1. Docs
  2. Reference
  3. Pre-built Policy Packs
  4. CIS
  5. Google Cloud

CIS 8.1 - Google Cloud

    This page lists all 102 policies in the CIS 8.1 pack for Google Cloud.

    Policy NameDescriptionFramework ReferenceFramework Specification
    compute-engine-instance-proper-configurationEnsure Compute Engine instances have proper configuration for lifecycle management1.1Establish and maintain an accurate, detailed, and up-to-date inventory of all enterprise assets with the potential to store or process data, to include: end-user devices (including portable and mobile), network devices, non-computing/IoT devices, and servers. Ensure the inventory records the network address (if static), hardware address, machine name, enterprise asset owner, department for each asset, and whether the asset has been approved to connect to the network. For mobile end-user devices, MDM type tools can support this process, where appropriate. This inventory includes assets connected to the infrastructure physically, virtually, remotely, and those within cloud environments. Additionally, it includes assets that are regularly connected to the enterprise’s network infrastructure, even if they are not under control of the enterprise. Review and update the inventory of all enterprise assets bi-annually, or more frequently.
    compute-engine-os-config-compliance-association-compliantEnsure OS Config managed instances have compliance association1.1Establish and maintain an accurate, detailed, and up-to-date inventory of all enterprise assets with the potential to store or process data, to include: end-user devices (including portable and mobile), network devices, non-computing/IoT devices, and servers. Ensure the inventory records the network address (if static), hardware address, machine name, enterprise asset owner, department for each asset, and whether the asset has been approved to connect to the network. For mobile end-user devices, MDM type tools can support this process, where appropriate. This inventory includes assets connected to the infrastructure physically, virtually, remotely, and those within cloud environments. Additionally, it includes assets that are regularly connected to the enterprise’s network infrastructure, even if they are not under control of the enterprise. Review and update the inventory of all enterprise assets bi-annually, or more frequently.
    vpc-external-ip-associatedEnsure VPC external IP addresses are associated1.1Establish and maintain an accurate, detailed, and up-to-date inventory of all enterprise assets with the potential to store or process data, to include: end-user devices (including portable and mobile), network devices, non-computing/IoT devices, and servers. Ensure the inventory records the network address (if static), hardware address, machine name, enterprise asset owner, department for each asset, and whether the asset has been approved to connect to the network. For mobile end-user devices, MDM type tools can support this process, where appropriate. This inventory includes assets connected to the infrastructure physically, virtually, remotely, and those within cloud environments. Additionally, it includes assets that are regularly connected to the enterprise’s network infrastructure, even if they are not under control of the enterprise. Review and update the inventory of all enterprise assets bi-annually, or more frequently.
    vpc-firewall-rule-unusedEnsure VPC firewall rules are not unused1.1Establish and maintain an accurate, detailed, and up-to-date inventory of all enterprise assets with the potential to store or process data, to include: end-user devices (including portable and mobile), network devices, non-computing/IoT devices, and servers. Ensure the inventory records the network address (if static), hardware address, machine name, enterprise asset owner, department for each asset, and whether the asset has been approved to connect to the network. For mobile end-user devices, MDM type tools can support this process, where appropriate. This inventory includes assets connected to the infrastructure physically, virtually, remotely, and those within cloud environments. Additionally, it includes assets that are regularly connected to the enterprise’s network infrastructure, even if they are not under control of the enterprise. Review and update the inventory of all enterprise assets bi-annually, or more frequently.
    vpc-firewall-rule-associated-to-networkEnsure VPC firewall rules are associated to networks1.1Establish and maintain an accurate, detailed, and up-to-date inventory of all enterprise assets with the potential to store or process data, to include: end-user devices (including portable and mobile), network devices, non-computing/IoT devices, and servers. Ensure the inventory records the network address (if static), hardware address, machine name, enterprise asset owner, department for each asset, and whether the asset has been approved to connect to the network. For mobile end-user devices, MDM type tools can support this process, where appropriate. This inventory includes assets connected to the infrastructure physically, virtually, remotely, and those within cloud environments. Additionally, it includes assets that are regularly connected to the enterprise’s network infrastructure, even if they are not under control of the enterprise. Review and update the inventory of all enterprise assets bi-annually, or more frequently.
