[[["易于理解","easyToUnderstand","thumb-up"],["解决了我的问题","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["很难理解","hardToUnderstand","thumb-down"],["信息或示例代码不正确","incorrectInformationOrSampleCode","thumb-down"],["没有我需要的信息/示例","missingTheInformationSamplesINeed","thumb-down"],["翻译问题","translationIssue","thumb-down"],["其他","otherDown","thumb-down"]],["最后更新时间 (UTC):2025-09-04。"],[[["\u003cp\u003eVPC Service Controls enhances Cloud DNS security to prevent data exfiltration.\u003c/p\u003e\n"],["\u003cp\u003eService perimeters can be used to protect Cloud DNS resources and services from requests originating outside the defined perimeter.\u003c/p\u003e\n"],["\u003cp\u003eCloud DNS can be accessed through a restricted VIP within VPC Service Controls.\u003c/p\u003e\n"],["\u003cp\u003ePublic zone creation or updates are restricted within projects that are inside the VPC Service Controls perimeter.\u003c/p\u003e\n"]]],[],null,["# VPC Service Controls support for Cloud DNS\n\nYou can use VPC Service Controls to secure your Cloud DNS configuration.\n\nVPC Service Controls provides additional security for your Cloud DNS to\nhelp mitigate the risk of data exfiltration. Using VPC Service Controls, you can\nadd projects to service perimeters that protect resources and services from\nrequests that originate outside the perimeter.\n| **Note:** You access Cloud DNS through the restricted VIP, however, you cannot create or update public zones within projects inside the VPC Service Controls perimeter.\n\nTo learn how to configure DNS using Cloud DNS, see [Configuring DNS\nwith Cloud DNS](/vpc-service-controls/docs/set-up-private-connectivity#configuring_dns_with).\n\nTo learn more about service perimeters, refer to the [Service perimeter\nconfiguration](/vpc-service-controls/docs/service-perimeters) page of the\n[VPC Service Controls documentation](/vpc-service-controls/docs/overview)."]]