When you create a custom cloud control, you use Common Expression Language (CEL) expressions to create the rules that evaluate the properties of the scanned resource.
Your expressions can be checks of a single value or more complex
compound expressions that check multiple values or conditions. Either way,
the expression must resolve to a boolean false to trigger a finding.
CEL expressions that evaluate resource properties must conform to the following rules:
The properties that you specify in a CEL expression must be properties of the scanned resource, as defined in the API definition of the resource type.
All enums in a CEL expression must be represented as strings. For example, the following is a valid expression for the
cloudkms.googleapis.com/CryptoKeyVersionresource type:resource.data.state = "PENDING_GENERATION"
The result of the CEL expressions that you define in the
conditionproperty must be a Boolean. A finding is triggered only if the result isfalse.
To find the name for a resource, see Asset types.
For more information about CEL, see the following:
Example CEL expressions
The following table lists some CEL expressions that you can use to evaluate resource properties.
| Resource type | Description | CEL expression | 
|---|---|---|
cloudkms.googleapis.com/CryptoKey | 
    Check the Cloud KMS key rotation period | has(resource.data.rotationPeriod) && resource.data.rotationPeriod < duration('60h') | 
  
compute.googleapis.com/Network | 
    Match Virtual Private Cloud peering rule to network peers | resource.data.selfLink.matches('https://www.googleapis.com/compute/v1/projects/PROJECT_ID/global/networks/default') || resource.data.peerings.exists(p, p.network.matches('https://www.googleapis.com/compute/v1/projects/PROJECT_ID/global/networks/shared$')) | 
  
cloudfunctions.googleapis.com/CloudFunction | 
    Only allow internal ingress traffic for a Cloud Run function | has(resource.data.ingressSettings) && resource.data.ingressSettings.matches('ALLOW_INTERNAL_ONLY') | 
  
compute.googleapis.com/Instance | 
    Resource name matches pattern | resource.data.name.matches('^gcp-vm-(linux|windows)-v\\\\d+$') | 
  
serviceusage.googleapis.com/Service | 
    Only allow storage-related APIs to be enabled | resource.data.state == 'ENABLED' && !( resource.data.name.matches('storage-api.googleapis.com') || resource.data.name.matches('bigquery-json.googleapis.com') || resource.data.name.matches('bigquery.googleapis.com') || resource.data.name.matches('sql-component.googleapis.com') || resource.data.name.matches('spanner.googleapis.com'))
     | 
  
sqladmin.googleapis.com/Instance
     | 
    Only permit public IP addresses that are on the allowlist | (resource.data.instanceType == 'CLOUD_SQL_INSTANCE' && resource.data.backendType == 'SECOND_GEN' && resource.data.settings.ipConfiguration.ipv4Enabled ) && (resource.data.ipAddresses.all(ip, ip.type != 'PRIMARY' || ip.ipAddress.matches('IP_ADDRESS')))
     | 
  
dataproc.googleapis.com/Cluster | 
    Check if project IDs in a Dataproc cluster contain
      the substrings testing or development | 
    has(resource.data.projectId) && !resource.data.projectId.contains('testing') || !resource.data.projectId.contains('development') |