2022-01-19 05:17:20 -08:00
|
|
|
/**
|
|
|
|
* Copyright 2022 Google LLC
|
|
|
|
*
|
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
* you may not use this file except in compliance with the License.
|
|
|
|
* You may obtain a copy of the License at
|
|
|
|
*
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
*
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
* limitations under the License.
|
|
|
|
*/
|
|
|
|
|
|
|
|
# tfdoc:file:description Organization policies.
|
|
|
|
|
|
|
|
|
|
|
|
locals {
|
|
|
|
# set to the empty list if you remove the teams branch
|
|
|
|
branch_teams_pf_sa_iam_emails = [
|
|
|
|
module.branch-teams-dev-projectfactory-sa.iam_email,
|
|
|
|
module.branch-teams-prod-projectfactory-sa.iam_email
|
|
|
|
]
|
2022-01-21 10:38:18 -08:00
|
|
|
list_allow = {
|
|
|
|
inherit_from_parent = false
|
|
|
|
suggested_value = null
|
|
|
|
status = true
|
|
|
|
values = []
|
|
|
|
}
|
2022-01-19 05:17:20 -08:00
|
|
|
list_deny = {
|
|
|
|
inherit_from_parent = false
|
|
|
|
suggested_value = null
|
|
|
|
status = false
|
|
|
|
values = []
|
|
|
|
}
|
|
|
|
policy_configs = (
|
|
|
|
var.organization_policy_configs == null
|
|
|
|
? {}
|
|
|
|
: var.organization_policy_configs
|
|
|
|
)
|
|
|
|
}
|
|
|
|
|
|
|
|
module "organization" {
|
|
|
|
source = "../../../modules/organization"
|
|
|
|
organization_id = "organizations/${var.organization.id}"
|
|
|
|
# IAM additive bindings, granted via the restricted Organization Admin custom
|
|
|
|
# role assigned in stage 00; they need to be additive to avoid conflicts
|
|
|
|
iam_additive = merge(
|
|
|
|
{
|
|
|
|
"roles/accesscontextmanager.policyAdmin" = [
|
|
|
|
module.branch-security-sa.iam_email
|
|
|
|
]
|
|
|
|
"roles/billing.costsManager" = concat(
|
|
|
|
local.branch_teams_pf_sa_iam_emails
|
|
|
|
),
|
|
|
|
"roles/compute.orgFirewallPolicyAdmin" = [
|
|
|
|
module.branch-network-sa.iam_email
|
|
|
|
]
|
|
|
|
"roles/compute.xpnAdmin" = [
|
|
|
|
module.branch-network-sa.iam_email
|
|
|
|
]
|
|
|
|
"roles/orgpolicy.policyAdmin" = local.branch_teams_pf_sa_iam_emails
|
|
|
|
},
|
|
|
|
local.billing_org ? {
|
|
|
|
"roles/billing.user" = concat(
|
|
|
|
[
|
|
|
|
module.branch-network-sa.iam_email,
|
|
|
|
module.branch-security-sa.iam_email,
|
|
|
|
],
|
|
|
|
# enable if individual teams can create their own projects
|
|
|
|
# [
|
|
|
|
# for k, v in module.branch-teams-team-sa : v.iam_email
|
|
|
|
# ],
|
|
|
|
local.branch_teams_pf_sa_iam_emails
|
|
|
|
)
|
|
|
|
} : {}
|
|
|
|
)
|
|
|
|
# sample subset of useful organization policies, edit to suit requirements
|
|
|
|
policy_boolean = {
|
|
|
|
"constraints/cloudfunctions.requireVPCConnector" = true
|
|
|
|
"constraints/compute.disableGuestAttributesAccess" = true
|
|
|
|
"constraints/compute.disableInternetNetworkEndpointGroup" = true
|
|
|
|
"constraints/compute.disableNestedVirtualization" = true
|
|
