.google.com/storage/browser/fullsynergynr-dev-public;tab=permissions","scan_tool":"Security Command Center"}]},"moirai-405106":{"PUBLIC_BUCKET_ACL":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-14-17:54","description":"This bucket is public and can be accessed by anyone on the Internet. \"allUsers\" represents anyone on the Internet, and \"allAuthenticatedUsers\" represents anyone who is authenticated with a Google account; neither is constrained to users within your organization.","event_time":"2026-04-14-03:06","instance_name":"moi-public","instance_type":"google.cloud.storage.Bucket","resource_url":"https://console.cloud.google.com/storage/browser/moi-public;tab=permissions","scan_tool":"Security Command Center"}]},"moirai-t":{"PUBLIC_BUCKET_ACL":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-14-20:21","description":"This bucket is public and can be accessed by anyone on the Internet. \"allUsers\" represents anyone on the Internet, and \"allAuthenticatedUsers\" represents anyone who is authenticated with a Google account; neither is constrained to users within your organization.","event_time":"2026-04-14-03:06","instance_name":"moirai-dev-public","instance_type":"google.cloud.storage.Bucket","resource_url":"https://console.cloud.google.com/storage/browser/moirai-dev-public;tab=permissions","scan_tool":"Security Command Center"}],"PUBLIC_IP_ADDRESS":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-21-03:51","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-21-03:47","instance_name":"moiraiomd01","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"}]},"mplus-video-conference":{"OPEN_FIREWALL":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-16-09:48","description":"Firewall rules that allow connections from all IP addresses or on all ports may expose resources to attackers.","event_time":"2026-03-16-09:48","instance_name":"allow-twm-scan","instance_type":"google.compute.Firewall","resource_url":"https://console.cloud.google.com/networking/firewalls/details/allow-twm-scan?project=mplus-video-conference","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-16-09:56","description":"Firewall rules that allow connections from all IP addresses or on all ports may expose resources to attackers.","event_time":"2026-03-16-09:56","instance_name":"allow-twm-scan2","instance_type":"google.compute.Firewall","resource_url":"https://console.cloud.google.com/networking/firewalls/details/allow-twm-scan2?project=mplus-video-conference","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-28-04:59","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-28-04:59","instance_name":"allow-twm-scan","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-22-10:07","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-22-08:48","instance_name":"turn-server","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-22-10:07","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-22-08:48","instance_name":"bbb-udp","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-22-08:55","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-22-08:48","instance_name":"default-allow-http","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-28-04:59","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-28-04:59","instance_name":"allow-twm-scan2","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-22-08:59","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-22-08:48","instance_name":"bbb-https","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-22-10:07","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-22-08:48","instance_name":"default-allow-health-check-ipv6","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"}],"OPEN_HTTP_PORT":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-22-08:55","description":"Block incoming connections on TCP port 80 from all IP addresses to help prevent undesired traffic and attacks on HTTP services.","event_time":"2026-03-22-08:48","instance_name":"bbb-https","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-22-08:59","description":"Block incoming connections on TCP port 80 from all IP addresses to help prevent undesired traffic and attacks on HTTP services.","event_time":"2026-03-22-08:48","instance_name":"default-allow-http","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-22-08:55","description":"Block incoming connections on TCP port 80 from all IP addresses to help prevent undesired traffic and attacks on HTTP services.","event_time":"2026-03-22-08:48","instance_name":"turn-server","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"}],"PUBLIC_BUCKET_ACL":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-14-19:14","description":"This bucket is public and can be accessed by anyone on the Internet. \"allUsers\" represents anyone on the Internet, and \"allAuthenticatedUsers\" represents anyone who is authenticated with a Google account; neither is constrained to users within your organization.","event_time":"2026-04-14-03:06","instance_name":"mplus-video-record","instance_type":"google.cloud.storage.Bucket","resource_url":"https://console.cloud.google.com/storage/browser/mplus-video-record;tab=permissions","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-14-17:43","description":"This bucket is public and can be accessed by anyone on the Internet. \"allUsers\" represents anyone on the Internet, and \"allAuthenticatedUsers\" represents anyone who is authenticated with a Google account; neither is constrained to users within your organization.","event_time":"2026-04-14-03:06","instance_name":"mplus-meet-live-web-stage","instance_type":"google.cloud.storage.Bucket","resource_url":"https://console.cloud.google.com/storage/browser/mplus-meet-live-web-stage;tab=permissions","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-14-17:18","description":"This bucket is public and can be accessed by anyone on the Internet. \"allUsers\" represents anyone on the Internet, and \"allAuthenticatedUsers\" represents anyone who is authenticated with a Google account; neither is constrained to users within your organization.","event_time":"2026-04-14-03:06","instance_name":"mplus-meet-live-web","instance_type":"google.cloud.storage.Bucket","resource_url":"https://console.cloud.google.com/storage/browser/mplus-meet-live-web;tab=permissions","scan_tool":"Security Command Center"}],"PUBLIC_IP_ADDRESS":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-07:47","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-07:42","instance_name":"webinar-01","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-07:47","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-07:42","instance_name":"webinar-gcp","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-07:47","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-07:42","instance_name":"stream-bot-om6","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-07:47","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-07:42","instance_name":"dev5-bbb-host","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-22-08:55","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-22-08:48","instance_name":"gitlab-prod","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-07:46","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-07:42","instance_name":"stream-bot-om3","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-07:47","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-07:42","instance_name":"stream-bot-om7","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-22-10:07","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-22-08:48","instance_name":"bbb-monitor","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-07:47","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-07:42","instance_name":"stream-bot-om10","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-22-08:55","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-22-08:48","instance_name":"bbb-monitor-free-01","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-07:47","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-07:42","instance_name":"pgadmin","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-22-10:07","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-22-08:48","instance_name":"scalelite-prod","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-22-10:07","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-22-08:48","instance_name":"om-20250507-075409","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-22-10:07","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-22-08:48","instance_name":"stream-bot-om-01","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-07:47","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-07:42","instance_name":"stream-bot-om2","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-07:46","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-07:42","instance_name":"stream-bot-om5","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-07:47","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-07:42","instance_name":"stream-bot-om9","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-22-08:54","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-22-08:48","instance_name":"om-1","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-22-10:07","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-22-08:48","instance_name":"git-backup-y260212","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-07:46","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-07:42","instance_name":"stream-bot-om4","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-07:47","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-07:42","instance_name":"stream-bot-om8","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-07:47","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-07:42","instance_name":"stream-bot-om1","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"}],"SSL_NOT_ENFORCED":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-22-10:07","description":"Use