Update yaml org policies

This commit is contained in:
Julio Castillo 2023-02-21 13:58:08 +01:00
parent 6b767c9035
commit d3bcf625f9
15 changed files with 233 additions and 146 deletions

View File

@ -3,71 +3,90 @@
# sample subset of useful organization policies, edit to suit requirements # sample subset of useful organization policies, edit to suit requirements
compute.disableGuestAttributesAccess: compute.disableGuestAttributesAccess:
enforce: true rules:
- enforce: true
compute.requireOsLogin: compute.requireOsLogin:
enforce: true rules:
- enforce: true
compute.restrictLoadBalancerCreationForTypes: compute.restrictLoadBalancerCreationForTypes:
allow: rules:
values: - allow:
- in:INTERNAL values:
- in:INTERNAL
compute.skipDefaultNetworkCreation: compute.skipDefaultNetworkCreation:
enforce: true rules:
- enforce: true
compute.vmExternalIpAccess: compute.vmExternalIpAccess:
deny: rules:
all: true - deny:
all: true
# compute.disableInternetNetworkEndpointGroup: # compute.disableInternetNetworkEndpointGroup:
# enforce: true # rules:
# - enforce: true
# compute.disableNestedVirtualization: # compute.disableNestedVirtualization:
# enforce: true # rules:
# - enforce: true
# compute.disableSerialPortAccess: # compute.disableSerialPortAccess:
# enforce: true # rules:
# - enforce: true
# compute.restrictCloudNATUsage: # compute.restrictCloudNATUsage:
# deny: # rules:
# all: true # - deny:
# all: true
# compute.restrictDedicatedInterconnectUsage: # compute.restrictDedicatedInterconnectUsage:
# deny: # rules:
# all: true # - deny:
# all: true
# compute.restrictPartnerInterconnectUsage: # compute.restrictPartnerInterconnectUsage:
# deny: # rules:
# all: true # - deny:
# all: true
# compute.restrictProtocolForwardingCreationForTypes: # compute.restrictProtocolForwardingCreationForTypes:
# deny: # rules:
# all: true # - deny:
# all: true
# compute.restrictSharedVpcHostProjects: # compute.restrictSharedVpcHostProjects:
# deny: # rules:
# all: true # - deny:
# all: true
# compute.restrictSharedVpcSubnetworks: # compute.restrictSharedVpcSubnetworks:
# deny: # rules:
# all: true # - deny:
# all: true
# compute.restrictVpcPeering: # compute.restrictVpcPeering:
# deny: # rules:
# all: true # - deny:
# all: true
# compute.restrictVpnPeerIPs: # compute.restrictVpnPeerIPs:
# deny: # rules:
# all: true # - deny:
# all: true
# compute.restrictXpnProjectLienRemoval: # compute.restrictXpnProjectLienRemoval:
# enforce: true # rules:
# - enforce: true
# compute.setNewProjectDefaultToZonalDNSOnly: # compute.setNewProjectDefaultToZonalDNSOnly:
# enforce: true # rules:
# - enforce: true
# compute.vmCanIpForward: # compute.vmCanIpForward:
# deny: # rules:
# all: true # - deny:
# all: true

View File

@ -3,10 +3,13 @@
# sample subset of useful organization policies, edit to suit requirements # sample subset of useful organization policies, edit to suit requirements
iam.automaticIamGrantsForDefaultServiceAccounts: iam.automaticIamGrantsForDefaultServiceAccounts:
enforce: true rules:
- enforce: true
iam.disableServiceAccountKeyCreation: iam.disableServiceAccountKeyCreation:
enforce: true rules:
- enforce: true
iam.disableServiceAccountKeyUpload: iam.disableServiceAccountKeyUpload:
enforce: true rules:
- enforce: true

