本页面介绍了 v1.0.0 版本的预定义安全状况“基础知识”中包含的预防性和检测政策。此安全状况包含两个政策集:
包含适用于 Vertex AI 工作负载的组织政策的政策集。
包含适用于 Vertex AI 工作负载的自定义 Security Health Analytics 检测器的政策集。
您可以使用此安全状况来配置有助于保护 Gemini 和 Vertex AI 资源的安全状况。您无需进行任何更改即可部署此预定义安全状况。
政策 | 说明 | 合规性标准 |
---|---|---|
ainotebooks.disableFileDownloads |
此限制条件会阻止创建启用了文件下载选项的 Vertex AI Workbench 实例。默认情况下,文件下载选项可在任何 Vertex AI Workbench 实例上启用。 值为 |
NIST SP 800-53 对照组:AC-3(1) |
ainotebooks.disableRootAccess |
此限制条件可防止新创建的 Vertex AI Workbench 用户管理的笔记本和实例启用根访问权限。默认情况下,Vertex AI Workbench 用户管理的笔记本和实例可以启用根访问权限。 值为 |
NIST SP 800-53 对照组:AC-3 和 AC-6(2) |
ainotebooks.disableTerminal |
此限制条件会阻止在终端启用的情况下创建 Vertex AI Workbench 实例。默认情况下,终端可在 Vertex AI Workbench 实例上启用。 值为 |
NIST SP 800-53 控件:AC-3、AC-6 和 CM-2 |
ainotebooks.requireAutoUpgradeSchedule |
此限制条件要求新创建的 Vertex AI Workbench 用户管理的笔记本和实例设置自动升级计划。 值为 |
NIST SP 800-53 对照组:AU-9、CM-2 和 CM-6 |
ainotebooks.restrictPublicIp |
此限制条件会限制公共 IP 对新创建的 Vertex AI Workbench 笔记本和实例的访问。默认情况下,公共 IP 地址可以访问 Vertex AI Workbench 笔记本和实例。 值为 |
NIST SP 800-53 对照组:AC-3、AC-4 和 SC-7 |
Security Health Analytics 检测器
下表介绍了预定义状况中包含的 Security Health Analytics 自定义模块。
检测器名称 | 适用的资源 | 说明 | 合规性标准 |
---|---|---|---|
vertexAIDataSetCMEKDisabled | aiplatform.googleapis.com/Dataset |
此检测器会检查是否有任何数据集未使用客户管理的加密密钥 (CMEK) 进行加密。 如需解决此发现结果,请验证您是否在创建数据集时创建了密钥和密钥环、设置了权限并提供了密钥。如需查看相关说明,请参阅为您的资源配置 CMEK。 |
NIST SP 800-53 对照组:SC12 和 SC13 |
vertexAIModelCMEKDisabled | aiplatform.googleapis.com/Model |
此检测器会检查模型是否未使用 CMEK 进行加密。 如需解决此发现结果,请验证您是否创建了密钥和密钥环,设置了权限,并在创建模型时提供了密钥。如需查看相关说明,请参阅为您的资源配置 CMEK。 |
NIST SP 800-53 对照组:SC12 和 SC13 |
vertexAIEndpointCMEKDisabled | aiplatform.googleapis.com/Endpoint |
此检测器会检查端点是否未使用 CMEK 进行加密。 如需解决此发现结果,请验证您是否创建了密钥和密钥环,设置了权限,并在创建端点时提供了密钥。如需查看相关说明,请参阅为您的资源配置 CMEK。 |
NIST SP 800-53 对照组:SC12 和 SC13 |
vertexAITrainingPipelineCMEKDisabled | aiplatform.googleapis.com/TrainingPipeline |
此检测器会检查训练流水线是否未使用 CMEK 进行加密。 如需解决此发现结果,请验证您是否在创建训练流水线时创建了密钥和密钥环、设置了权限并提供了密钥。如需查看相关说明,请参阅为您的资源配置 CMEK。 |
NIST SP 800-53 对照组:SC12 和 SC13 |
vertexAIDataLabelingJobCMEKDisabled | aiplatform.googleapis.com/DataLabelingJob |
此检测器会检查数据标签是否未使用 CMEK 进行加密。 如需解决此发现结果,请验证您是否在创建数据标签时创建了密钥和密钥环、设置了权限并提供了密钥。如需查看相关说明,请参阅为您的资源配置 CMEK。 |
NIST SP 800-53 对照组:SC12 和 SC13 |
vertexAICustomJobCMEKDisabled | aiplatform.googleapis.com/CustomJob |
此检测器会检查运行自定义工作负载的作业是否未使用 CMEK 进行加密。 如需解决此发现结果,请验证您是否在创建自定义作业时创建了密钥和密钥环、设置了权限并提供了密钥。如需查看相关说明,请参阅为您的资源配置 CMEK。 |
NIST SP 800-53 对照组:SC12 和 SC13 |
vertexAIDataLabelingJobHyperparameterTuningJobCMEKDisabled | aiplatform.googleapis.com/HyperparameterTuningJob |
此检测器会检查超参数调优作业是否未使用 CMEK 进行加密。 如需解决此发现结果,请验证您是否创建了密钥和密钥环,设置了权限,并在创建超参数调节作业时提供了密钥。如需查看相关说明,请参阅为您的资源配置 CMEK。 |
NIST SP 800-53 对照组:SC12 和 SC13 |
YAML 定义
以下是预定义安全 AI 状况的 YAML 定义。
name: organizations/123/locations/global/postureTemplates/secure_ai_essential
description: Posture Template to make your AI workload secure.