    security-command-center-enabledEnsure Security Command Center is enabled1.2Ensure that a process exists to address unauthorized assets on a weekly basis. The enterprise may choose to remove the asset from the network, deny the asset from connecting remotely to the network, or quarantine the asset.
    app-engine-managed-updates-enabledEnsure App Engine managed updates are enabled2.2Ensure that only currently supported software is designated as authorized in the software inventory for enterprise assets. If software is unsupported, yet necessary for the fulfillment of the enterprise’s mission, document an exception detailing mitigating controls and residual risk acceptance. For any unsupported software without an exception documentation, designate as unauthorized. Review the software list to verify software support at least monthly, or more frequently.
    managed-instance-group-launch-template-public-ip-disabledEnsure Managed Instance Group launch templates have public IP addresses disabled3.3Configure data access control lists based on a user’s need to know. Apply data access control lists, also known as access permissions, to local and remote file systems, databases, and applications.
    cloud-logging-retention-period-365Ensure Cloud Logging log retention is 365 days or more3.3Configure data access control lists based on a user’s need to know. Apply data access control lists, also known as access permissions, to local and remote file systems, databases, and applications.
    database-migration-service-not-publicly-accessiblePrevent public accessibility of Database Migration Service instances3.3Configure data access control lists based on a user’s need to know. Apply data access control lists, also known as access permissions, to local and remote file systems, databases, and applications.
    persistent-disk-snapshot-not-publicly-restorableRestrict public access to Persistent Disk snapshots3.3CIS Controls v8 IG1 3.3 - Data Access Control: Configure data access control lists. Persistent Disk snapshots should not be publicly restorable to prevent unauthorized access to potentially sensitive data stored in disk snapshots.
    compute-engine-instance-service-account-attachedEnsure Compute Engine instances have service accounts attached3.3Configure data access control lists based on a user’s need to know. Apply data access control lists, also known as access permissions, to local and remote file systems, databases, and applications.
    compute-engine-instance-in-vpcEnsure Compute Engine instances are deployed in VPC networks3.3Configure data access control lists based on a user’s need to know. Apply data access control lists, also known as access permissions, to local and remote file systems, databases, and applications.
    compute-engine-instance-not-publicly-accessibleEnsure Compute Engine instances are not publicly accessible3.3Configure data access control lists based on a user’s need to know. Apply data access control lists, also known as access permissions, to local and remote file systems, databases, and applications.
    compute-engine-instance-uses-os-loginEnsure Compute Engine instances enforce OS Login3.3Configure data access control lists based on a user’s need to know. Apply data access control lists, also known as access permissions, to local and remote file systems, databases, and applications.
    gke-cluster-endpoint-restrict-public-accessRestrict public access for GKE clusters by enabling private endpoint or configuring master authorized networks3.3Configure data access control lists based on a user’s need to know. Apply data access control lists, also known as access permissions, to local and remote file systems, databases, and applications.
    dataproc-cluster-master-nodes-no-public-ipRestrict public access for Dataproc clusters by ensuring master nodes use internal IP addresses only3.3Configure data access control lists based on a user’s need to know. Apply data access control lists, also known as access permissions, to local and remote file systems, databases, and applications.
    dataproc-kerberos-enabledEnsure Dataproc Kerberos is enabled3.3Configure data access control lists based on a user’s need to know. Apply data access control lists, also known as access permissions, to local and remote file systems, databases, and applications.
    cloud-sql-instance-not-publicly-accessibleRestrict public access for Cloud SQL instances3.3Configure data access control lists based on a user’s need to know. Apply data access control lists, also known as access permissions, to local and remote file systems, databases, and applications.
    cloud-storage-bucket-restrict-public-read-accessRestrict public access for Cloud Storage buckets3.3Configure data access control lists based on a user’s need to know. Apply data access control lists, also known as access permissions, to local and remote file systems, databases, and applications.
    iam-no-custom-role-excessive-permissionsPrevent IAM custom roles with excessive permissions for enhanced data access control.3.3Configure data access control lists based on a user’s need to know. Apply data access control lists, also known as access permissions, to local and remote file systems, databases, and applications.