|
|
"constraints/compute.disableSerialPortAccess" = true
|
|
|
|
"constraints/compute.requireOsLogin" = true
|
|
|
|
"constraints/compute.restrictXpnProjectLienRemoval" = true
|
|
|
|
"constraints/compute.skipDefaultNetworkCreation" = true
|
|
|
|
"constraints/iam.automaticIamGrantsForDefaultServiceAccounts" = true
|
|
|
|
"constraints/iam.disableServiceAccountKeyCreation" = true
|
|
|
|
"constraints/iam.disableServiceAccountKeyUpload" = true
|
|
|
|
"constraints/sql.restrictPublicIp" = true
|
|
|
|
"constraints/sql.restrictAuthorizedNetworks" = true
|
|
|
|
"constraints/storage.uniformBucketLevelAccess" = true
|
|
|
|
}
|
|
|
|
policy_list = {
|
|
|
|
"constraints/cloudfunctions.allowedIngressSettings" = merge(
|
2022-01-21 10:38:18 -08:00
|
|
|
local.list_allow, { values = ["is:ALLOW_INTERNAL_ONLY"] }
|
2022-01-19 05:17:20 -08:00
|
|
|
)
|
|
|
|
"constraints/cloudfunctions.allowedVpcConnectorEgressSettings" = merge(
|
2022-01-21 10:38:18 -08:00
|
|
|
local.list_allow, { values = ["is:PRIVATE_RANGES_ONLY"] }
|
2022-01-19 05:17:20 -08:00
|
|
|
)
|
|
|
|
"constraints/compute.restrictLoadBalancerCreationForTypes" = merge(
|
2022-01-21 10:38:18 -08:00
|
|
|
local.list_allow, { values = ["in:INTERNAL"] }
|
2022-01-19 05:17:20 -08:00
|
|
|
)
|
|
|
|
"constraints/compute.vmExternalIpAccess" = local.list_deny
|
|
|
|
"constraints/iam.allowedPolicyMemberDomains" = {
|
|
|
|
inherit_from_parent = false
|
|
|
|
suggested_value = null
|
|
|
|
status = true
|
|
|
|
values = concat(
|
|
|
|
[var.organization.customer_id],
|
|
|
|
try(local.policy_configs.allowed_policy_member_domains, [])
|
|
|
|
)
|
|
|
|
}
|
|
|
|
"constraints/run.allowedIngress" = merge(
|
2022-01-21 10:38:18 -08:00
|
|
|
local.list_allow, { values = ["is:internal"] }
|
2022-01-19 05:17:20 -08:00
|
|
|
)
|
|
|
|
"constraints/run.allowedVPCEgress" = merge(
|
2022-01-21 10:38:18 -08:00
|
|
|
local.list_allow, { values = ["is:private-ranges-only"] }
|
2022-01-19 05:17:20 -08:00
|
|
|
)
|
|
|
|
# "constraints/compute.restrictCloudNATUsage" = local.list_deny
|
|
|
|
# "constraints/compute.restrictDedicatedInterconnectUsage" = local.list_deny
|
|
|
|
# "constraints/compute.restrictPartnerInterconnectUsage" = local.list_deny
|
|
|
|
# "constraints/compute.restrictProtocolForwardingCreationForTypes" = local.list_deny
|
|
|
|
# "constraints/compute.restrictSharedVpcHostProjects" = local.list_deny
|
|
|
|
# "constraints/compute.restrictSharedVpcSubnetworks" = local.list_deny
|
|
|
|
# "constraints/compute.restrictVpcPeering" = local.list_deny
|
|
|
|
# "constraints/compute.restrictVpnPeerIPs" = local.list_deny
|
|
|
|
# "constraints/compute.vmCanIpForward" = local.list_deny
|
|
|
|
# "constraints/gcp.resourceLocations" = {
|
|
|
|
# inherit_from_parent = false
|
|
|
|
# suggested_value = null
|
|
|
|
# status = true
|
|
|
|
# values = local.allowed_regions
|
|
|
|
# }
|
|
|
|
}
|
|
|
|
}
|