revision_id: v.1.0
state: ACTIVE
policy_sets:
- policy_set_id: Secure AI preventative policy set
description: 5 org policies that new customers can automatically enable.
policies:
- policy_id: Disable file downloads on new Vertex AI Workbench instances
compliance_standards:
- standard: NIST SP 800-53
control: AC-3(1)
constraint:
org_policy_constraint:
canned_constraint_id: ainotebooks.disableFileDownloads
policy_rules:
- enforce: true
description: This boolean constraint, when enforced, prevents the creation of Vertex AI Workbench instances with the file download option enabled. By default, the file download option can be enabled on any Vertex AI Workbench instance.
- policy_id: Disable root access on new Vertex AI Workbench user-managed notebooks and instances
compliance_standards:
- standard: NIST SP 800-53
control: AC-3
- standard: NIST SP 800-53
control: AC-6(2)
constraint:
org_policy_constraint:
canned_constraint_id: ainotebooks.disableRootAccess
policy_rules:
- enforce: true
description: This boolean constraint, when enforced, prevents newly created Vertex AI Workbench user-managed notebooks and instances from enabling root access. By default, Vertex AI Workbench user-managed notebooks and instances can have root access enabled.
- policy_id: Disable terminal on new Vertex AI Workbench instances
compliance_standards:
- standard: NIST SP 800-53
control: AC-3
- standard: NIST SP 800-53
control: AC-6
- standard: NIST SP 800-53
control: CM-2
constraint:
org_policy_constraint:
canned_constraint_id: ainotebooks.disableTerminal
policy_rules:
- enforce: true
description: This boolean constraint, when enforced, prevents the creation of Vertex AI Workbench instances with the terminal enabled. By default, the terminal can be enabled on Vertex AI Workbench instances.
- policy_id: Require automatic scheduled upgrades on new Vertex AI Workbench user-managed notebooks and instances
compliance_standards:
- standard: NIST SP 800-53
control: AU-9
- standard: NIST SP 800-53
control: CM-2
- standard: NIST SP 800-53
control: CM-6
constraint:
org_policy_constraint:
canned_constraint_id: ainotebooks.requireAutoUpgradeSchedule
policy_rules:
- enforce: true
description: This boolean constraint, when enforced, requires that newly created Vertex AI Workbench user-managed notebooks and instances have an automatic upgrade schedule set. The automatic upgrade schedule can be defined by using the `notebook-upgrade-schedule` metadata flag to specify a cron schedule for the automatic upgrades.
- policy_id: Restrict public IP access on new Vertex AI Workbench notebooks and instances
compliance_standards:
- standard: NIST SP 800-53
control: AC-3
- standard: NIST SP 800-53
control: AC-4
- standard: NIST SP 800-53
control: SC-7
constraint:
org_policy_constraint:
canned_constraint_id: ainotebooks.restrictPublicIp
policy_rules:
- enforce: true
description: This boolean constraint, when enforced, restricts public IP access to newly created Vertex AI Workbench notebooks and instances. By default, public IPs can access Vertex AI Workbench notebooks and instances.
- policy_set_id: Secure AI detective policy set
description: 5 SHA modules that new customers can automatically enable.
policies:
- policy_id: CMEK key is use for Vertex AI DataSet
compliance_standards:
- standard: NIST SP 800-53
control: SC-12
- standard: NIST SP 800-53
control: SC-13
constraint:
security_health_analytics_custom_module:
display_name: "vertexAIDataSetCMEKDisabled"
config:
customOutput: {}
predicate:
expression: "!has(resource.encryptionSpec)"
resource_selector:
resource_types:
- aiplatform.googleapis.com/Dataset
severity: CRITICAL
description: "When enforced, this detector finds if any Data Set is not encrypted using CMEK. CMEKs, managed via Cloud KMS, offer advanced control over key operations."
recommendation: "Restore SHA module- Reset the SHA module to its intended state. Consult documentation- Refer to the comprehensive guidance provided at
https://cloud.google.com/security-command-center/docs/custom-modules-sha-overview"
module_enablement_state: ENABLED
- policy_id: CMEK key is use for Vertex AI Model
compliance_standards:
- standard: NIST SP 800-53
control: SC-12
- standard: NIST SP 800-53
control: SC-13
constraint:
security_health_analytics_custom_module:
display_name: "vertexAIModelCMEKDisabled"
config:
customOutput: {}
predicate:
expression: "!has(resource.encryptionSpec)"
resource_selector:
resource_types:
- aiplatform.googleapis.com/Model
severity: CRITICAL
description: "When enforced, this detector finds if any Data Set is not encrypted using CMEK. CMEKs, managed via Cloud KMS, offer advanced control over key operations."