SSL for all incoming connections to your SQL database instance to secure data in transit. This control doesn't apply to on-premises databases or external instances.","event_time":"2026-03-22-08:48","instance_name":"greenlight-db","instance_type":"google.cloud.sql.Instance","resource_url":"","scan_tool":"Security Command Center"}]},"mplus-video-conference-dev":{"GKE_SECURITY_BULLETIN":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-13-23:21","description":"A vulnerability (CVE-2026-23111) has been discovered in the Linux kernel that can lead to privilege escalation on Container-Optimized OS nodes.","event_time":"2026-04-13-23:21","instance_name":"stress-cluster-1","instance_type":"google.container.Cluster","resource_url":"https://console.cloud.google.com/kubernetes/security/dashboard?project=mplus-video-conference-dev","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-06-23:16","description":"A vulnerability (CVE-2026-23273) has been discovered in the Linux kernel that can lead to privilege escalation on Container-Optimized OS nodes.","event_time":"2026-04-06-23:15","instance_name":"stress-cluster-1","instance_type":"google.container.Cluster","resource_url":"https://console.cloud.google.com/kubernetes/security/dashboard?project=mplus-video-conference-dev","scan_tool":"Security Command Center"}],"OPEN_CISCOSECURE_WEBSM_PORT":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:29","description":"Block incoming connections on TCP port 9090 from all IP addresses to help prevent undesired traffic and attacks on CiscoSecure/WebSM services.","event_time":"2026-03-20-03:28","instance_name":"allow-chat-server","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"}],"OPEN_FIREWALL":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-16-09:47","description":"Firewall rules that allow connections from all IP addresses or on all ports may expose resources to attackers.","event_time":"2026-03-16-09:47","instance_name":"allow-twm-scan","instance_type":"google.compute.Firewall","resource_url":"https://console.cloud.google.com/networking/firewalls/details/allow-twm-scan?project=mplus-video-conference-dev","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:28","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-03:28","instance_name":"allow-ai-coach-bot-staging-services","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:29","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-03:28","instance_name":"bbb-host-udp","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:29","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-03:28","instance_name":"bbb-redis","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:29","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-03:28","instance_name":"allow-fusion","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:28","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-03:28","instance_name":"allow-freeswitch","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:28","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-03:28","instance_name":"streaming-test","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:28","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-03:28","instance_name":"llama-test-8080","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:29","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-03:28","instance_name":"allow-rabbitmq","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:28","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-03:28","instance_name":"allow-freeswitch-demo","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:28","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-03:28","instance_name":"allow-ai-coach-bot-services","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:28","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-03:28","instance_name":"allow-chat-server","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:32","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-03:28","instance_name":"bbb-docker-test","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:28","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-03:28","instance_name":"default-allow-health-check-ipv6","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:36","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-03:28","instance_name":"http","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:34","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-03:28","instance_name":"default-allow-http","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:28","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-28-04:59","instance_name":"allow-twm-scan","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:38","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-03:28","instance_name":"bbb-freeswitch","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:28","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-03:28","instance_name":"mo-rocket-chat-inbound","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"}],"OPEN_HTTP_PORT":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:29","description":"Block incoming connections on TCP port 80 from all IP addresses to help prevent undesired traffic and attacks on HTTP services.","event_time":"2026-03-20-03:28","instance_name":"streaming-test","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:28","description":"Block incoming connections on TCP port 80 from all IP addresses to help prevent undesired traffic and attacks on HTTP services.","event_time":"2026-03-20-03:28","instance_name":"default-allow-http","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:28","description":"Block incoming connections on TCP port 80 from all IP addresses to help prevent undesired traffic and attacks on HTTP services.","event_time":"2026-03-20-03:28","instance_name":"bbb-docker-test","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:38","description":"Block incoming connections on TCP port 80 from all IP addresses to help prevent undesired traffic and attacks on HTTP services.","event_time":"2026-03-20-03:28","instance_name":"http","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"}],"OPEN_RDP_PORT":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:31","description":"Block incoming connections on TCP port 3389 or UDP port 3389 from all IP addresses to help prevent undesired traffic and attacks on RDP server.","event_time":"2026-03-20-03:28","instance_name":"mo-rocket-chat-inbound","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"}],"PUBLIC_BUCKET_ACL":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-14-18:23","description":"Anyone on the internet can change the IAM policy of this bucket, as well as edit and read its content. \"allUsers\" represents anyone on the Internet, and \"allAuthenticatedUsers\" represents anyone who is authenticated with a Google account; neither is constrained to users within your organization.","event_time":"2026-04-14-03:06","instance_name":"mplus-meet-client-dashboard","instance_type":"google.cloud.storage.Bucket","resource_url":"https://console.cloud.google.com/storage/browser/mplus-meet-client-dashboard;tab=permissions","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-14-14:00","description":"This bucket is public and can be accessed by anyone on the Internet. \"allUsers\" represents anyone on the Internet, and \"allAuthenticatedUsers\" represents anyone who is authenticated with a Google account; neither is constrained to users within your organization.","event_time":"2026-04-14-03:06","instance_name":"mplus-live-stream-backup","instance_type":"google.cloud.storage.Bucket","resource_url":"https://console.cloud.google.com/storage/browser/mplus-live-stream-backup;tab=permissions","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-14-17:42","description":"This bucket is public and can be accessed by anyone on the Internet. \"allUsers\" represents anyone on the Internet, and \"allAuthenticatedUsers\" represents anyone who is authenticated with a Google account; neither is constrained to users within your