    iam-policy-no-statements-with-full-accessPrevent IAM policy bindings with full access permissions for enhanced data security.3.3Configure data access control lists based on a user’s need to know. Apply data access control lists, also known as access permissions, to local and remote file systems, databases, and applications.
    elasticsearch-in-vpc-onlyEnsure Elasticsearch is in VPC only3.3Configure data access control lists based on a user’s need to know. Apply data access control lists, also known as access permissions, to local and remote file systems, databases, and applications.
    iam-user-no-direct-policies-checkPrevent IAM users from having direct policy attachments for better access management.3.3Configure data access control lists based on a user’s need to know. Apply data access control lists, also known as access permissions, to local and remote file systems, databases, and applications.
    cloud-functions-public-access-prohibitedEnsure Cloud Functions prohibit public access3.3Configure data access control lists based on a user’s need to know. Apply data access control lists, also known as access permissions, to local and remote file systems, databases, and applications.
    cloud-functions-inside-vpcEnsure Cloud Functions are inside VPC3.3Configure data access control lists based on a user’s need to know. Apply data access control lists, also known as access permissions, to local and remote file systems, databases, and applications.
    bigquery-dataset-public-access-checkEnsure BigQuery datasets are not publicly accessible3.3Configure data access control lists based on a user’s need to know. Apply data access control lists, also known as access permissions, to local and remote file systems, databases, and applications.
    cloud-storage-bucket-level-public-access-prohibitedEnsure Cloud Storage bucket level public access is prohibited3.3Configure data access control lists based on a user’s need to know. Apply data access control lists, also known as access permissions, to local and remote file systems, databases, and applications.
    cloud-storage-bucket-iam-policy-grantee-checkEnsure Cloud Storage bucket IAM policy grantee check3.3Configure data access control lists based on a user’s need to know. Apply data access control lists, also known as access permissions, to local and remote file systems, databases, and applications.
    cloud-storage-bucket-public-write-prohibitedEnsure Cloud Storage bucket public write is prohibited3.3Configure data access control lists based on a user’s need to know. Apply data access control lists, also known as access permissions, to local and remote file systems, databases, and applications.
    ai-platform-notebook-no-direct-internet-accessEnsure AI Platform notebook has no direct internet access3.3Configure data access control lists based on a user’s need to know. Apply data access control lists, also known as access permissions, to local and remote file systems, databases, and applications.
    subnet-auto-assign-external-ip-disabledEnsure subnet auto-assign external IP is disabled3.3Configure data access control lists based on a user’s need to know. Apply data access control lists, also known as access permissions, to local and remote file systems, databases, and applications.
    cloud-run-service-configuration-checkEnsure Cloud Run service configuration check3.3Configure data access control lists based on a user’s need to know. Apply data access control lists, also known as access permissions, to local and remote file systems, databases, and applications.
    cloud-storage-bucket-public-read-prohibitedEnsure Cloud Storage bucket public read is prohibited3.3Configure data access control lists based on a user’s need to know. Apply data access control lists, also known as access permissions, to local and remote file systems, databases, and applications.
    compute-engine-instance-detailed-monitoring-enabledEnable Compute Engine instance detailed monitoring3.8Document data flows. Data flow documentation includes service provider data flows and should be based on the enterprise’s data management process. Review and update documentation annually, or when significant enterprise changes occur that could impact this Safeguard.
    elasticsearch-logs-to-cloud-loggingEnsure instances have proper Cloud Logging configuration3.8Document data flows. Data flow documentation includes service provider data flows and should be based on the enterprise’s data management process. Review and update documentation annually, or when significant enterprise changes occur that could impact this Safeguard.
    load-balancer-logging-enabledEnable Load Balancer logging for monitoring3.8Document data flows. Data flow documentation includes service provider data flows and should be based on the enterprise’s data management process. Review and update documentation annually, or when significant enterprise changes occur that could impact this Safeguard.
    cloud-functions-concurrency-checkConfigure Cloud Functions concurrency for monitoring3.8Document data flows. Data flow documentation includes service provider data flows and should be based on the enterprise’s data management process. Review and update documentation annually, or when significant enterprise changes occur that could impact this Safeguard.