recommendation: "Restore SHA module- Reset the SHA module to its intended state. Consult documentation- Refer to the comprehensive guidance provided at
https://cloud.google.com/security-command-center/docs/custom-modules-sha-overview"
module_enablement_state: ENABLED
- policy_id: CMEK key is use for Vertex AI Endpoint
compliance_standards:
- standard: NIST SP 800-53
control: SC-12
- standard: NIST SP 800-53
control: SC-13
constraint:
security_health_analytics_custom_module:
display_name: "vertexAIEndpointCMEKDisabled"
config:
customOutput: {}
predicate:
expression: "!has(resource.encryptionSpec)"
resource_selector:
resource_types:
- aiplatform.googleapis.com/Endpoint
severity: CRITICAL
description: "When enforced, this detector finds if any Data Set is not encrypted using CMEK. CMEKs, managed via Cloud KMS, offer advanced control over key operations."
recommendation: "Restore SHA module- Reset the SHA module to its intended state. Consult documentation- Refer to the comprehensive guidance provided at
https://cloud.google.com/security-command-center/docs/custom-modules-sha-overview"
module_enablement_state: ENABLED
- policy_id: CMEK key is use for Vertex AI TrainingPipeline
compliance_standards:
- standard: NIST SP 800-53
control: SC-12
- standard: NIST SP 800-53
control: SC-13
constraint:
security_health_analytics_custom_module:
display_name: "vertexAITrainingPipelineCMEKDisabled"
config:
customOutput: {}
predicate:
expression: "!has(resource.encryptionSpec)"
resource_selector:
resource_types:
- aiplatform.googleapis.com/TrainingPipeline
severity: CRITICAL
description: "When enforced, this detector finds if any Data Set is not encrypted using CMEK. CMEKs, managed via Cloud KMS, offer advanced control over key operations."
recommendation: "Restore SHA module- Reset the SHA module to its intended state. Consult documentation- Refer to the comprehensive guidance provided at
https://cloud.google.com/security-command-center/docs/custom-modules-sha-overview"
module_enablement_state: ENABLED
- policy_id: CMEK key is use for Vertex AI DataLabelingJob
compliance_standards:
- standard: NIST SP 800-53
control: SC-12
- standard: NIST SP 800-53
control: SC-13
constraint:
security_health_analytics_custom_module:
display_name: "vertexAIDataLabelingJobCMEKDisabled"
config:
customOutput: {}
predicate:
expression: "!has(resource.encryptionSpec)"
resource_selector:
resource_types:
- aiplatform.googleapis.com/DataLabelingJob
severity: CRITICAL
description: "When enforced, this detector finds if any Data Set is not encrypted using CMEK. CMEKs, managed via Cloud KMS, offer advanced control over key operations."
recommendation: "Restore SHA module- Reset the SHA module to its intended state. Consult documentation- Refer to the comprehensive guidance provided at
https://cloud.google.com/security-command-center/docs/custom-modules-sha-overview"
module_enablement_state: ENABLED
- policy_id: CMEK key is use for Vertex AI CustomJob
compliance_standards:
- standard: NIST SP 800-53
control: SC-12
- standard: NIST SP 800-53
control: SC-13
constraint:
security_health_analytics_custom_module:
display_name: "vertexAICustomJobCMEKDisabled"
config:
customOutput: {}
predicate:
expression: "!has(resource.encryptionSpec)"
resource_selector:
resource_types:
- aiplatform.googleapis.com/CustomJob
severity: CRITICAL
description: "When enforced, this detector finds if any Data Set is not encrypted using CMEK. CMEKs, managed via Cloud KMS, offer advanced control over key operations."
recommendation: "Restore SHA module- Reset the SHA module to its intended state. Consult documentation- Refer to the comprehensive guidance provided at
https://cloud.google.com/security-command-center/docs/custom-modules-sha-overview"
module_enablement_state: ENABLED
- policy_id: CMEK key is use for Vertex AI HyperparameterTuningJob
compliance_standards:
- standard: NIST SP 800-53
control: SC-12
- standard: NIST SP 800-53
control: SC-13
constraint:
security_health_analytics_custom_module:
display_name: "vertexAIDataLabelingJobHyperparameterTuningJobCMEKDisabled"
config:
customOutput: {}
predicate:
expression: "!has(resource.encryptionSpec)"
resource_selector:
resource_types:
- aiplatform.googleapis.com/HyperparameterTuningJob
severity: CRITICAL
description: "When enforced, this detector finds if any Data Set is not encrypted using CMEK. CMEKs, managed via Cloud KMS, offer advanced control over key operations."
recommendation: "Restore SHA module- Reset the SHA module to its intended state. Consult documentation- Refer to the comprehensive guidance provided at
https://cloud.google.com/security-command-center/docs/custom-modules-sha-overview"
module_enablement_state: ENABLED