organization.","event_time":"2026-04-14-03:06","instance_name":"stt-yt-files","instance_type":"google.cloud.storage.Bucket","resource_url":"https://console.cloud.google.com/storage/browser/stt-yt-files;tab=permissions","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-14-19:08","description":"This bucket is public and can be accessed by anyone on the Internet. \"allUsers\" represents anyone on the Internet, and \"allAuthenticatedUsers\" represents anyone who is authenticated with a Google account; neither is constrained to users within your organization.","event_time":"2026-04-14-03:06","instance_name":"ai-coach-record","instance_type":"google.cloud.storage.Bucket","resource_url":"https://console.cloud.google.com/storage/browser/ai-coach-record;tab=permissions","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-14-20:52","description":"Anyone on the internet can change the IAM policy of this bucket, as well as edit and read its content. \"allUsers\" represents anyone on the Internet, and \"allAuthenticatedUsers\" represents anyone who is authenticated with a Google account; neither is constrained to users within your organization.","event_time":"2026-04-14-03:06","instance_name":"mplus-call-stage","instance_type":"google.cloud.storage.Bucket","resource_url":"https://console.cloud.google.com/storage/browser/mplus-call-stage;tab=permissions","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-14-14:00","description":"This bucket is public and can be accessed by anyone on the Internet. \"allUsers\" represents anyone on the Internet, and \"allAuthenticatedUsers\" represents anyone who is authenticated with a Google account; neither is constrained to users within your organization.","event_time":"2026-04-14-03:06","instance_name":"mplus-meeting-summary","instance_type":"google.cloud.storage.Bucket","resource_url":"https://console.cloud.google.com/storage/browser/mplus-meeting-summary;tab=permissions","scan_tool":"Security Command Center"}],"PUBLIC_IP_ADDRESS":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-11:35","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-11:20","instance_name":"stream-bot-om4","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:31","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-03:28","instance_name":"asr","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:32","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-03:28","instance_name":"scalelite-stage","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:29","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-03:28","instance_name":"gitlab-runner","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:28","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-03:28","instance_name":"dev6-win","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:39","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-03:28","instance_name":"webinar-stage4","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:33","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-03:28","instance_name":"mplus-pbx-demo","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:28","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-03:28","instance_name":"liaise","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-11:29","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-11:20","instance_name":"stream-bot-om1","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:39","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-03:28","instance_name":"redis-mplus-meet-micro-services-vm","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-11:26","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-11:20","instance_name":"llama-test","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:28","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-03:28","instance_name":"webinar-stage1","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:28","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-03:28","instance_name":"stage-sip-proxy","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:28","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-03:28","instance_name":"mplus-meet-cicd-dev","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-11:29","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-11:20","instance_name":"liaise-asr-job-staging","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-11:29","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-11:20","instance_name":"stream-bot-om10","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:29","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-03:28","instance_name":"ai-coach-om","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-11:30","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-11:20","instance_name":"liaise-jobs","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-11:32","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-11:20","instance_name":"stream-bot-om6","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:30","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-03:28","instance_name":"ai-coach-bot-staging","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:28","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-03:28","instance_name":"dev8-win","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:29","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-03:28","instance_name":"nextgen-meet-media-server-sit","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:29","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-03:28","instance_name":"dev8-bbb-host","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:38","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-03:28","instance_name":"ai-portal-league","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:28","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-03:28","instance_name":"ai-coach-bot","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-11:35","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-11:20","instance_name":"stream-bot-om2","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:28","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-03:28","instance_name":"military-taipbx-poc","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-11:31","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-11:20","instance_name":"stream-bot-om8","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-11:28","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-11:20","instance_name":"stream-bot-om9","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:33","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-03:28","instance_name":"stage-meet-dns","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:28","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-03:28","instance_name":"nextgen-meet-main-sit","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:28","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-03:28","instance_name":"gitlab-runner-ai","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:31","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-03:28","instance_name":"mplus-meet-packages-manager","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-11:29","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-11:20","instance_name":"stream-bot-om5","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:28","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-03:28","instance_name":"ai-coach-api-staging","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:28","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-03:28","instance_name":"rabbitmq-mplus-meet-1","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:29","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-03:28","instance_name":"dev-turn-host01","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:28","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-03:28","instance_name":"gitlab-runner-1","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-11:30","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-11:20","instance_name":"stream-server","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:28","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-03:28","instance_name":"dev2-win","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:28","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-03:28","instance_name":"rabbitmq-mplus-meet","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-11:28","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-11:20","instance_name":"stream-bot-om3","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:29","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-03:28","instance_name":"mplus-meet-transcripts","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:29","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-03:28","instance_name":"dev-redis-mplus-meet","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:29","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-03:28","instance_name":"dev2-bbb-host","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:28","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-03:28","instance_name":"aaron-dev","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:30","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-03:28","instance_name":"mplusplus-dev1","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:29","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-03:28","instance_name":"military-taipbx-poc-ap","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:28","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-03:28","instance_name":"dev6-bbb-host","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-11:28","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-11:20","instance_name":"stream-bot-om7","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:31","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-03:28","instance_name":"ai-coach-api","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"}],"SSL_NOT_ENFORCED":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:29","description":"Use SSL for all incoming connections to your SQL database instance to secure data in transit. This control doesn't apply to on-premises databases or external instances.","event_time":"2026-03-20-03:28","instance_name":"ds-bbb-db-postgresql","instance_type":"google.cloud.sql.