    cloud-sql-logging-enabledEnable Cloud SQL logging for monitoring3.8Document data flows. Data flow documentation includes service provider data flows and should be based on the enterprise’s data management process. Review and update documentation annually, or when significant enterprise changes occur that could impact this Safeguard.
    cloud-storage-bucket-logging-enabledEnable Cloud Storage bucket logging for monitoring3.8Document data flows. Data flow documentation includes service provider data flows and should be based on the enterprise’s data management process. Review and update documentation annually, or when significant enterprise changes occur that could impact this Safeguard.
    bigquery-audit-logging-enabledEnable BigQuery audit logging for monitoring3.8Document data flows. Data flow documentation includes service provider data flows and should be based on the enterprise’s data management process. Review and update documentation annually, or when significant enterprise changes occur that could impact this Safeguard.
    cloud-armor-logging-enabledEnsure backend services with Cloud Armor have logging enabled3.8Document data flows. Data flow documentation includes service provider data flows and should be based on the enterprise’s data management process. Review and update documentation annually, or when significant enterprise changes occur that could impact this Safeguard.
    no-unrestricted-route-to-internet-gatewayEnsure no unrestricted route to Internet Gateway for monitoring3.8Document data flows. Data flow documentation includes service provider data flows and should be based on the enterprise’s data management process. Review and update documentation annually, or when significant enterprise changes occur that could impact this Safeguard.
    load-balancer-http-to-https-redirectionEnsure Load Balancer HTTP to HTTPS redirection is configured3.10Encrypt sensitive data in transit. Example implementations can include: Transport Layer Security (TLS) and Open Secure Shell (OpenSSH).
    load-balancer-managed-ssl-certificateEnsure Load Balancer uses managed SSL certificates3.10Encrypt sensitive data in transit. Example implementations can include: Transport Layer Security (TLS) and Open Secure Shell (OpenSSH).
    load-balancer-tls-https-listeners-onlyEnsure Load Balancer uses TLS/HTTPS listeners only3.10Encrypt sensitive data in transit. Example implementations can include: Transport Layer Security (TLS) and Open Secure Shell (OpenSSH).
    application-load-balancer-managed-ssl-certificateEnsure Application Load Balancer uses managed SSL certificates3.10Encrypt sensitive data in transit. Example implementations can include: Transport Layer Security (TLS) and Open Secure Shell (OpenSSH).
    cloud-storage-bucket-ssl-requests-onlyEnsure Cloud Storage buckets require SSL requests only3.10Encrypt sensitive data in transit. Example implementations can include: Transport Layer Security (TLS) and Open Secure Shell (OpenSSH).
    ai-platform-endpoint-configuration-kms-key-configuredEnsure AI Platform endpoint configuration uses Cloud KMS3.11Encrypt sensitive data at rest on servers, applications, and databases. Storage-layer encryption, also known as server-side encryption, meets the minimum requirement of this Safeguard. Additional encryption methods may include application-layer encryption, also known as client-side encryption, where access to the data storage device(s) does not permit access to the plain-text data.
    ai-platform-notebook-instance-kms-key-configuredEnsure AI Platform notebook instance uses Cloud KMS3.11Encrypt sensitive data at rest on servers, applications, and databases. Storage-layer encryption, also known as server-side encryption, meets the minimum requirement of this Safeguard. Additional encryption methods may include application-layer encryption, also known as client-side encryption, where access to the data storage device(s) does not permit access to the plain-text data.
    secret-manager-using-cmekEnsure Secret Manager uses customer-managed encryption keys3.11Encrypt sensitive data at rest on servers, applications, and databases. Storage-layer encryption, also known as server-side encryption, meets the minimum requirement of this Safeguard. Additional encryption methods may include application-layer encryption, also known as client-side encryption, where access to the data storage device(s) does not permit access to the plain-text data.
    cloud-storage-bucket-encryption-enabledEnsure Cloud Storage bucket encryption is enabled3.11Encrypt sensitive data at rest on servers, applications, and databases. Storage-layer encryption, also known as server-side encryption, meets the minimum requirement of this Safeguard. Additional encryption methods may include application-layer encryption, also known as client-side encryption, where access to the data storage device(s) does not permit access to the plain-text data.