View File

@ -3,24 +3,29 @@
# sample subset of useful organization policies, edit to suit requirements # sample subset of useful organization policies, edit to suit requirements
run.allowedIngress: run.allowedIngress:
allow: rules:
values: - allow:
- is:internal values:
- is:internal
# run.allowedVPCEgress: # run.allowedVPCEgress:
# allow: # rules:
# values: # - allow:
# values:
# - is:private-ranges-only # - is:private-ranges-only
# cloudfunctions.allowedIngressSettings: # cloudfunctions.allowedIngressSettings:
# allow: # rules:
# values: # - allow:
# - is:ALLOW_INTERNAL_ONLY # values:
# - is:ALLOW_INTERNAL_ONLY
# cloudfunctions.allowedVpcConnectorEgressSettings: # cloudfunctions.allowedVpcConnectorEgressSettings:
# allow: # rules:
# values: # - allow:
# - is:PRIVATE_RANGES_ONLY # values:
# - is:PRIVATE_RANGES_ONLY
# cloudfunctions.requireVPCConnector: # cloudfunctions.requireVPCConnector:
# enforce: true # rules:
# - enforce: true

View File

@ -3,7 +3,9 @@
# sample subset of useful organization policies, edit to suit requirements # sample subset of useful organization policies, edit to suit requirements
sql.restrictAuthorizedNetworks: sql.restrictAuthorizedNetworks:
enforce: true rules:
- enforce: true
sql.restrictPublicIp: sql.restrictPublicIp:
enforce: true rules:
- enforce: true

View File

@ -3,4 +3,5 @@
# sample subset of useful organization policies, edit to suit requirements # sample subset of useful organization policies, edit to suit requirements
storage.uniformBucketLevelAccess: storage.uniformBucketLevelAccess:
enforce: true rules:
- enforce: true

View File

@ -3,71 +3,90 @@
# sample subset of useful organization policies, edit to suit requirements # sample subset of useful organization policies, edit to suit requirements
compute.disableGuestAttributesAccess: compute.disableGuestAttributesAccess:
enforce: true rules:
- enforce: true
compute.requireOsLogin: compute.requireOsLogin:
enforce: true rules:
- enforce: true
compute.restrictLoadBalancerCreationForTypes: compute.restrictLoadBalancerCreationForTypes:
allow: rules:
values: - allow:
- in:INTERNAL values:
- in:INTERNAL
compute.skipDefaultNetworkCreation: compute.skipDefaultNetworkCreation:
enforce: true rules:
- enforce: true
compute.vmExternalIpAccess: compute.vmExternalIpAccess:
deny: rules:
all: true - deny:
all: true
# compute.disableInternetNetworkEndpointGroup: # compute.disableInternetNetworkEndpointGroup:
# enforce: true # rules:
# - enforce: true
# compute.disableNestedVirtualization: # compute.disableNestedVirtualization:
# enforce: true # rules:
# - enforce: true
# compute.disableSerialPortAccess: # compute.disableSerialPortAccess:
# enforce: true # rules:
# - enforce: true
# compute.restrictCloudNATUsage: # compute.restrictCloudNATUsage:
# deny: # rules:
# all: true # - deny:
# all: true
# compute.restrictDedicatedInterconnectUsage: # compute.restrictDedicatedInterconnectUsage:
# deny: # rules:
# all: true # - deny:
# all: true
# compute.restrictPartnerInterconnectUsage: # compute.restrictPartnerInterconnectUsage:
# deny: # rules:
# all: true # - deny:
# all: true
# compute.restrictProtocolForwardingCreationForTypes: # compute.restrictProtocolForwardingCreationForTypes:
# deny: # rules:
# all: true # - deny:
# all: true
# compute.restrictSharedVpcHostProjects: # compute.restrictSharedVpcHostProjects:
# deny: # rules:
# all: true # - deny:
# all: true
# compute.restrictSharedVpcSubnetworks: # compute.restrictSharedVpcSubnetworks:
# deny: # rules:
# all: true # - deny:
# all: true
# compute.restrictVpcPeering: # compute.restrictVpcPeering:
# deny: # rules:
# all: true # - deny:
# all: true
# compute.restrictVpnPeerIPs: # compute.restrictVpnPeerIPs:
# deny: # rules:
# all: true # - deny:
# all: true
# compute.restrictXpnProjectLienRemoval: # compute.restrictXpnProjectLienRemoval:
# enforce: true # rules:
# - enforce: true
# compute.setNewProjectDefaultToZonalDNSOnly: # compute.setNewProjectDefaultToZonalDNSOnly:
# enforce: true # rules:
# - enforce: true
# compute.vmCanIpForward: # compute.vmCanIpForward:
# deny: # rules:
# all: true # - deny:
# all: true

