CIS Google Cloud Platform v2.0.0 L1

Audit Details

Name: CIS Google Cloud Platform v2.0.0 L1

Updated: 12/4/2023

Authority: CIS

Plugin: GCP

Revision: 1.0

Estimated Item Count: 56

File Details

Filename: CIS_Google_Cloud_Platform_v2.0.0_L1.audit

Size: 212 kB

MD5: 1d8ae4b28c2274e9a10c2d7d0c0e9009
SHA256: 12d5a1bea93acbd21faeebfc8dfc5ee8c6f08e40ff1f3357cfd166083bada224

Audit Items

DescriptionCategories
1.1 Ensure that Corporate Login Credentials are Used

ACCESS CONTROL

1.2 Ensure that Multi-Factor Authentication is 'Enabled' for All Non-Service Accounts

IDENTIFICATION AND AUTHENTICATION

1.4 Ensure That There Are Only GCP-Managed Service Account Keys for Each Service Account

IDENTIFICATION AND AUTHENTICATION

1.5 Ensure That Service Account Has No Admin Privileges

ACCESS CONTROL

1.6 Ensure That IAM Users Are Not Assigned the Service Account User or Service Account Token Creator Roles at Project Level

ACCESS CONTROL, MEDIA PROTECTION

1.7 Ensure User-Managed/External Keys for Service Accounts Are Rotated Every 90 Days or Fewer

IDENTIFICATION AND AUTHENTICATION

1.9 Ensure That Cloud KMS Cryptokeys Are Not Anonymously or Publicly Accessible

ACCESS CONTROL, MEDIA PROTECTION

1.10 Ensure KMS Encryption Keys Are Rotated Within a Period of 90 Days

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

1.16 Ensure Essential Contacts is Configured for Organization

INCIDENT RESPONSE

1.18 Ensure Secrets are Not Stored in Cloud Functions Environment Variables by Using Secret Manager

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.1 Ensure That Cloud Audit Logging Is Configured Properly - allServices