    pubsub-encrypted-kmsEnsure Pub/Sub is encrypted with Cloud KMS3.11Encrypt sensitive data at rest on servers, applications, and databases. Storage-layer encryption, also known as server-side encryption, meets the minimum requirement of this Safeguard. Additional encryption methods may include application-layer encryption, also known as client-side encryption, where access to the data storage device(s) does not permit access to the plain-text data.
    kms-key-not-scheduled-for-deletionEnsure Cloud KMS keys are not scheduled for deletion3.11Encrypt sensitive data at rest on servers, applications, and databases. Storage-layer encryption, also known as server-side encryption, meets the minimum requirement of this Safeguard. Additional encryption methods may include application-layer encryption, also known as client-side encryption, where access to the data storage device(s) does not permit access to the plain-text data.
    bigquery-dataset-encryption-enabledEnable BigQuery dataset encryption3.11Encrypt sensitive data at rest on servers, applications, and databases. Storage-layer encryption, also known as server-side encryption, meets the minimum requirement of this Safeguard. Additional encryption methods may include application-layer encryption, also known as client-side encryption, where access to the data storage device(s) does not permit access to the plain-text data.
    cloud-logging-encryptedEnsure Cloud Logging is encrypted3.11Encrypt sensitive data at rest on servers, applications, and databases. Storage-layer encryption, also known as server-side encryption, meets the minimum requirement of this Safeguard. Additional encryption methods may include application-layer encryption, also known as client-side encryption, where access to the data storage device(s) does not permit access to the plain-text data.
    persistent-disk-encryptedEnsure Persistent Disks are encrypted3.11CIS Controls v8 IG2 3.11 - Encryption at Rest: Encrypt sensitive data at rest on servers, applications, and databases. Persistent Disks should be encrypted to protect data from unauthorized access and ensure compliance with security requirements.
    cloud-filestore-encrypted-checkEnsure Cloud Filestore is encrypted3.11Encrypt sensitive data at rest on servers, applications, and databases. Storage-layer encryption, also known as server-side encryption, meets the minimum requirement of this Safeguard. Additional encryption methods may include application-layer encryption, also known as client-side encryption, where access to the data storage device(s) does not permit access to the plain-text data.
    elasticsearch-encrypted-at-restEnsure Elasticsearch is encrypted at rest3.11Encrypt sensitive data at rest on servers, applications, and databases. Storage-layer encryption, also known as server-side encryption, meets the minimum requirement of this Safeguard. Additional encryption methods may include application-layer encryption, also known as client-side encryption, where access to the data storage device(s) does not permit access to the plain-text data.
    cloud-sql-storage-encryptedEnsure Cloud SQL storage is encrypted3.11Encrypt sensitive data at rest on servers, applications, and databases. Storage-layer encryption, also known as server-side encryption, meets the minimum requirement of this Safeguard. Additional encryption methods may include application-layer encryption, also known as client-side encryption, where access to the data storage device(s) does not permit access to the plain-text data.
    cloud-storage-default-encryption-kmsEnsure Cloud Storage default encryption uses Cloud KMS3.11CIS Controls v8 IG2 3.11 - Encryption at Rest: Encrypt sensitive data at rest on servers, applications, and databases. Cloud Storage buckets should use Cloud KMS customer-managed encryption keys (CMEK) for enhanced security and key management control.
    project-part-of-organizationEnsure project is part of GCP Organization4.1Establish and maintain a documented secure configuration process for enterprise assets (end-user devices, including portable and mobile, non-computing/IoT devices, and servers) and software (operating systems and applications). Review and update documentation annually, or when significant enterprise changes occur that could impact this Safeguard.
    bigquery-maintenance-settings-checkEnsure BigQuery maintenance settings are configured4.1Establish and maintain a documented secure configuration process for enterprise assets (end-user devices, including portable and mobile, non-computing/IoT devices, and servers) and software (operating systems and applications). Review and update documentation annually, or when significant enterprise changes occur that could impact this Safeguard.