View File

@ -3,10 +3,13 @@
# sample subset of useful organization policies, edit to suit requirements # sample subset of useful organization policies, edit to suit requirements
iam.automaticIamGrantsForDefaultServiceAccounts: iam.automaticIamGrantsForDefaultServiceAccounts:
enforce: true rules:
- enforce: true
iam.disableServiceAccountKeyCreation: iam.disableServiceAccountKeyCreation:
enforce: true rules:
- enforce: true
iam.disableServiceAccountKeyUpload: iam.disableServiceAccountKeyUpload:
enforce: true rules:
- enforce: true

View File

@ -3,24 +3,29 @@
# sample subset of useful organization policies, edit to suit requirements # sample subset of useful organization policies, edit to suit requirements
run.allowedIngress: run.allowedIngress:
allow: rules:
values: - allow:
- is:internal values:
- is:internal
# run.allowedVPCEgress: # run.allowedVPCEgress:
# allow: # rules:
# values: # - allow:
# values:
# - is:private-ranges-only # - is:private-ranges-only
# cloudfunctions.allowedIngressSettings: # cloudfunctions.allowedIngressSettings:
# allow: # rules:
# values: # - allow:
# - is:ALLOW_INTERNAL_ONLY # values:
# - is:ALLOW_INTERNAL_ONLY
# cloudfunctions.allowedVpcConnectorEgressSettings: # cloudfunctions.allowedVpcConnectorEgressSettings:
# allow: # rules:
# values: # - allow:
# - is:PRIVATE_RANGES_ONLY # values:
# - is:PRIVATE_RANGES_ONLY
# cloudfunctions.requireVPCConnector: # cloudfunctions.requireVPCConnector:
# enforce: true # rules:
# - enforce: true

View File

@ -3,4 +3,5 @@
# sample subset of useful organization policies, edit to suit requirements # sample subset of useful organization policies, edit to suit requirements
storage.uniformBucketLevelAccess: storage.uniformBucketLevelAccess:
enforce: true rules:
- enforce: true

View File

@ -3,71 +3,90 @@
# sample subset of useful organization policies, edit to suit requirements # sample subset of useful organization policies, edit to suit requirements
compute.disableGuestAttributesAccess: compute.disableGuestAttributesAccess:
enforce: true rules:
- enforce: true
compute.requireOsLogin: compute.requireOsLogin:
enforce: true rules:
- enforce: true
compute.restrictLoadBalancerCreationForTypes: compute.restrictLoadBalancerCreationForTypes:
allow: rules:
values: - allow:
- in:INTERNAL values:
- in:INTERNAL
compute.skipDefaultNetworkCreation: compute.skipDefaultNetworkCreation:
enforce: true rules:
- enforce: true
compute.vmExternalIpAccess: compute.vmExternalIpAccess:
deny: rules:
all: true - deny:
all: true
# compute.disableInternetNetworkEndpointGroup: # compute.disableInternetNetworkEndpointGroup:
# enforce: true # rules:
# - enforce: true
# compute.disableNestedVirtualization: # compute.disableNestedVirtualization:
# enforce: true # rules:
# - enforce: true
# compute.disableSerialPortAccess: # compute.disableSerialPortAccess:
# enforce: true # rules:
# - enforce: true
# compute.restrictCloudNATUsage: # compute.restrictCloudNATUsage:
# deny: # rules:
# all: true # - deny:
# all: true
# compute.restrictDedicatedInterconnectUsage: # compute.restrictDedicatedInterconnectUsage:
# deny: # rules:
# all: true # - deny:
# all: true
# compute.restrictPartnerInterconnectUsage: # compute.restrictPartnerInterconnectUsage:
# deny: # rules:
# all: true # - deny:
# all: true
# compute.restrictProtocolForwardingCreationForTypes: # compute.restrictProtocolForwardingCreationForTypes:
# deny: # rules:
# all: true # - deny:
# all: true
# compute.restrictSharedVpcHostProjects: # compute.restrictSharedVpcHostProjects:
# deny: # rules:
# all: true # - deny:
# all: true
# compute.restrictSharedVpcSubnetworks: # compute.restrictSharedVpcSubnetworks:
# deny: # rules:
# all: true # - deny:
# all: true
# compute.restrictVpcPeering: # compute.restrictVpcPeering:
# deny: # rules:
# all: true # - deny:
# all: true
# compute.restrictVpnPeerIPs: # compute.restrictVpnPeerIPs:
# deny: # rules:
# all: true # - deny:
# all: true
# compute.restrictXpnProjectLienRemoval: # compute.restrictXpnProjectLienRemoval:
# enforce: true # rules:
# - enforce: true
# compute.setNewProjectDefaultToZonalDNSOnly: # compute.setNewProjectDefaultToZonalDNSOnly:
# enforce: true # rules:
# - enforce: true
# compute.vmCanIpForward: # compute.vmCanIpForward:
# deny: # rules:
# all: true # - deny:
# all: true

