[[["容易理解","easyToUnderstand","thumb-up"],["確實解決了我的問題","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["難以理解","hardToUnderstand","thumb-down"],["資訊或程式碼範例有誤","incorrectInformationOrSampleCode","thumb-down"],["缺少我需要的資訊/範例","missingTheInformationSamplesINeed","thumb-down"],["翻譯問題","translationIssue","thumb-down"],["其他","otherDown","thumb-down"]],["上次更新時間:2025-09-04 (世界標準時間)。"],[[["\u003cp\u003eVPC Service Controls enhances Cloud DNS security to prevent data exfiltration.\u003c/p\u003e\n"],["\u003cp\u003eService perimeters can be used to protect Cloud DNS resources and services from requests originating outside the defined perimeter.\u003c/p\u003e\n"],["\u003cp\u003eCloud DNS can be accessed through a restricted VIP within VPC Service Controls.\u003c/p\u003e\n"],["\u003cp\u003ePublic zone creation or updates are restricted within projects that are inside the VPC Service Controls perimeter.\u003c/p\u003e\n"]]],[],null,["# VPC Service Controls support for Cloud DNS\n\nYou can use VPC Service Controls to secure your Cloud DNS configuration.\n\nVPC Service Controls provides additional security for your Cloud DNS to\nhelp mitigate the risk of data exfiltration. Using VPC Service Controls, you can\nadd projects to service perimeters that protect resources and services from\nrequests that originate outside the perimeter.\n| **Note:** You access Cloud DNS through the restricted VIP, however, you cannot create or update public zones within projects inside the VPC Service Controls perimeter.\n\nTo learn how to configure DNS using Cloud DNS, see [Configuring DNS\nwith Cloud DNS](/vpc-service-controls/docs/set-up-private-connectivity#configuring_dns_with).\n\nTo learn more about service perimeters, refer to the [Service perimeter\nconfiguration](/vpc-service-controls/docs/service-perimeters) page of the\n[VPC Service Controls documentation](/vpc-service-controls/docs/overview)."]]