CIS Google Cloud Platform v1.1.0 L1

Warning! Audit Deprecated

This audit file has been deprecated and will be removed in a future update.

View Next Version

Audit Details

Name: CIS Google Cloud Platform v1.1.0 L1

Updated: 1/4/2023

Authority: Cloud Services

Plugin: GCP

Revision: 1.4

Estimated Item Count: 72

Audit Items

DescriptionCategories
1.1 Ensure that corporate login credentials are used
1.2 Ensure that multi-factor authentication is enabled for all non-service accounts
1.4 Ensure that there are only GCP-managed service account keys for each service account
1.5 Ensure that Service Account has no Admin privileges
1.6 Ensure that IAM users are not assigned the Service Account User or Service Account Token Creator roles at project level
1.7 Ensure user-managed/external keys for service accounts are rotated every 90 days or less
1.9 Ensure that Cloud KMS cryptokeys are not anonymously or publicly accessible
1.10 Ensure KMS encryption keys are rotated within a period of 90 days
1.13 Ensure API keys are restricted to use by only specified Hosts and Apps
1.14 Ensure API keys are restricted to only APIs that application needs access
1.15 Ensure API keys are rotated every 90 days
2.1 Ensure that Cloud Audit Logging is configured properly across all services and all users from a project - allServices
2.1 Ensure that Cloud Audit Logging is configured properly across all services and all users from a project - exemptedMembers
2.2 Ensure that sinks are configured for all log entries
2.3 Ensure that retention policies on log buckets are configured using Bucket Lock
2.4 Ensure log metric filter and alerts exist for project ownership assignments/changes - alert
2.4 Ensure log metric filter and alerts exist for project ownership assignments/changes - metric
2.5 Ensure that the log metric filter and alerts exist for Audit Configuration changes - alert
2.5 Ensure that the log metric filter and alerts exist for Audit Configuration changes - metric
2.6 Ensure that the log metric filter and alerts exist for Custom Role changes - alert
2.6 Ensure that the log metric filter and alerts exist for Custom Role changes - metric
2.7 Ensure that the log metric filter and alerts exist for VPC Network Firewall rule changes - alert
2.7 Ensure that the log metric filter and alerts exist for VPC Network Firewall rule changes - metric
2.8 Ensure that the log metric filter and alerts exist for VPC network route changes - alert
2.8 Ensure that the log metric filter and alerts exist for VPC network route changes - metric
2.9 Ensure that the log metric filter and alerts exist for VPC network changes - alert
2.9 Ensure that the log metric filter and alerts exist for VPC network changes - metric
2.10 Ensure that the log metric filter and alerts exist for Cloud Storage IAM permission changes - alert
2.10 Ensure that the log metric filter and alerts exist for Cloud Storage IAM permission changes - metric
2.11 Ensure that the log metric filter and alerts exist for SQL instance configuration changes - alert
2.11 Ensure that the log metric filter and alerts exist for SQL instance configuration changes - metric
2.12 Ensure that Cloud DNS logging is enabled for all VPC networks - dns policies
2.12 Ensure that Cloud DNS logging is enabled for all VPC networks - vpc networks
3.2 Ensure legacy networks do not exist for a project
3.3 Ensure that DNSSEC is enabled for Cloud DNS
3.4 Ensure that RSASHA1 is not used for the key-signing key in Cloud DNS DNSSEC
3.5 Ensure that RSASHA1 is not used for the zone-signing key in Cloud DNS DNSSEC
3.8 Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network
3.9 Ensure no HTTPS or SSL proxy load balancers permit SSL policies with weak cipher suites
4.1 Ensure that instances are not configured to use the default service account
4.2 Ensure that instances are not configured to use the default service account with full access to all Cloud APIs
4.3 Ensure 'Block Project-wide SSH keys' is enabled for VM instances - Block Project-wide SSH keys is enabled for VM instances
4.4 Ensure oslogin is enabled for a Project - instances
4.4 Ensure oslogin is enabled for a Project - project
4.5 Ensure 'Enable connecting to serial ports' is not enabled for VM Instance
4.6 Ensure that IP forwarding is not enabled on Instances
5.1 Ensure that Cloud Storage bucket is not anonymously or publicly accessible
6.1.1 Ensure that a MySQL database instance does not allow anyone to connect with administrative privileges
6.1.2 Ensure 'skip_show_database' database flag for Cloud SQL Mysql instance is set to 'on'
6.1.3 Ensure that the 'local_infile' database flag for a Cloud SQL Mysql instance is set to 'off'