View File

@ -3,10 +3,13 @@
# sample subset of useful organization policies, edit to suit requirements # sample subset of useful organization policies, edit to suit requirements
iam.automaticIamGrantsForDefaultServiceAccounts: iam.automaticIamGrantsForDefaultServiceAccounts:
enforce: true rules:
- enforce: true
iam.disableServiceAccountKeyCreation: iam.disableServiceAccountKeyCreation:
enforce: true rules:
- enforce: true
iam.disableServiceAccountKeyUpload: iam.disableServiceAccountKeyUpload:
enforce: true rules:
- enforce: true

View File

@ -3,24 +3,29 @@
# sample subset of useful organization policies, edit to suit requirements # sample subset of useful organization policies, edit to suit requirements
run.allowedIngress: run.allowedIngress:
allow: rules:
values: - allow:
- is:internal values:
- is:internal
# run.allowedVPCEgress: # run.allowedVPCEgress:
# allow: # rules:
# values: # - allow:
# values:
# - is:private-ranges-only # - is:private-ranges-only
# cloudfunctions.allowedIngressSettings: # cloudfunctions.allowedIngressSettings:
# allow: # rules:
# values: # - allow:
# - is:ALLOW_INTERNAL_ONLY # values:
# - is:ALLOW_INTERNAL_ONLY
# cloudfunctions.allowedVpcConnectorEgressSettings: # cloudfunctions.allowedVpcConnectorEgressSettings:
# allow: # rules:
# values: # - allow:
# - is:PRIVATE_RANGES_ONLY # values:
# - is:PRIVATE_RANGES_ONLY
# cloudfunctions.requireVPCConnector: # cloudfunctions.requireVPCConnector:
# enforce: true # rules:
# - enforce: true

View File

@ -3,7 +3,9 @@
# sample subset of useful organization policies, edit to suit requirements # sample subset of useful organization policies, edit to suit requirements
sql.restrictAuthorizedNetworks: sql.restrictAuthorizedNetworks:
enforce: true rules:
- enforce: true
sql.restrictPublicIp: sql.restrictPublicIp:
enforce: true rules:
- enforce: true

View File

@ -3,4 +3,5 @@
# sample subset of useful organization policies, edit to suit requirements # sample subset of useful organization policies, edit to suit requirements
storage.uniformBucketLevelAccess: storage.uniformBucketLevelAccess:
enforce: true rules:
- enforce: true

View File

@ -11,7 +11,6 @@ org_policies = {
}] }]
} }
"compute.restrictLoadBalancerCreationForTypes" = { "compute.restrictLoadBalancerCreationForTypes" = {
rules = [ rules = [
{ {
condition = { condition = {