    kms-key-rotation-enabledEnsure Cloud KMS key rotation is enabled4.6Securely manage enterprise assets and software. Example implementations include managing configuration through version-controlled Infrastructure-as-Code (IaC) and accessing administrative interfaces over secure network protocols, such as Secure Shell (SSH) and Hypertext Transfer Protocol Secure (HTTPS). Do not use insecure management protocols, such as Telnet (Teletype Network) and HTTP, unless operationally essential.
    persistent-disk-unusedEnsure Persistent Disks are not unused4.6CIS Controls v8 IG1 4.6 - Secure Configuration: Persistent Disks that are not attached to any compute instances should be reviewed and removed to maintain proper asset inventory hygiene and prevent orphaned storage resources.
    persistent-disk-attached-encryption-enabledEnsure Persistent Disks are encrypted when attached4.6CIS Controls v8 IG1 4.6 - Secure Configuration: Persistent Disks should use customer-managed encryption keys (CMEK) or at minimum Google-managed encryption to protect data at rest and ensure compliance with security requirements.
    cloud-storage-bucket-default-encryption-enabledEnsure Cloud Storage buckets have default encryption enabled4.6Securely manage enterprise assets and software. Example implementations include managing configuration through version-controlled Infrastructure-as-Code (IaC) and accessing administrative interfaces over secure network protocols, such as Secure Shell (SSH) and Hypertext Transfer Protocol Secure (HTTPS). Do not use insecure management protocols, such as Telnet (Teletype Network) and HTTP, unless operationally essential.
    vpc-firewall-rule-restrict-ingress-ssh-allRestrict SSH access from all IPs in firewall rules4.6Securely manage enterprise assets and software. Example implementations include managing configuration through version-controlled Infrastructure-as-Code (IaC) and accessing administrative interfaces over secure network protocols, such as Secure Shell (SSH) and Hypertext Transfer Protocol Secure (HTTPS). Do not use insecure management protocols, such as Telnet (Teletype Network) and HTTP, unless operationally essential.
    managed-instance-group-load-balancer-healthcheck-requiredEnsure Managed Instance Groups have Load Balancer health check required4.6Securely manage enterprise assets and software. Example implementations include managing configuration through version-controlled Infrastructure-as-Code (IaC) and accessing administrative interfaces over secure network protocols, such as Secure Shell (SSH) and Hypertext Transfer Protocol Secure (HTTPS). Do not use insecure management protocols, such as Telnet (Teletype Network) and HTTP, unless operationally essential.
    cloud-storage-bucket-versioning-enabledEnsure Cloud Storage bucket versioning is enabled4.6CIS Controls v8 IG1 4.6 - Secure Configuration: Enable versioning on Cloud Storage buckets to maintain multiple versions of objects. Versioning protects against accidental deletion or modification, supports data recovery, and helps meet compliance requirements for data retention.
    iam-policy-no-statements-with-admin-accessPrevent IAM policy bindings with administrative access permissions for secure configuration.4.6Securely manage enterprise assets and software. Example implementations include managing configuration through version-controlled Infrastructure-as-Code (IaC) and accessing administrative interfaces over secure network protocols, such as Secure Shell (SSH) and Hypertext Transfer Protocol Secure (HTTPS). Do not use insecure management protocols, such as Telnet (Teletype Network) and HTTP, unless operationally essential.
    restricted-sshRestrict SSH access for monitoring compliance4.6Securely manage enterprise assets and software. Example implementations include managing configuration through version-controlled Infrastructure-as-Code (IaC) and accessing administrative interfaces over secure network protocols, such as Secure Shell (SSH) and Hypertext Transfer Protocol Secure (HTTPS). Do not use insecure management protocols, such as Telnet (Teletype Network) and HTTP, unless operationally essential.
    iam-policy-no-wildcard-permissionsPrevent IAM custom roles with wildcard permissions to enforce least privilege access control.5.4Restrict administrator privileges to dedicated administrator accounts on enterprise assets. Conduct general computing activities, such as internet browsing, email, and productivity suite use, from the user’s primary, non-privileged account.