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:28","description":"Use SSL for all incoming connections to your SQL database instance to secure data in transit. This control doesn't apply to on-premises databases or external instances.","event_time":"2026-03-20-03:28","instance_name":"ai-saas-voice","instance_type":"google.cloud.sql.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:31","description":"Use SSL for all incoming connections to your SQL database instance to secure data in transit. This control doesn't apply to on-premises databases or external instances.","event_time":"2026-03-20-03:28","instance_name":"mo-dev-postgresql","instance_type":"google.cloud.sql.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:28","description":"Use SSL for all incoming connections to your SQL database instance to secure data in transit. This control doesn't apply to on-premises databases or external instances.","event_time":"2026-03-20-03:28","instance_name":"mplus-dev-postgresql","instance_type":"google.cloud.sql.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:28","description":"Use SSL for all incoming connections to your SQL database instance to secure data in transit. This control doesn't apply to on-premises databases or external instances.","event_time":"2026-03-20-03:28","instance_name":"ai-mentor","instance_type":"google.cloud.sql.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:29","description":"Use SSL for all incoming connections to your SQL database instance to secure data in transit. This control doesn't apply to on-premises databases or external instances.","event_time":"2026-03-20-03:28","instance_name":"mplus-pre-prod","instance_type":"google.cloud.sql.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-03:28","description":"Use SSL for all incoming connections to your SQL database instance to secure data in transit. This control doesn't apply to on-premises databases or external instances.","event_time":"2026-03-20-03:28","instance_name":"liaise-db","instance_type":"google.cloud.sql.Instance","resource_url":"","scan_tool":"Security Command Center"}]},"myvideo-poc":{"PUBLIC_BUCKET_ACL":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-14-19:57","description":"This bucket is public and can be accessed by anyone on the Internet. \"allUsers\" represents anyone on the Internet, and \"allAuthenticatedUsers\" represents anyone who is authenticated with a Google account; neither is constrained to users within your organization.","event_time":"2026-04-14-03:06","instance_name":"myvideo-gcs","instance_type":"google.cloud.storage.Bucket","resource_url":"https://console.cloud.google.com/storage/browser/myvideo-gcs;tab=permissions","scan_tool":"Security Command Center"}]},"opbiz-340723":{"GKE_SECURITY_BULLETIN":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-06-22:57","description":"A vulnerability (CVE-2026-23273) has been discovered in the Linux kernel that can lead to privilege escalation on Container-Optimized OS nodes.","event_time":"2026-04-06-23:36","instance_name":"cluster-opbiz-prod","instance_type":"google.container.Cluster","resource_url":"https://console.cloud.google.com/kubernetes/security/dashboard?project=opbiz-340723","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-13-22:58","description":"A vulnerability (CVE-2026-23111) has been discovered in the Linux kernel that can lead to privilege escalation on Container-Optimized OS nodes.","event_time":"2026-04-13-22:57","instance_name":"cluster-opbiz-prod","instance_type":"google.container.Cluster","resource_url":"https://console.cloud.google.com/kubernetes/security/dashboard?project=opbiz-340723","scan_tool":"Security Command Center"}],"OPEN_CISCOSECURE_WEBSM_PORT":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-08-07:27","description":"Firewall rules that allow connections from all IP addresses on TCP port 9090 may expose CiscoSecure/WebSM services to attackers.","event_time":"2026-04-08-07:27","instance_name":"deny-ingress-all-opbizomp01-opbizomp02","instance_type":"google.compute.Firewall","resource_url":"https://console.cloud.google.com/networking/firewalls/details/deny-ingress-all-opbizomp01-opbizomp02?project=opbiz-340723","scan_tool":"Security Command Center"}],"OPEN_DIRECTORY_SERVICES_PORT":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-08-07:27","description":"Firewall rules that allow connections from all IP addresses on TCP port 445 or UDP port 445 may expose Directory Services to attackers.","event_time":"2026-04-08-07:27","instance_name":"deny-ingress-all-opbizomp01-opbizomp02","instance_type":"google.compute.Firewall","resource_url":"https://console.cloud.google.com/networking/firewalls/details/deny-ingress-all-opbizomp01-opbizomp02?project=opbiz-340723","scan_tool":"Security Command Center"}],"OPEN_FIREWALL":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-08-07:27","description":"Firewall rules that allow connections from all IP addresses or on all ports may expose resources to attackers.","event_time":"2026-04-08-07:27","instance_name":"deny-ingress-all-opbizomp01-opbizomp02","instance_type":"google.compute.Firewall","resource_url":"https://console.cloud.google.com/networking/firewalls/details/deny-ingress-all-opbizomp01-opbizomp02?project=opbiz-340723","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-09-16:42","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-04-09-16:40","instance_name":"deny-ingress-all-opbizomp01-opbizomp02","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"}],"OPEN_RDP_PORT":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-08-07:27","description":"Firewall rules that allow connections from all IP addresses on TCP port 3389 or UDP port 3389 may expose RDP services to attackers.","event_time":"2026-04-08-07:27","instance_name":"deny-ingress-all-opbizomp01-opbizomp02","instance_type":"google.compute.Firewall","resource_url":"https://console.cloud.google.com/networking/firewalls/details/deny-ingress-all-opbizomp01-opbizomp02?project=opbiz-340723","scan_tool":"Security Command Center"}],"OPEN_SSH_PORT":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-08-07:27","description":"Firewall rules that allow connections from all IP addresses on TCP port 22 or SCTP port 22 may expose SSH services to attackers.","event_time":"2026-04-08-07:27","instance_name":"deny-ingress-all-opbizomp01-opbizomp02","instance_type":"google.compute.Firewall","resource_url":"https://console.cloud.google.com/networking/firewalls/details/deny-ingress-all-opbizomp01-opbizomp02?project=opbiz-340723","scan_tool":"Security Command Center"}],"OPEN_TELNET_PORT":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-08-07:27","description":"Firewall rules that allow connections from all IP addresses on TCP port 23 may expose Telnet services to attackers.","event_time":"2026-04-08-07:27","instance_name":"deny-ingress-all-opbizomp01-opbizomp02","instance_type":"google.compute.Firewall","resource_url":"https://console.cloud.google.com/networking/firewalls/details/deny-ingress-all-opbizomp01-opbizomp02?project=opbiz-340723","scan_tool":"Security Command Center"}],"PUBLIC_BUCKET_ACL":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-14-17:30","description":"This bucket is public and can be accessed by anyone on the Internet. \"allUsers\" represents anyone on the Internet, and \"allAuthenticatedUsers\" represents anyone who is authenticated with a Google account; neither is constrained to users within your organization.","event_time":"2026-04-14-03:06","instance_name":"opbiz-cdn-prod","instance_type":"google.cloud.storage.Bucket","resource_url":"https://console.cloud.google.com/storage/browser/opbiz-cdn-prod;tab=permissions","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-14-20:53","description":"This bucket is public and can be accessed