AUDIT AND ACCOUNTABILITY

2.1 Ensure That Cloud Audit Logging Is Configured Properly - exemptedMembers

AUDIT AND ACCOUNTABILITY

2.2 Ensure That Sinks Are Configured for All Log Entries

AUDIT AND ACCOUNTABILITY

2.4 Ensure Log Metric Filter and Alerts Exist for Project Ownership Assignments/Changes - alert

AUDIT AND ACCOUNTABILITY

2.4 Ensure Log Metric Filter and Alerts Exist for Project Ownership Assignments/Changes - metric

AUDIT AND ACCOUNTABILITY

2.5 Ensure That the Log Metric Filter and Alerts Exist for Audit Configuration Changes - alert

AUDIT AND ACCOUNTABILITY

2.5 Ensure That the Log Metric Filter and Alerts Exist for Audit Configuration Changes - metric

AUDIT AND ACCOUNTABILITY

2.6 Ensure That the Log Metric Filter and Alerts Exist for Custom Role Changes - alert

AUDIT AND ACCOUNTABILITY

2.6 Ensure That the Log Metric Filter and Alerts Exist for Custom Role Changes - metric

AUDIT AND ACCOUNTABILITY

2.12 Ensure That Cloud DNS Logging Is Enabled for All VPC Networks - dns policies

AUDIT AND ACCOUNTABILITY

2.12 Ensure That Cloud DNS Logging Is Enabled for All VPC Networks - vpc networks

AUDIT AND ACCOUNTABILITY

2.13 Ensure Cloud Asset Inventory Is Enabled

CONFIGURATION MANAGEMENT, PROGRAM MANAGEMENT

3.2 Ensure Legacy Networks Do Not Exist for Older Projects

ACCESS CONTROL, CONFIGURATION MANAGEMENT

3.3 Ensure That DNSSEC Is Enabled for Cloud DNS

ACCESS CONTROL, CONFIGURATION MANAGEMENT

3.4 Ensure That RSASHA1 Is Not Used for the Key-Signing Key in Cloud DNS DNSSEC

ACCESS CONTROL, CONFIGURATION MANAGEMENT

3.5 Ensure That RSASHA1 Is Not Used for the Zone-Signing Key in Cloud DNS DNSSEC

ACCESS CONTROL, CONFIGURATION MANAGEMENT

3.9 Ensure No HTTPS or SSL Proxy Load Balancers Permit SSL Policies With Weak Cipher Suites

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

4.1 Ensure That Instances Are Not Configured To Use the Default Service Account

IDENTIFICATION AND AUTHENTICATION

4.2 Ensure That Instances Are Not Configured To Use the Default Service Account With Full Access to All Cloud APIs

IDENTIFICATION AND AUTHENTICATION

4.3 Ensure 'Block Project-Wide SSH Keys' Is Enabled for VM Instances

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

4.4 Ensure Oslogin Is Enabled for a Project - instances

ACCESS CONTROL

4.4 Ensure Oslogin Is Enabled for a Project - project

ACCESS CONTROL

4.5 Ensure 'Enable Connecting to Serial Ports' Is Not Enabled for VM Instance

CONFIGURATION MANAGEMENT

4.6 Ensure That IP Forwarding Is Not Enabled on Instances

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.1 Ensure That Cloud Storage Bucket Is Not Anonymously or Publicly Accessible

ACCESS CONTROL, MEDIA PROTECTION

6.1.1 Ensure That a MySQL Database Instance Does Not Allow Anyone To Connect With Administrative Privileges

IDENTIFICATION AND AUTHENTICATION

6.1.2 Ensure 'Skip_show_database' Database Flag for Cloud SQL MySQL Instance Is Set to 'On'

ACCESS CONTROL, MEDIA PROTECTION

6.1.3 Ensure That the 'Local_infile' Database Flag for a Cloud SQL MySQL Instance Is Set to 'Off'

CONFIGURATION MANAGEMENT

6.2.2 Ensure That the 'Log_connections' Database Flag for Cloud SQL PostgreSQL Instance Is Set to 'On'

AUDIT AND ACCOUNTABILITY

6.2.3 Ensure That the 'Log_disconnections' Database Flag for Cloud SQL PostgreSQL Instance Is Set to 'On'

AUDIT AND ACCOUNTABILITY

6.2.5 Ensure that the 'Log_min_messages' Flag for a Cloud SQL PostgreSQL Instance is set at minimum to 'Warning'

AUDIT AND ACCOUNTABILITY

6.2.6 Ensure 'Log_min_error_statement' Database Flag for Cloud SQL PostgreSQL Instance Is Set to 'Error' or Stricter

AUDIT AND ACCOUNTABILITY

6.2.7 Ensure That the 'Log_min_duration_statement' Database Flag for Cloud SQL PostgreSQL Instance Is Set to '-1' (Disabled)

AUDIT AND ACCOUNTABILITY

6.2.8 Ensure That 'cloudsql.enable_pgaudit' Database Flag for each Cloud Sql Postgresql Instance Is Set to 'on' For Centralized Logging

AUDIT AND ACCOUNTABILITY

6.2.9 Ensure Instance IP assignment is set to private

CONFIGURATION MANAGEMENT, MAINTENANCE

6.3.1 Ensure 'external scripts enabled' database flag for Cloud SQL SQL Server instance is set to 'off'

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

6.3.2 Ensure that the 'cross db ownership chaining' database flag for Cloud SQL SQL Server instance is set to 'off'

ACCESS CONTROL, MEDIA PROTECTION

6.3.3 Ensure 'user Connections' Database Flag for Cloud Sql Sql Server Instance Is Set to a Non-limiting Value

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

6.3.4 Ensure 'user options' database flag for Cloud SQL SQL Server instance is not configured

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

6.3.5 Ensure 'remote access' database flag for Cloud SQL SQL Server instance is set to 'off'

CONFIGURATION MANAGEMENT