Live: 1,247 resources scanned in the last hour

You can't defend
what you can't
see.

VisibleCloud scans your GCP estate in minutes, maps every resource, scores every misconfiguration against CIS GCP 1.3, and produces the compliance evidence your auditors actually accept.

Self-hosted. Read-only. Your data never leaves your VPC.

Read-only credentials No telemetry, no phone-home Runs in your VPC
visiblecloud · scan
LIVE

              
visiblecloud · topology
MAPPING
project · prod-analytics vpc · prod-vpc · 10.0.0.0/16 web-tier 10.0.1.0/24 web-1 web-2 web-3 app-tier 10.0.2.0/24 app-1 app-2 data-tier 10.0.3.0/24 cloud-sql gcs · analytics-exports-prod ⚠ publicly readable iam 23 bindings · 4 roles svc-accts 9 active · 2 keys findings · 12 critical · 31 high ▸ public gcs bucket ▸ broad iam grant ▸ no flow logs ▸ legacy disk image ▸ unused service-account key + 38 more …
visiblecloud · compliance · KSA NCA · ECC
EVALUATING
0
Average full scan
0
GCP services covered
0
CIS controls evaluated
0
Bytes leaving your VPC
Who it's for

Four teams. One source of truth.

Cloud
Cloud teams

"What's running, where, and is it documented?" Inventory, topology, IaC export, drift detection.

Security
Security teams

"What's exposed, what's misconfigured, what's the blast radius?" CIS-aligned scoring, attack-surface views, identity health.

Compliance
Compliance teams

"Can we attest? With evidence? Across frameworks?" Control catalogues for ECC, DCC, ISO 27001, NIST, ISR — with auditor sign-off baked in.

Digital
Digital teams

"Where is the architecture document? Is it current?" Word-grade design docs, governance views, project hierarchies, generated from live state.

What it does

Six things you'd build yourself.
If you had the time.

Discover.

Every VPC. Every IAM grant. Every bucket nobody owns. Across every project, in minutes — via the same Cloud Asset APIs your platform team probably ignores.

Score.

CIS GCP 1.3 + custom rules. Severity-ranked. Evidence-linked. Critical findings clickable straight to the offending resource — no swivel-chair across six dashboards.

Attest.

Auditor sign-off lives in the same tool as the technical evidence. Every attestation is signed by a real authenticated user. No Excel sprawl. No "who approved this?"

Map.

Topology diagrams that match reality — because they're generated from live state, not redrawn in Lucidchart every quarter. Export to PNG, SVG, draw.io, or Graphviz.

Round-trip.

Live cloud out as Terraform. Drift detection that compares actual state to what your IaC thinks is deployed. The repo of record you wish you'd been keeping.

Document.

Word-grade detailed design docs and compliance reports, generated from live infrastructure. The deliverable your consultant charges $40k for. One click.

Compliance

Five frameworks.
One source of truth.

Map every control to live technical evidence. Attest the rest in-app. Export the same audit-ready Word report for every framework — no copy-paste, no version drift.

Adding your own framework? The control catalogue is extensible. Tell us which one and we'll have it shipped before your next audit cycle.

KSA · NCA
ECC
Essential Cybersecurity Controls
KSA · NCA
DCC
Data Cybersecurity Controls
UAE
ISR
Information Security Regulation
ISO/IEC
27001
Information Security Mgmt
NIST
800-53
Federal Security Controls
Yours
Custom
Bring your control catalogue
How it works

Three steps. No agents.
No data leaves your account.

01

Connect.

Attach a read-only service account to the VM. No JSON keys to rotate. ADC works automatically.

$ gcloud iam service-accounts \
    create visiblecloud-scanner
02

Scan.

Catalogue every resource. Score against CIS. Map the topology. Generate the docs. All async — go grab coffee.

[] discover  100% · 1m 47s
[] analyze   12 critical
03

Decide.

Drill in. Document. Fix. Attest. Hand the auditor a Word report that they actually accept on the first pass.

▸ ECC-1-4 attested · ahmed
▸ ECC-1-5 compliant
Trust

Built for environments where leaving the VPC isn't an option.

Read-only.
No write access. No mutations. Period. The blast radius is zero.
Self-hosted.
Docker Compose on your VM. Postgres in your account. Your perimeter, your rules.
No telemetry.
No phone-home. No usage metrics. We don't know your scan count and we don't want to.
Audit-grade.
Argon2id passwords. TOTP MFA. Per-user lockout. Append-only auth event log.

Stop guessing what's
in your cloud.

Spin up a VisibleCloud instance in under an hour. Run your first scan before the kettle boils. Hand your CISO a real answer this Friday.

No card. No commitment. Self-host the whole stack from day one.