by anyone on the Internet. \"allUsers\" represents anyone on the Internet, and \"allAuthenticatedUsers\" represents anyone who is authenticated with a Google account; neither is constrained to users within your organization.","event_time":"2026-04-14-03:06","instance_name":"opbiz_static_web","instance_type":"google.cloud.storage.Bucket","resource_url":"https://console.cloud.google.com/storage/browser/opbiz_static_web;tab=permissions","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-14-19:34","description":"This bucket is public and can be accessed by anyone on the Internet. \"allUsers\" represents anyone on the Internet, and \"allAuthenticatedUsers\" represents anyone who is authenticated with a Google account; neither is constrained to users within your organization.","event_time":"2026-04-14-03:06","instance_name":"opbiz-store-web-prod","instance_type":"google.cloud.storage.Bucket","resource_url":"https://console.cloud.google.com/storage/browser/opbiz-store-web-prod;tab=permissions","scan_tool":"Security Command Center"}],"PUBLIC_IP_ADDRESS":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-01:56","description":"To reduce the attack surface, avoid assigning public IP addresses to your VMs. Stopped instances may still be flagged with a Public IP finding, e.g. if the network interfaces are configured to assign an ephemeral public IP on start. Ensure the network configurations for stopped instances do not include external access.","event_time":"2026-03-20-02:00","instance_name":"opbizomp01","instance_type":"google.compute.Instance","resource_url":"https://console.cloud.google.com/compute/instancesDetail/zones/asia-east1-c/instances/opbizomp01?project=opbiz-340723","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-02:02","description":"To reduce the attack surface, avoid assigning public IP addresses to your VMs. Stopped instances may still be flagged with a Public IP finding, e.g. if the network interfaces are configured to assign an ephemeral public IP on start. Ensure the network configurations for stopped instances do not include external access.","event_time":"2026-03-20-02:02","instance_name":"opbizomp02","instance_type":"google.compute.Instance","resource_url":"https://console.cloud.google.com/compute/instancesDetail/zones/asia-east1-c/instances/opbizomp02?project=opbiz-340723","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-28-04:59","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-28-04:59","instance_name":"opbizomp01","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-28-04:59","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-28-04:59","instance_name":"opbizomp02","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"}]},"opbiz-stage":{"GKE_HOST_NAMESPACES":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-14-07:15","description":"Pods that share host namespaces allow Pod processes to communicate with host processes and gather host information, which could lead to a container escape.","event_time":"2026-03-14-00:40","instance_name":"stage","instance_type":"google.container.Cluster","resource_url":"https://console.cloud.google.com/kubernetes/security/dashboard?project=opbiz-stage","scan_tool":"Security Command Center"}],"GKE_SECURITY_BULLETIN":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-13-23:13","description":"A vulnerability (CVE-2026-23111) has been discovered in the Linux kernel that can lead to privilege escalation on Container-Optimized OS nodes.","event_time":"2026-04-13-23:12","instance_name":"stage","instance_type":"google.container.Cluster","resource_url":"https://console.cloud.google.com/kubernetes/security/dashboard?project=opbiz-stage","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-06-22:50","description":"A vulnerability (CVE-2026-23273) has been discovered in the Linux kernel that can lead to privilege escalation on Container-Optimized OS nodes.","event_time":"2026-04-06-23:34","instance_name":"stage","instance_type":"google.container.Cluster","resource_url":"https://console.cloud.google.com/kubernetes/security/dashboard?project=opbiz-stage","scan_tool":"Security Command Center"}],"OPEN_FIREWALL":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-04:55","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-04:55","instance_name":"allow-livekit-udp-50000","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"}],"PUBLIC_BUCKET_ACL":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-14-14:34","description":"This bucket is public and can be accessed by anyone on the Internet. \"allUsers\" represents anyone on the Internet, and \"allAuthenticatedUsers\" represents anyone who is authenticated with a Google account; neither is constrained to users within your organization.","event_time":"2026-04-14-03:06","instance_name":"opbiz-stage","instance_type":"google.cloud.storage.Bucket","resource_url":"https://console.cloud.google.com/storage/browser/opbiz-stage;tab=permissions","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-14-16:05","description":"This bucket is public and can be accessed by anyone on the Internet. \"allUsers\" represents anyone on the Internet, and \"allAuthenticatedUsers\" represents anyone who is authenticated with a Google account; neither is constrained to users within your organization.","event_time":"2026-04-14-03:06","instance_name":"opbiz_staic_web_2","instance_type":"google.cloud.storage.Bucket","resource_url":"https://console.cloud.google.com/storage/browser/opbiz_staic_web_2;tab=permissions","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-14-17:04","description":"This bucket is public and can be accessed by anyone on the Internet. \"allUsers\" represents anyone on the Internet, and \"allAuthenticatedUsers\" represents anyone who is authenticated with a Google account; neither is constrained to users within your organization.","event_time":"2026-04-14-03:06","instance_name":"opbiz-store-web","instance_type":"google.cloud.storage.Bucket","resource_url":"https://console.cloud.google.com/storage/browser/opbiz-store-web;tab=permissions","scan_tool":"Security Command Center"}],"PUBLIC_IP_ADDRESS":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-11-02:17","description":"To reduce the attack surface, avoid assigning public IP addresses to your VMs. Stopped instances may still be flagged with a Public IP finding, e.g. if the network interfaces are configured to assign an ephemeral public IP on start. Ensure the network configurations for stopped instances do not include external access.","event_time":"2026-03-12-02:14","instance_name":"opbizstageom02","instance_type":"google.compute.Instance","resource_url":"https://console.cloud.google.com/compute/instancesDetail/zones/asia-east1-a/instances/opbizstageomd02?project=opbiz-stage","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-11-02:11","description":"To reduce the attack surface, avoid assigning public IP addresses to your VMs. Stopped instances may still be flagged with a Public IP finding, e.g. if the network interfaces are configured to assign an ephemeral public IP on start. Ensure the network configurations for stopped instances do not include external access.","event_time":"2026-03-12-02:04","instance_name":"opbizstageom01","instance_type":"google.compute.Instance","resource_url":"https://console.cloud.google.com/compute/instancesDetail/zones/asia-east1-a/instances/opbizstageomd01?project=opbiz-stage","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-04:55","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-04:55","instance_name":"opbizstageomd01","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-04:56","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-04:55","instance_name":"opbizstageomd02","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"}]},"smallcallcenter-dev":{"OPEN_FIREWALL":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-06:17","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-06:11","instance_name":"instant14-freepbx-public-test-ing","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"}]},"test-k8s-290308":{"OPEN_FIREWALL":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-05:55","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-05:17","instance_name":"default-allow-health-check-ipv6","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-05:29","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-05:17","instance_name":"mchat-vm","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-05:56","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-05:17","instance_name":"default-allow-http","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-05:50","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-05:17","instance_name":"mchat-mongodb-vm","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-10:55","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-05:17","instance_name":"allow-rancher-server","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-06:04","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-05:17","instance_name":"default-allow-health-check","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"}],"OPEN_HTTP_PORT":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-05:51","description":"Block