About VisibleCloud

Cloud Intelligence
for GCP.

The questions every cloud team keeps getting asked.
Why we built it

Same questions. Different answers.

Every cloud team gets asked the same handful. Most cobble an answer together from three dashboards, a stale Confluence page, and five people on Slack. Toggle the panel.

What's running in our cloud?
…let me get back to you tomorrow.

We didn't want to be another dashboard the security team logs into once a quarter.
We wanted to be the one place anyone responsible for the cloud could go to get a real answer.

What "Cloud Intelligence" means

Not CSPM. Not CMDB.
All of it. Joined up.

The category exists because the alternative is a portfolio of disconnected tools — a CSPM for security findings, a CMDB for inventory, a Lucidchart license for diagrams, a Word template for audits, and a half-broken Terraform repo nobody trusts. Cloud Intelligence is the integrated view: discover, analyse, document, and govern from a single source of truth.

Discover

Catalogue every resource — VPCs, IAM grants, buckets, instances, service accounts, the works. Across every project, every region. The inventory you keep meaning to build but never have time for.

Analyse

CIS GCP 1.3, custom rules, your own conventions. Severity-ranked, evidence-linked, drill-able to the offending resource. Not a 200-page PDF — a triage queue.

Document

Topology diagrams that match reality. Word-grade design documents from live state. Terraform that round-trips against what's actually deployed. Documentation that doesn't go stale because it's regenerated, not maintained.

Govern

Map every compliance control to live technical evidence. Attest the rest in-app. Hand the auditor the same Word report for ECC, DCC, ISO 27001, NIST, ISR — without copy-paste, without version drift.

What we believe

Five rules that shape every decision we make.

1. Read-only, by default.

We never ask for write permissions. The blast radius of installing VisibleCloud is zero. If we ever need to write, we'll ask explicitly and tell you exactly what for.

2. Self-hosted, by design.

Your scan data describes your attack surface. It belongs in your environment, not ours. VisibleCloud runs on a VM you own, in a network you control, against credentials you provisioned.

3. No telemetry. Ever.

We don't phone home. We don't count your scans. We don't see your finding counts. If there's an option to enable opt-in error reporting one day, you'll see the exact bytes before they leave.

4. Built for the people who answer.

Not for procurement, not for the dashboard demo. For the cloud architect who got pulled into the breach call, the compliance lead a week before audit, the security engineer trying to track down an IAM grant nobody remembers.

5. Transparency over magic.

Every finding shows the rule that fired and the resource it fired against. Every compliance attestation shows who attested and when. Every export is a file you can read in a text editor. No black boxes.

Want to see it run
against your cloud?

We'll walk through a scan together — your projects, your service accounts, your findings. No screenshots, no canned demo.