Skip to content

Commit 96786a2

Browse files
authored
Merge pull request #118 from cloudgraphdev/feature/CG-1299-GCP-CIS-130-214
Feature/cg 1299 gcp cis 130 214
2 parents db6e34b + 2baa517 commit 96786a2

3 files changed

Lines changed: 46 additions & 0 deletions

File tree

src/gcp/cis-1.3.0/README.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -84,6 +84,7 @@ Policy Pack based on the GCP Foundations 1.3.0 benchmark provided by the [Center
8484
| GCP CIS 2.11 | Ensure that the log metric filter and alerts exist for SQL instance configuration changes |
8585
| GCP CIS 2.12 | Ensure that Cloud DNS logging is enabled for all VPC networks |
8686
| GCP CIS 2.13 | Ensure Cloud Asset Inventory Is Enabled |
87+
| GCP CIS 2.14 | Ensure 'Access Transparency' is 'Enabled' |
8788
| GCP CIS 3.1 | Ensure that the default network does not exist in a project |
8889
| GCP CIS 3.2 | Ensure legacy networks do not exist for a project |
8990
| GCP CIS 3.3 | Ensure that DNSSEC is enabled for Cloud DNS |
Lines changed: 43 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,43 @@
1+
export default {
2+
id: 'gcp-cis-1.3.0-2.14',
3+
title:
4+
'GCP CIS 2.14 Ensure \'Access Transparency\' is \'Enabled\'',
5+
description: 'GCP Access Transparency provides audit logs for all actions that Google personnel take in syour Google Cloud resources.',
6+
audit: `**Determine if Access Transparency is Enabled**
7+
8+
1. From the Google Cloud Home, click on the Navigation hamburger menu in the top left. Hover over the IAM & Admin Menu. Select settings in the middle of the column that opens.
9+
2. The status will be under the heading *Access Transparency*. Status should be Enabled`,
10+
rationale: `Controlling access to your information is one of the foundations of information security.
11+
Given that Google Employees do have access to your organizations' projects for support
12+
reasons, you should have logging in place to view who, when, and why your information is
13+
being accessed.`,
14+
remediation: `**Add privileges to enable Access Transparency**
15+
16+
1. From the Google Cloud Home, within the project you wish to check, click on the Navigation hamburger menu in the top left. Hover over the 'IAM and Admin'. Select IAM in the top of the column that opens.
17+
2. Click the blue button the says *+add* at the top of the screen.
18+
3. In the *principals* field, select a user or group by typing in their associated email address.
19+
4. Click on the *role* field to expand it. In the filter field enter *Access Transparency Admin* and select it.
20+
5. Click *save*.
21+
22+
**Verify that the Google Cloud project is associated with a billing account**
23+
24+
1. From the Google Cloud Home, click on the Navigation hamburger menu in the top left. Select *Billing*.
25+
2. If you see *This project is not associated with a billing account* you will need to enter billing information or switch to a project with a billing account.
26+
27+
**Enable Access Transparency**
28+
29+
1. From the Google Cloud Home, click on the Navigation hamburger menu in the top left. Hover over the IAM & Admin Menu. Select *settings* in the middle of the column that opens.
30+
2. Click the blue button labeled Enable *Access Transparency for Organization*
31+
32+
**Default Value:**
33+
34+
By default Access Transparency is not enabled.`,
35+
references: [
36+
'https://cloud.google.com/cloud-provider-access-management/accesstransparency/docs/overview',
37+
'https://cloud.google.com/cloud-provider-access-management/accesstransparency/docs/enable',
38+
'https://cloud.google.com/cloud-provider-access-management/accesstransparency/docs/reading-logs',
39+
'https://cloud.google.com/cloud-provider-access-management/accesstransparency/docs/reading-logs#justification_reason_codes',
40+
'https://cloud.google.com/cloud-provider-access-management/accesstransparency/docs/supported-services',
41+
],
42+
severity: 'unknown',
43+
}

src/gcp/cis-1.3.0/rules/index.ts

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -27,6 +27,7 @@ import Gcp_CIS_130_210 from './gcp-cis-1.3.0-2.10'
2727
import Gcp_CIS_130_211 from './gcp-cis-1.3.0-2.11'
2828
import Gcp_CIS_130_212 from './gcp-cis-1.3.0-2.12'
2929
import Gcp_CIS_130_213 from './gcp-cis-1.3.0-2.13'
30+
import Gcp_CIS_130_214 from './gcp-cis-1.3.0-2.14'
3031
import Gcp_CIS_130_31 from './gcp-cis-1.3.0-3.1'
3132
import Gcp_CIS_130_32 from './gcp-cis-1.3.0-3.2'
3233
import Gcp_CIS_130_33 from './gcp-cis-1.3.0-3.3'
@@ -105,6 +106,7 @@ export default [
105106
Gcp_CIS_130_211,
106107
Gcp_CIS_130_212,
107108
Gcp_CIS_130_213,
109+
Gcp_CIS_130_214,
108110
Gcp_CIS_130_31,
109111
Gcp_CIS_130_32,
110112
Gcp_CIS_130_33,

0 commit comments

Comments
 (0)