incoming connections on TCP port 80 from all IP addresses to help prevent undesired traffic and attacks on HTTP services.","event_time":"2026-03-20-05:17","instance_name":"default-allow-http","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-05:51","description":"Block incoming connections on TCP port 80 from all IP addresses to help prevent undesired traffic and attacks on HTTP services.","event_time":"2026-03-20-05:17","instance_name":"mchat-mongodb-vm","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"}],"OPEN_RDP_PORT":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-05:22","description":"Block incoming connections on TCP port 3389 or UDP port 3389 from all IP addresses to help prevent undesired traffic and attacks on RDP server.","event_time":"2026-03-20-05:17","instance_name":"stress-3389","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"}],"OPEN_SSH_PORT":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-05:45","description":"Block incoming connections on TCP port 22 or SCTP port 22 from all IP addresses to help prevent undesired traffic and attacks on SSH server.","event_time":"2026-03-20-05:17","instance_name":"mchat-mongodb-vm","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-05:29","description":"Block incoming connections on TCP port 22 or SCTP port 22 from all IP addresses to help prevent undesired traffic and attacks on SSH server.","event_time":"2026-03-20-05:17","instance_name":"mchat-vm","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"}],"PUBLIC_IP_ADDRESS":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-05:19","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-05:17","instance_name":"stress-test","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"}]},"tms-p-387208":{"OPEN_FIREWALL":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-11:41","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-11:41","instance_name":"allow-twm-hostscan","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"}],"PUBLIC_IP_ADDRESS":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-12:03","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-11:46","instance_name":"tmsspp01","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-11:41","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-11:41","instance_name":"tmsomp01","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"}],"SSL_NOT_ENFORCED":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-12:04","description":"Use SSL for all incoming connections to your SQL database instance to secure data in transit. This control doesn't apply to on-premises databases or external instances.","event_time":"2026-03-20-11:46","instance_name":"tmsprddb","instance_type":"google.cloud.sql.Instance","resource_url":"","scan_tool":"Security Command Center"}]},"tms-stage-356007":{"CONTAINER_IMAGE_VULNERABILITY":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-19-01:47","description":"","event_time":"2026-03-19-01:47","instance_name":"projects/tms-stage-356007/locations/asia-east1/repositories/uat-harbor2/dockerImages/uat-uiapi@sha256:6ad595eb15a892ab40b31b97a9a0a1dd2c2055d232f08d8a9450343ba9a52761","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-21-02:21","description":"","event_time":"2026-03-21-02:21","instance_name":"projects/tms-stage-356007/locations/asia-east1/repositories/uat-harbor2/dockerImages/uat-uiapi@sha256:977a4528811ce541ee0703543690d1d524b411cda05f3f8751f8881e0bb013c3","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:40","description":"","event_time":"2026-04-12-02:40","instance_name":"projects/tms-stage-356007/locations/asia-east1/repositories/uat-harbor2/dockerImages/uat-uiapi@sha256:db702afa506592e56af067dab7fee40dedf9b5b465d347d420d89521a6e9e7fa","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-01:56","description":"","event_time":"2026-04-15-01:56","instance_name":"projects/tms-stage-356007/locations/asia-east1/repositories/uat-harbor2/dockerImages/uat-uiapi@sha256:98c393f1def2d44213fd6582f97264d7565bc3bf9579ce88b05659929f21c310","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-01-01:32","description":"","event_time":"2026-04-01-01:32","instance_name":"projects/tms-stage-356007/locations/asia-east1/repositories/uat-harbor2/dockerImages/uat-uiapi@sha256:d4f2af0bd24abc2bf534781b8d9aa2a8feb1eff0f9e09d0d786bf75ed910f6ac","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-01-01:55","description":"","event_time":"2026-04-01-01:55","instance_name":"projects/tms-stage-356007/locations/asia-east1/repositories/uat-harbor2/dockerImages/uat-uiapi@sha256:6ad595eb15a892ab40b31b97a9a0a1dd2c2055d232f08d8a9450343ba9a52761","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:18","description":"","event_time":"2026-04-12-02:18","instance_name":"projects/tms-stage-356007/locations/asia-east1/repositories/uat-harbor2/dockerImages/uat-uiapi@sha256:c8f0997bf79efc44b4b881f61ff51f7a58abf16c1daaa8ba1f0b9ddbe2389a0e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:16","description":"","event_time":"2026-04-12-02:16","instance_name":"projects/tms-stage-356007/locations/asia-east1/repositories/uat-harbor2/dockerImages/uat-uiapi@sha256:9bfe642e6ad477bcfd1ca626e9ab44ff865dddbd31362bf30bb982e6cc1948db","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-01:57","description":"","event_time":"2026-04-15-01:57","instance_name":"projects/tms-stage-356007/locations/asia-east1/repositories/uat-harbor2/dockerImages/uat-uiapi@sha256:326b66a4b88a954484ad106e1266a756ca3e59f3df707bbd69ceb6868977dc97","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:41","description":"","event_time":"2026-04-12-02:41","instance_name":"","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-17-01:36","description":"","event_time":"2026-03-17-01:36","instance_name":"projects/tms-stage-356007/locations/asia-east1/repositories/uat-harbor2/dockerImages/uat-uiapi@sha256:58062659d858b61b02da26921714372b511a78d26a9ed0ee057fa02c421c6213","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-31-01:49","description":"","event_time":"2026-03-31-01:49","instance_name":"projects/tms-stage-356007/locations/asia-east1/repositories/uat-harbor2/dockerImages/uat-uiapi@sha256:db702afa506592e56af067dab7fee40dedf9b5b465d347d420d89521a6e9e7fa","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:12","description":"","event_time":"2026-04-15-02:12","instance_name":"projects/tms-stage-356007/locations/asia-east1/repositories/uat-harbor2/dockerImages/uat-uiapi@sha256:98c393f1def2d44213fd6582f97264d7565bc3bf9579ce88b05659929f21c310","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:44","description":"","event_time":"2026-04-12-02:44","instance_name":"","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:14","description":"","event_time":"2026-04-15-02:14","instance_name":"projects/tms-stage-356007/locations/asia-east1/repositories/uat-harbor2/dockerImages/uat-uiapi@sha256:98c393f1def2d44213fd6582f97264d7565bc3bf9579ce88b05659929f21c310","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:46","description":"","event_time":"2026-04-12-02:46","instance_name":"projects/tms-stage-356007/locations/asia-east1/repositories/uat-harbor2/dockerImages/uat-uiapi@sha256:d4f2af0bd24abc2bf534781b8d9aa2a8feb1eff0f9e09d0d786bf75ed910f6ac","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:20","description":"","event_time":"2026-04-12-02:20","instance_name":"projects/tms-stage-356007/locations/asia-east1/repositories/uat-harbor2/dockerImages/uat-uiapi@sha256:977a4528811ce541ee0703543690d1d524b411cda05f3f8751f8881e0bb013c3","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-19-01:54","description":"","event_time":"2026-03-19-01:54","instance_name":"projects/tms-stage-356007/locations/asia-east1/repositories/uat-harbor2/dockerImages/uat-uiapi@sha256:6ad595eb15a892ab40b31b97a9a0a1dd2c2055d232f08d8a9450343ba9a52761","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:37","description":"","event_time":"2026-04-12-02:37","instance_name":"projects/tms-stage-356007/locations/asia-east1/repositories/uat-harbor2/dockerImages/uat-uiapi@sha256:58062659d858b61b02da26921714372b511a78d26a9ed0ee057fa02c421c6213","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:36","description":"","event_time":"2026-04-12-02:36","instance_name":"projects/tms-stage-356007/locations/asia-east1/repositories/uat-harbor2/dockerImages/uat-uiapi@sha256:977a4528811ce541ee0703543690d1d524b411cda05f3f8751f8881e0bb013c3","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:47","description":"","event_time":"2026-04-12-02:47","instance_name":"projects/tms-stage-356007/locations/asia-east1/repositories/uat-harbor2/dockerImages/uat-uiapi@sha256:6ad595eb15a892ab40b31b97a9a0a1dd2c2055d232f08d8a9450343ba9a52761","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-01-01:49","description":"","event_time":"2026-04-01-01:49","instance_name":"projects/tms-stage-356007/locations/asia-east1/repositories/uat-harbor2/dockerImages/uat-uiapi@sha256:58062659d858b61b02da26921714372b511a78d26a9ed0ee057fa02c421c6213","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-01-01:16","description":"","event_time":"2026-04-01-01:16","instance_name":"projects/tms-stage-356007/locations/asia-east1/repositories/uat-harbor2/dockerImages/uat-uiapi@sha256:20c64ee82f2016b0484c01efd9ae20160a64762c8e2a1a4acfa5c6e8645589d3","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:15","description":"","event_time":"2026-04-12-02:15","instance_name":"projects/tms-stage-356007/locations/asia-east1/repositories/uat-harbor2/dockerImages/uat-uiapi@sha256:9bfe642e6ad477bcfd1ca626e9ab44ff865dddbd31362bf30bb982e6cc1948db","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-10-04:20","description":"","event_time":"2026-04-10-04:20","instance_name":"projects/tms-stage-356007/locations/asia-east1/repositories/uat-harbor2/dockerImages/uat-uiapi@sha256:20c64ee82f2016b0484c01efd9ae20160a64762c8e2a1a4acfa5c6e8645589d3","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:05","description":"","event_time":"2026-04-15-02:05","instance_name":"projects/tms-stage-356007/locations/asia-east1/repositories/uat-harbor2/dockerImages/uat-uiapi@sha256:326b66a4b88a954484ad106e1266a756ca3e59f3df707bbd69ceb6868977dc97","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:26","description":"","event_time":"2026-04-12-02:26","instance_name":"projects/tms-stage-356007/locations/asia-east1/repositories/uat-harbor2/dockerImages/uat-uiapi@sha256:c8f0997bf79efc44b4b881f61ff51f7a58abf16c1daaa8ba1f0b9ddbe2389a0e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:43","description":"","event_time":"2026-04-12-02:43","instance_name":"","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:34","description":"","event_time":"2026-04-12-02:34","instance_name":"projects/tms-stage-356007/locations/asia-east1/repositories/uat-harbor2/dockerImages/uat-uiapi@sha256:db702afa506592e56af067dab7fee40dedf9b5b465d347d420d89521a6e9e7fa","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-17-01:27","description":"","event_time":"2026-03-17-01:27","instance_name":"projects/tms-stage-356007/locations/asia-east1/repositories/uat-harbor2/dockerImages/uat-uiapi@sha256:58062659d858b61b02da26921714372b511a78d26a9ed0ee057fa02c421c6213","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:18","description":"","event_time":"2026-04-15-02:18","instance_name":"projects/tms-stage-356007/locations/asia-east1/repositories/uat-harbor2/dockerImages/uat-uiapi@sha256:326b66a4b88a954484ad106e1266a756ca3e59f3df707bbd69ceb6868977dc97","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:46","description":"","event_time":"2026-04-12-02:46","instance_name":"","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-01:50","description":"","event_time":"2026-03-20-01:50","instance_name":"projects/tms-stage-356007/locations/asia-east1/repositories/uat-harbor2/dockerImages/uat-uiapi@sha256:c8f0997bf79efc44b4b881f61ff51f7a58abf16c1daaa8ba1f0b9ddbe2389a0e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:46","description":"","event_time":"2026-04-12-02:46","instance_name":"projects/tms-stage-356007/locations/asia-east1/repositories/uat-harbor2/dockerImages/uat-uiapi@sha256:d4f2af0bd24abc2bf534781b8d9aa2a8feb1eff0f9e09d0d786bf75ed910f6ac","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-31-02:32","description":"","event_time":"2026-03-31-02:32","instance_name":"projects/tms-stage-356007/locations/asia-east1/repositories/uat-harbor2/dockerImages/uat-uiapi@sha256:db702afa506592e56af067dab7fee40dedf9b5b465d347d420d89521a6e9e7fa","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:35","description":"","event_time":"2026-04-12-02:35","instance_name":"","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-18-02:22","description":"","event_time":"2026-03-18-02:22","instance_name":"projects/tms-stage-356007/locations/asia-east1/repositories/uat-harbor2/dockerImages/uat-uiapi@sha256:d4f2af0bd24abc2bf534781b8d9aa2a8feb1eff0f9e09d0d786bf75ed910f6ac","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:25","description":"","event_time":"2026-04-15-02:25","instance_name":"projects/tms-stage-356007/locations/asia-east1/repositories/uat-harbor2/dockerImages/uat-uiapi@sha256:98c393f1def2d44213fd6582f97264d7565bc3bf9579ce88b05659929f21c310","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-31-02:01","description":"","event_time":"2026-03-31-02:01","instance_name":"projects/tms-stage-356007/locations/asia-east1/repositories/uat-harbor2/dockerImages/uat-uiapi@sha256:db702afa506592e56af067dab7fee40dedf9b5b465d347d420d89521a6e9e7fa","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-01-01:45","description":"","event_time":"2026-04-01-01:45","instance_name":"projects/tms-stage-356007/locations/asia-east1/repositories/uat-harbor2/dockerImages/uat-uiapi@sha256:9bfe642e6ad477bcfd1ca626e9ab44ff865dddbd31362bf30bb982e6cc1948db","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:42","description":"","event_time":"2026-04-12-02:42","instance_name":"","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:45","description":"","event_time":"2026-04-12-02:45","instance_name":"projects/tms-stage-356007/locations/asia-east1/repositories/uat-harbor2/dockerImages/uat-uiapi@sha256:d4f2af0bd24abc2bf534781b8d9aa2a8feb1eff0f9e09d0d786bf75ed910f6ac","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-01:28","description":"","event_time":"2026-03-20-01:28","instance_name":"projects/tms-stage-356007/locations/asia-east1/repositories/uat-harbor2/dockerImages/uat-uiapi@sha256:c8f0997bf79efc44b4b881f61ff51f7a58abf16c1daaa8ba1f0b9ddbe2389a0e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:16","description":"","event_time":"2026-04-15-02:16","instance_name":"projects/tms-stage-356007/locations/asia-east1/repositories/uat-harbor2/dockerImages/uat-uiapi@sha256:326b66a4b88a954484ad106e1266a756ca3e59f3df707bbd69ceb6868977dc97","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-18-02:06","description":"","event_time":"2026-03-18-02:06","instance_name":"projects/tms-stage-356007/locations/asia-east1/repositories/uat-harbor2/dockerImages/uat-uiapi@sha256:d4f2af0bd24abc2bf534781b8d9aa2a8feb1eff0f9e09d0d786bf75ed910f6ac","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:39","description":"","event_time":"2026-04-12-02:39","instance_name":"projects/tms-stage-356007/locations/asia-east1/repositories/uat-harbor2/dockerImages/uat-uiapi@sha256:58062659d858b61b02da26921714372b511a78d26a9ed0ee057fa02c421c6213","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:42","description":"","event_time":"2026-04-12-02:42","instance_name":"","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:40","description":"","event_time":"2026-04-12-02:40","instance_name":"","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-01-01:43","description":"","event_time":"2026-04-01-01:43","instance_name":"projects/tms-stage-356007/locations/asia-east1/repositories/uat-harbor2/dockerImages/uat-uiapi@sha256:d41457c5e064be4f4a0b447a9bfcd637141adf0122e82e2418c610b266f147cc","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:40","description":"","event_time":"2026-04-15-02:40","instance_name":"projects/tms-stage-356007/locations/asia-east1/repositories/uat-harbor2/dockerImages/uat-uiapi@sha256:98c393f1def2d44213fd6582f97264d7565bc3bf9579ce88b05659929f21c310","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:51","description":"","event_time":"2026-04-12-02:51","instance_name":"projects/tms-stage-356007/locations/asia-east1/repositories/uat-harbor2/dockerImages/uat-uiapi@sha256:c8f0997bf79efc44b4b881f61ff51f7a58abf16c1daaa8ba1f0b9ddbe2389a0e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:52","description":"","event_time":"2026-04-12-02:52","instance_name":"projects/tms-stage-356007/locations/asia-east1/repositories/uat-harbor2/dockerImages/uat-uiapi@sha256:6ad595eb15a892ab40b31b97a9a0a1dd2c2055d232f08d8a9450343ba9a52761","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:52","description":"","event_time":"2026-04-12-02:52","instance_name":"projects/tms-stage-356007/locations/asia-east1/repositories/uat-harbor2/dockerImages/uat-uiapi@sha256:9bfe642e6ad477bcfd1ca626e9ab44ff865dddbd31362bf30bb982e6cc1948db","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:13","description":"","event_time":"2026-04-15-02:13","instance_name":"projects/tms-stage-356007/locations/asia-east1/repositories/uat-harbor2/dockerImages/uat-uiapi@sha256:326b66a4b88a954484ad106e1266a756ca3e59f3df707bbd69ceb6868977dc97","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-31-01:59","description":"","event_time":"2026-03-31-01:59","instance_name":"projects/tms-stage-356007/locations/asia-east1/repositories/uat-harbor2/dockerImages/uat-uiapi@sha256:db702afa506592e56af067dab7fee40dedf9b5b465d347d420d89521a6e9e7fa","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-01:26","description":"","event_time":"2026-03-20-01:26","instance_name":"projects/tms-stage-356007/locations/asia-east1/repositories/uat-harbor2/dockerImages/uat-uiapi@sha256:c8f0997bf79efc44b4b881f61ff51f7a58