logo
Prowler Documentation
Google cloud networking policies
Initializing search
    prowler-cloud/prowler
    • Intro
    • Prowler (V5)
    • Prowler Cloud
    • Prowler Checks
    • Prowler Pro SaaS (Legacy)
    • Community Slack
    • Prowler vs. Others
    • Product Security
    • Contact Us
    • Prowler.com
    prowler-cloud/prowler
    • Intro
    • Prowler (V5)
      • Index
      • Prowler Cloud
      • Pricing
      • AWS Marketplace
    • Prowler Checks
    • Prowler Pro SaaS (Legacy)
    • Community Slack
      • Index
      • AWS Security Hub
      • Microsoft Sentinel
      • Microsoft Defender for Cloud
      • Google Cloud Security Command Center
    • Product Security
    • Contact Us
    • Prowler.com

    Google cloud networking policies

    Ensure GCP Firewall rule does not allow all traffic on SSH port 22

    Ensure GCP Firewall rule does not allow all traffic on RDP port 3389

    Ensure GCP HTTPS load balancer is not configured with SSL policy having TLS version 1.1 or lower

    Ensure Cloud SQL database instances are not publicly accessible

    Ensure GCP Cloud DNS has DNSSEC enabled

    Ensure RSASHA1 is not used for Zone-Signing and Key-Signing Keys in Cloud DNS DNSSEC

    Ensure default network does not exist in a project

    Ensure GCP VM instances have block project-wide SSH keys feature enabled

    Ensure GCP projects have OS login enabled

    Ensure project instance does not override the project setting enabling OSLogin

    Ensure GCP VM instances do not have serial port access enabled

    Ensure IP forwarding on instances is disabled

    Ensure GCP project is not configured with legacy network

    Copyright © ProwlerPro Inc.
    Made with Material for MkDocs

    Cookie consent

    We use cookies to recognize your repeated visits and preferences, as well as to measure the effectiveness of our documentation and whether users find what they're searching for. With your consent, you're helping us to make our documentation better.