Google cloud networking policies
Ensure GCP Firewall rule does not allow all traffic on SSH port 22
Ensure GCP Firewall rule does not allow all traffic on RDP port 3389
Ensure GCP HTTPS load balancer is not configured with SSL policy having TLS version 1.1 or lower
Ensure Cloud SQL database instances are not publicly accessible
Ensure GCP Cloud DNS has DNSSEC enabled
Ensure RSASHA1 is not used for Zone-Signing and Key-Signing Keys in Cloud DNS DNSSEC
Ensure default network does not exist in a project
Ensure GCP VM instances have block project-wide SSH keys feature enabled
Ensure GCP projects have OS login enabled
Ensure project instance does not override the project setting enabling OSLogin
Ensure GCP VM instances do not have serial port access enabled