# Copyright 2023 Google LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. values: module.org.google_org_policy_policy.default["compute.disableGuestAttributesAccess"]: name: organizations/1234567890/policies/compute.disableGuestAttributesAccess parent: organizations/1234567890 spec: - inherit_from_parent: null reset: null rules: - allow_all: null condition: [] deny_all: null enforce: 'TRUE' values: [] module.org.google_org_policy_policy.default["compute.skipDefaultNetworkCreation"]: name: organizations/1234567890/policies/compute.skipDefaultNetworkCreation parent: organizations/1234567890 spec: - inherit_from_parent: null reset: null rules: - allow_all: null condition: [] deny_all: null enforce: 'TRUE' values: [] module.org.google_org_policy_policy.default["compute.trustedImageProjects"]: name: organizations/1234567890/policies/compute.trustedImageProjects parent: organizations/1234567890 spec: - inherit_from_parent: null reset: null rules: - allow_all: null condition: [] deny_all: null enforce: null values: - allowed_values: - projects/my-project denied_values: null module.org.google_org_policy_policy.default["compute.vmExternalIpAccess"]: name: organizations/1234567890/policies/compute.vmExternalIpAccess parent: organizations/1234567890 spec: - inherit_from_parent: null reset: null rules: - allow_all: null condition: [] deny_all: 'TRUE' enforce: null values: [] module.org.google_org_policy_policy.default["iam.allowedPolicyMemberDomains"]: name: organizations/1234567890/policies/iam.allowedPolicyMemberDomains parent: organizations/1234567890 spec: - inherit_from_parent: null reset: null rules: - allow_all: 'TRUE' condition: - description: Allow external identities when resource has the `allowexternal` tag set to true. expression: resource.matchTag('1234567890/allowexternal', 'true') location: null title: Allow external identities deny_all: null enforce: null values: [] - allow_all: null condition: - description: For any resource without allowexternal=true, only allow identities from restricted domains. expression: '!resource.matchTag(''1234567890/allowexternal'', ''true'')' location: null title: '' deny_all: null enforce: null values: - allowed_values: - C0xxxxxxx - C0yyyyyyy denied_values: null module.org.google_org_policy_policy.default["iam.disableServiceAccountKeyCreation"]: name: organizations/1234567890/policies/iam.disableServiceAccountKeyCreation parent: organizations/1234567890 spec: - inherit_from_parent: null reset: null rules: - allow_all: null condition: [] deny_all: null enforce: 'TRUE' values: [] module.org.google_org_policy_policy.default["iam.disableServiceAccountKeyUpload"]: name: organizations/1234567890/policies/iam.disableServiceAccountKeyUpload parent: organizations/1234567890 spec: - inherit_from_parent: null reset: null rules: - allow_all: null condition: - description: test condition expression: resource.matchTagId('tagKeys/1234', 'tagValues/1234') location: somewhere title: condition deny_all: null enforce: 'TRUE' values: [] - allow_all: null condition: [] deny_all: null enforce: 'FALSE' values: [] module.org.google_organization_iam_binding.authoritative["roles/owner"]: condition: [] members: - group:cloud-owners@example.org org_id: '1234567890' role: roles/owner module.org.google_organization_iam_binding.authoritative["roles/projectCreator"]: condition: [] members: - group:cloud-owners@example.org org_id: '1234567890' role: roles/projectCreator module.org.google_organization_iam_binding.authoritative["roles/resourcemanager.projectCreator"]: condition: [] members: - group:cloud-admins@example.org org_id: '1234567890' role: roles/resourcemanager.projectCreator module.org.google_organization_iam_member.additive["roles/compute.admin-user:compute@example.org"]: condition: [] member: user:compute@example.org org_id: '1234567890' role: roles/compute.admin module.org.google_organization_iam_member.additive["roles/container.viewer-user:compute@example.org"]: condition: [] member: user:compute@example.org org_id: '1234567890' role: roles/container.viewer module.org.google_tags_tag_key.default["allowexternal"]: description: Allow external identities. parent: organizations/1234567890 purpose: null purpose_data: null short_name: allowexternal module.org.google_tags_tag_value.default["allowexternal/false"]: short_name: 'false' module.org.google_tags_tag_value.default["allowexternal/true"]: short_name: 'true' counts: google_org_policy_policy: 8 google_organization_iam_binding: 3 google_organization_iam_member: 2 google_tags_tag_key: 1 google_tags_tag_value: 2