VPC Service Controls 的预定义安全状况(基础知识)

本页面介绍了 Google Cloud 中 v1.0 版的 VPC Service Controls 预定义安全状况,基础知识。此安全状况 包含两个政策集:

  • 一组政策,其中包含应用于 VPC Service Controls。

  • 一组政策,其中包含适用于 VPC Service Controls。

您可以使用此预定义的安全状况来配置安全状况,以帮助 VPC Service Controls您可以部署此预定义的安全状况,而无需 更改。

组织政策限制条件

下表介绍了 这种安全状况。

政策 说明 合规性标准
compute.skipDefaultNetworkCreation

这个 政策会禁止自动创建默认 VPC 网络,并将默认设置为 防火墙规则,确保网络和防火墙规则 。

值为 true,以避免创建 默认 VPC 网络

NIST SP 800-53 对照组:SC-7 和 SC-8
ainotebooks.restrictPublicIp

此限制条件会限制公共 IP 对新创建的 Vertex AI Workbench 笔记本和实例的访问。默认情况下,公共 IP 地址可以访问 Vertex AI Workbench 笔记本和实例。

值为 true,用于限制对新的 Vertex AI Workbench 笔记本和实例的公共 IP 访问权限。

NIST SP 800-53 对照组:SC-7 和 SC-8
compute.disableNestedVirtualization

本政策 会为所有 Compute Engine 虚拟机停用嵌套虚拟化,以降低与不受监控的 嵌套实例。

值为 true,用于关闭嵌套虚拟机 虚拟化。

NIST SP 800-53 对照组:SC-7 和 SC-8

Security Health Analytics 检测器

下表介绍了 预定义的安全状况。如需详细了解这些检测器,请参阅 漏洞 发现结果

检测器名称 说明
FIREWALL_NOT_MONITORED

此检测器会检查是否未将日志指标和提醒配置为监控 VPC 防火墙规则更改。

NETWORK_NOT_MONITORED

此检测器会检查是否未将日志指标和提醒配置为监控 VPC 网络更改。

ROUTE_NOT_MONITORED

此检测器会检查是否未将日志指标和提醒配置为监控 VPC 网络路由更改。

DNS_LOGGING_DISABLED

此检测器会检查 VPC 网络是否启用了 DNS 日志记录。

FLOW_LOGS_DISABLED

此检测器会检查 VPC 子网是否启用了流日志。

YAML 定义

以下是 VPC Service Controls 预定义状况的 YAML 定义。

name: organizations/123/locations/global/postureTemplates/vpcsc_essential
description: VPCSC Posture Template
revision_id: v.1.0
state: ACTIVE
policy_sets:
- policy_set_id: VPCSC preventative policy set
  description: 3 org policies that new customers can automatically enable.
  policies:
  - policy_id: Skip default network creation
    compliance_standards:
    - standard: NIST SP 800-53
      control: SC-7
    - standard: NIST SP 800-53
      control: SC-8
    constraint:
      org_policy_constraint:
        canned_constraint_id: compute.skipDefaultNetworkCreation
        policy_rules:
        - enforce: true
    description: This boolean constraint skips the creation of the default network and related resources during Google Cloud Platform Project resource creation where this constraint is set to True. By default, a default network and supporting resources are automatically created when creating a Project resource.
  - policy_id: Restrict public IP access on new Vertex AI Workbench notebooks and instances
    compliance_standards:
    - standard: NIST SP 800-53
      control: SC-7
    - standard: NIST SP 800-53
      control: SC-8
    constraint:
      org_policy_constraint:
        canned_constraint_id: ainotebooks.restrictPublicIp
        policy_rules:
        - enforce: true
    description: This boolean constraint, when enforced, restricts public IP access to newly created Vertex AI Workbench notebooks and instances. By default, public IPs can access Vertex AI Workbench notebooks and instances.
  - policy_id: Disable VM nested virtualization
    compliance_standards:
    - standard: NIST SP 800-53
      control: SC-7
    - standard: NIST SP 800-53
      control: SC-8
    constraint:
      org_policy_constraint:
        canned_constraint_id: compute.disableNestedVirtualization
        policy_rules:
        - enforce: true
    description: This boolean constraint disables hardware-accelerated nested virtualization for all Compute Engine VMs belonging to the organization, project, or folder where this constraint is set to True. By default, hardware-accelerated nested virtualization is allowed for all Compute Engine VMs running on Intel Haswell or newer CPU platforms.
- policy_set_id: VPCSC detective policy set
  description: 5 SHA modules that new customers can automatically enable.
  policies:
  - policy_id: Firewall not monitored
    constraint:
      securityHealthAnalyticsModule:
        moduleEnablementState: ENABLED
        moduleName: FIREWALL_NOT_MONITORED
  - policy_id: Network not monitored
    constraint:
      securityHealthAnalyticsModule:
        moduleEnablementState: ENABLED
        moduleName: NETWORK_NOT_MONITORED
  - policy_id: Route not monitored
    constraint:
      securityHealthAnalyticsModule:
        moduleEnablementState: ENABLED
        moduleName: ROUTE_NOT_MONITORED
  - policy_id: DNS logging disabled
    constraint:
      securityHealthAnalyticsModule:
        moduleEnablementState: ENABLED
        moduleName: DNS_LOGGING_DISABLED
  - policy_id: Flow logs disabled
    constraint:
      securityHealthAnalyticsModule:
        moduleEnablementState: ENABLED
        moduleName: FLOW_LOGS_DISABLED

后续步骤