abf16c1daaa8ba1f0b9ddbe2389a0e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:48","description":"","event_time":"2026-04-12-02:48","instance_name":"projects/tms-stage-356007/locations/asia-east1/repositories/uat-harbor2/dockerImages/uat-uiapi@sha256:6ad595eb15a892ab40b31b97a9a0a1dd2c2055d232f08d8a9450343ba9a52761","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:30","description":"","event_time":"2026-04-12-02:30","instance_name":"projects/tms-stage-356007/locations/asia-east1/repositories/uat-harbor2/dockerImages/uat-uiapi@sha256:db702afa506592e56af067dab7fee40dedf9b5b465d347d420d89521a6e9e7fa","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-01:49","description":"","event_time":"2026-04-15-01:49","instance_name":"projects/tms-stage-356007/locations/asia-east1/repositories/uat-harbor2/dockerImages/uat-uiapi@sha256:326b66a4b88a954484ad106e1266a756ca3e59f3df707bbd69ceb6868977dc97","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-21-02:27","description":"","event_time":"2026-03-21-02:27","instance_name":"projects/tms-stage-356007/locations/asia-east1/repositories/uat-harbor2/dockerImages/uat-uiapi@sha256:977a4528811ce541ee0703543690d1d524b411cda05f3f8751f8881e0bb013c3","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:23","description":"","event_time":"2026-04-12-02:23","instance_name":"","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:35","description":"","event_time":"2026-04-15-02:35","instance_name":"projects/tms-stage-356007/locations/asia-east1/repositories/uat-harbor2/dockerImages/uat-uiapi@sha256:98c393f1def2d44213fd6582f97264d7565bc3bf9579ce88b05659929f21c310","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-01-01:15","description":"","event_time":"2026-04-01-01:15","instance_name":"projects/tms-stage-356007/locations/asia-east1/repositories/uat-harbor2/dockerImages/uat-uiapi@sha256:db702afa506592e56af067dab7fee40dedf9b5b465d347d420d89521a6e9e7fa","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:48","description":"","event_time":"2026-04-12-02:48","instance_name":"projects/tms-stage-356007/locations/asia-east1/repositories/uat-harbor2/dockerImages/uat-uiapi@sha256:977a4528811ce541ee0703543690d1d524b411cda05f3f8751f8881e0bb013c3","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-01:34","description":"","event_time":"2026-03-20-01:34","instance_name":"projects/tms-stage-356007/locations/asia-east1/repositories/uat-harbor2/dockerImages/uat-uiapi@sha256:c8f0997bf79efc44b4b881f61ff51f7a58abf16c1daaa8ba1f0b9ddbe2389a0e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:37","description":"","event_time":"2026-04-12-02:37","instance_name":"","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:12","description":"","event_time":"2026-04-15-02:12","instance_name":"projects/tms-stage-356007/locations/asia-east1/repositories/uat-harbor2/dockerImages/uat-uiapi@sha256:326b66a4b88a954484ad106e1266a756ca3e59f3df707bbd69ceb6868977dc97","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:35","description":"","event_time":"2026-04-15-02:35","instance_name":"projects/tms-stage-356007/locations/asia-east1/repositories/uat-harbor2/dockerImages/uat-uiapi@sha256:98c393f1def2d44213fd6582f97264d7565bc3bf9579ce88b05659929f21c310","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-02:22","description":"","event_time":"2026-04-15-02:22","instance_name":"projects/tms-stage-356007/locations/asia-east1/repositories/uat-harbor2/dockerImages/uat-uiapi@sha256:326b66a4b88a954484ad106e1266a756ca3e59f3df707bbd69ceb6868977dc97","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-19-01:50","description":"","event_time":"2026-03-19-01:50","instance_name":"projects/tms-stage-356007/locations/asia-east1/repositories/uat-harbor2/dockerImages/uat-uiapi@sha256:6ad595eb15a892ab40b31b97a9a0a1dd2c2055d232f08d8a9450343ba9a52761","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-19-01:49","description":"","event_time":"2026-03-19-01:49","instance_name":"projects/tms-stage-356007/locations/asia-east1/repositories/uat-harbor2/dockerImages/uat-uiapi@sha256:6ad595eb15a892ab40b31b97a9a0a1dd2c2055d232f08d8a9450343ba9a52761","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-15-01:44","description":"","event_time":"2026-04-15-01:44","instance_name":"projects/tms-stage-356007/locations/asia-east1/repositories/uat-harbor2/dockerImages/uat-uiapi@sha256:98c393f1def2d44213fd6582f97264d7565bc3bf9579ce88b05659929f21c310","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:21","description":"","event_time":"2026-04-12-02:21","instance_name":"","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-01-01:24","description":"","event_time":"2026-04-01-01:24","instance_name":"projects/tms-stage-356007/locations/asia-east1/repositories/uat-harbor2/dockerImages/uat-uiapi@sha256:c8f0997bf79efc44b4b881f61ff51f7a58abf16c1daaa8ba1f0b9ddbe2389a0e","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-01-01:43","description":"","event_time":"2026-04-01-01:43","instance_name":"projects/tms-stage-356007/locations/asia-east1/repositories/uat-harbor2/dockerImages/uat-uiapi@sha256:977a4528811ce541ee0703543690d1d524b411cda05f3f8751f8881e0bb013c3","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:33","description":"","event_time":"2026-04-12-02:33","instance_name":"","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-21-02:28","description":"","event_time":"2026-03-21-02:28","instance_name":"projects/tms-stage-356007/locations/asia-east1/repositories/uat-harbor2/dockerImages/uat-uiapi@sha256:977a4528811ce541ee0703543690d1d524b411cda05f3f8751f8881e0bb013c3","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-17-01:25","description":"","event_time":"2026-03-17-01:25","instance_name":"projects/tms-stage-356007/locations/asia-east1/repositories/uat-harbor2/dockerImages/uat-uiapi@sha256:58062659d858b61b02da26921714372b511a78d26a9ed0ee057fa02c421c6213","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:44","description":"","event_time":"2026-04-12-02:44","instance_name":"","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-18-02:17","description":"","event_time":"2026-03-18-02:17","instance_name":"projects/tms-stage-356007/locations/asia-east1/repositories/uat-harbor2/dockerImages/uat-uiapi@sha256:d4f2af0bd24abc2bf534781b8d9aa2a8feb1eff0f9e09d0d786bf75ed910f6ac","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:24","description":"","event_time":"2026-04-12-02:24","instance_name":"","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:41","description":"","event_time":"2026-04-12-02:41","instance_name":"","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-04-12-02:42","description":"","event_time":"2026-04-12-02:42","instance_name":"projects/tms-stage-356007/locations/asia-east1/repositories/uat-harbor2/dockerImages/uat-uiapi@sha256:58062659d858b61b02da26921714372b511a78d26a9ed0ee057fa02c421c6213","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"},{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-21-02:20","description":"","event_time":"2026-03-21-02:20","instance_name":"projects/tms-stage-356007/locations/asia-east1/repositories/uat-harbor2/dockerImages/uat-uiapi@sha256:977a4528811ce541ee0703543690d1d524b411cda05f3f8751f8881e0bb013c3","instance_type":"google.artifactregistry.DockerImage","resource_url":"","scan_tool":"Security Command Center"}],"OPEN_FIREWALL":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-05:01","description":"Firewall rules that permit connections from all IP addresses, like 0.0.0.0/0, or from all ports expose resources to attacks from unintended sources. This control creates a violation for ingress firewall rules with \"allow\" actions if one of the following items are true: First, the source ranges includes 0.0.0.0/0 and allowed protocols don't specify ICMP and TCP protocols with port 443. Second, the allowed rule permits all protocols or permits TCP or UDP protocols without port restrictions.","event_time":"2026-03-20-04:55","instance_name":"allow-twm-hostscan","instance_type":"google.compute.Firewall","resource_url":"","scan_tool":"Security Command Center"}],"PUBLIC_IP_ADDRESS":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-04:55","description":"Don't assign public IP addresses to Compute Engine instances. A Compute Engine instance with a public IP address increases attack surface. This control checks network interfaces to determine whether they define external IP addresses. This control doesn't check GKE or Dataflow instances.","event_time":"2026-03-20-04:55","instance_name":"tmsomu01","instance_type":"google.compute.Instance","resource_url":"","scan_tool":"Security Command Center"}],"SSL_NOT_ENFORCED":[{"check_time":"2026/04/15 12:38","cloud_type":"GCP","create_time":"2026-03-20-04:56","description":"Use SSL for all incoming connections to your SQL database instance to secure data in transit. This control doesn't apply to on-premises databases or external instances.","event_time":"2026-03-20-04:55","instance_name":"tmspoc-taipei","instance_type":"google.cloud.sql.Instance","resource_url":"","scan_tool":"Security Command Center"}]}}