    cloud-security-scanner-enabledEnsure Cloud Security Scanner is enabled for vulnerability management7.1Establish and maintain a documented vulnerability management process for enterprise assets. Review and update documentation annually, or when significant enterprise changes occur that could impact this Safeguard.
    compute-engine-os-config-compliance-patch-compliantEnsure OS Config managed instances have patch compliance7.1; 7.3CIS Controls v8 IG1 7.1; 7.3 - Vulnerability Management: Establish and maintain a documented vulnerability management process for enterprise assets, and perform automated operating system patch management on a monthly or more frequent basis.
    api-gateway-logging-configurationEnsure API Gateway has proper logging configuration with service accounts and audit logs8.2Collect audit logs. Ensure that logging, per the enterprise’s audit log management process, has been enabled across enterprise assets.
    cloud-audit-logs-cloud-logging-enabledEnable Cloud Audit Logs Cloud Logging integration for monitoring8.2Collect audit logs. Ensure that logging, per the enterprise’s audit log management process, has been enabled across enterprise assets.
    cloud-cdn-logging-enabledEnsure Cloud CDN has logging enabled for audit and monitoring8.2Collect audit logs. Ensure that logging, per the enterprise’s audit log management process, has been enabled across enterprise assets.
    vpc-flow-logs-enabledEnsure VPC subnets have Flow Logs enabled for audit and monitoring8.2Collect audit logs. Ensure that logging, per the enterprise’s audit log management process, has been enabled across enterprise assets.
    cloud-armor-security-policy-logging-enabledEnsure Cloud Armor security policies have logging enabled through their backend services8.2Collect audit logs. Ensure that logging, per the enterprise’s audit log management process, has been enabled across enterprise assets.
    cloud-audit-logs-security-trail-enabledEnsure Cloud Audit Logs security trail is enabled8.2Collect audit logs. Ensure that logging, per the enterprise’s audit log management process, has been enabled across enterprise assets.
    cloud-audit-logs-multi-region-trail-enabledEnsure Cloud Audit Logs multi-region trail is enabled8.3Ensure that logging destinations maintain adequate storage to comply with the enterprise’s audit log management process.
    cloud-audit-logs-integrity-monitoring-enabledEnsure Cloud Audit Logs integrity monitoring is enabled8.3Ensure that logging destinations maintain adequate storage to comply with the enterprise’s audit log management process.
    cloud-audit-logs-data-access-events-enabledEnable Cloud Audit Logs data access events for monitoring8.5Configure detailed audit logging for enterprise assets containing sensitive data. Include event source, date, username, timestamp, source addresses, destination addresses, and other useful elements that could assist in a forensic investigation.
    cloud-sql-instance-backup-enabledPerform automated backups for Cloud SQL instances11.2Perform automated backups of in-scope enterprise assets. Run backups weekly, or more frequently, based on the sensitivity of the data.
    cloud-firestore-in-backup-planPerform automated backups for Cloud Firestore databases and maintain isolated recovery data11.2; 11.4CIS Controls v8 IG1 11.2; 11.4 - Data Recovery: Perform automated backups of in-scope enterprise assets weekly or more frequently, and maintain isolated recovery data through version controlling backup destinations via offline, cloud, or off-site systems.
    persistent-disk-in-backup-planPerform automated backups for Persistent Disks and maintain isolated recovery data11.2; 11.4CIS Controls v8 IG1 11.2; 11.4 - Data Recovery: Ensure automated backups are configured for critical data. Persistent Disks should be included in backup plans using snapshots or backup policies to maintain isolated recovery data.
    cloud-storage-bucket-cross-region-replication-enabledPerform automated backups for Cloud Storage buckets with cross-region replication and maintain isolated recovery data11.2; 11.4CIS Controls v8 IG1 11.2; 11.4 - Data Recovery: Perform automated backups of in-scope enterprise assets weekly or more frequently, and maintain isolated recovery data through version controlling backup destinations via offline, cloud, or off-site systems.
    compute-engine-optimized-instanceEnsure Compute Engine instances are optimized for backup and maintain isolated recovery data11.2; 11.4CIS Controls v8 IG1 11.2; 11.4 - Data Recovery: Perform automated backups of in-scope enterprise assets weekly or more frequently, and maintain isolated recovery data through version controlling backup destinations via offline, cloud, or off-site systems.
    cloud-firestore-pitr-enabledEnsure Cloud Firestore point-in-time recovery is enabled and maintain isolated recovery data11.2; 11.4CIS Controls v8 IG1 11.2; 11.4 - Data Recovery: Perform automated backups of in-scope enterprise assets weekly or more frequently, and maintain isolated recovery data through version controlling backup destinations via offline, cloud, or off-site systems.
    cloud-sql-backup-enabledEnsure Cloud SQL backup is enabled and maintain isolated recovery data11.2; 11.4CIS Controls v8 IG1 11.2; 11.4 - Data Recovery: Perform automated backups of in-scope enterprise assets weekly or more frequently, and maintain isolated recovery data through version controlling backup destinations via offline, cloud, or off-site systems.
    compute-engine-instance-os-config-managedEnsure Compute Engine instances are managed with OS Config12.1Ensure network infrastructure is kept up-to-date. Example implementations include running the latest stable release of software and/or using currently supported network as a service (NaaS) offerings. Review software versions monthly, or more frequently, to verify software support.
    certificate-manager-certificate-lifecycle-managementEnsure proper certificate lifecycle management to prevent expiration12.2Design and maintain a secure network architecture. A secure network architecture must address segmentation, least privilege, and availability, at a minimum. Example implementations may include documentation, policy, and design components.
    cloud-sql-enhanced-networking-enabledEnsure Cloud SQL enhanced networking is enabled12.2Design and maintain a secure network architecture. A secure network architecture must address segmentation, least privilege, and availability, at a minimum. Example implementations may include documentation, policy, and design components.
    cloud-firestore-autoscaling-enabledEnsure Cloud Firestore autoscaling is enabled12.2Design and maintain a secure network architecture. A secure network architecture must address segmentation, least privilege, and availability, at a minimum. Example implementations may include documentation, policy, and design components.
    load-balancer-cross-region-load-balancing-enabledEnsure Load Balancer cross-region load balancing is enabled12.2Design and maintain a secure network architecture. A secure network architecture must address segmentation, least privilege, and availability, at a minimum. Example implementations may include documentation, policy, and design components.
    load-balancer-deletion-protection-enabledEnsure Load Balancer has high availability configuration12.2Design and maintain a secure network architecture. A secure network architecture must address segmentation, least privilege, and availability, at a minimum. Example implementations may include documentation, policy, and design components.
    cloud-sql-instance-deletion-protection-enabledEnsure Cloud SQL instance deletion protection is enabled12.2Design and maintain a secure network architecture. A secure network architecture must address segmentation, least privilege, and availability, at a minimum. Example implementations may include documentation, policy, and design components.
    cloud-sql-multi-region-supportEnsure Cloud SQL multi-region support is enabled12.2Design and maintain a secure network architecture. A secure network architecture must address segmentation, least privilege, and availability, at a minimum. Example implementations may include documentation, policy, and design components.
    load-balancer-cloud-armor-enabledEnsure Load Balancer has Cloud Armor enabled for network monitoring and defense13.1Centralize security event alerting across enterprise assets for log correlation and analysis. Best practice implementation requires the use of a SIEM, which includes vendor-defined event correlation alerts. A log analytics platform configured with security-relevant correlation alerts also satisfies this Safeguard.
    cloud-build-trigger-envvar-gcpcred-checkEnsure Cloud Build trigger environment variables do not contain GCP credentials16.1; 16.12CIS Controls v8 IG2 16.1 and IG3 16.12 - Application Security: Establish and maintain a secure application development process addressing secure coding practices, developer training, vulnerability management, security of third-party code, application security testing procedures, and code-level security checks.
    cloud-build-trigger-source-repo-url-checkEnsure Cloud Build trigger source repository URLs use secure protocols16.1; 16.12CIS Controls v8 IG2 16.1 and IG3 16.12 - Application Security: Establish and maintain a secure application development process addressing secure coding practices, developer training, vulnerability management, security of third-party code, application security testing procedures, and code-level security checks.
      Neo just got smarter about infrastructure policy automation