Repository | GoogleCloudPlatform / cloud-foundation-fabric |
Description | End-to-end modular samples and landing zones toolkit for Terraform on GCP. |
Stars | 1120 |
---|---|
Failed Checks |
Security Scanning |
Scan Date | 2023-10-30 17:57:40 |
Security Scanning
This repository failed the Experience Builder Terraform Module's Security Scanning validation. This means that a security scanning tool was not found to be implemented in any of the CICD tool configuration files in the repository.
There is an opportunity to:
- Remediate the findings identified by one of the recommended
Terraform security scanning tools (example
checkov
output found below) - Implement one of the security scanning tools within the CICD framework used by the repository
Checkov Output
2023-10-05 14:42:19,323 [MainThread ] [WARNI] Module /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/net-vpc:latest failed to load via
2023-10-05 14:42:19,323 [MainThread ] [WARNI] Unable to load module - source: /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/net-vpc, version: latest, error: /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/net-vpc
2023-10-05 14:42:19,330 [MainThread ] [WARNI] Module /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/folder:latest failed to load via
2023-10-05 14:42:19,330 [MainThread ] [WARNI] Unable to load module - source: /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/folder, version: latest, error: /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/folder
2023-10-05 14:42:19,330 [MainThread ] [WARNI] Module /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/project:latest failed to load via
2023-10-05 14:42:19,330 [MainThread ] [WARNI] Unable to load module - source: /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/project, version: latest, error: /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/project
2023-10-05 14:42:19,331 [MainThread ] [WARNI] Module /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/project:latest failed to load via
2023-10-05 14:42:19,331 [MainThread ] [WARNI] Unable to load module - source: /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/project, version: latest, error: /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/project
2023-10-05 14:42:19,331 [MainThread ] [WARNI] Module /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/project:latest failed to load via
2023-10-05 14:42:19,331 [MainThread ] [WARNI] Unable to load module - source: /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/project, version: latest, error: /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/project
2023-10-05 14:42:20,505 [MainThread ] [WARNI] Module /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/net-vpc:latest failed to load via
2023-10-05 14:42:20,505 [MainThread ] [WARNI] Unable to load module - source: /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/net-vpc, version: latest, error: /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/net-vpc
2023-10-05 14:42:20,505 [MainThread ] [WARNI] Module /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/net-vpc-firewall:latest failed to load via
2023-10-05 14:42:20,505 [MainThread ] [WARNI] Unable to load module - source: /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/net-vpc-firewall, version: latest, error: /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/net-vpc-firewall
2023-10-05 14:42:20,505 [MainThread ] [WARNI] Module /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/net-vpn-dynamic:latest failed to load via
2023-10-05 14:42:20,505 [MainThread ] [WARNI] Unable to load module - source: /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/net-vpn-dynamic, version: latest, error: /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/net-vpn-dynamic
2023-10-05 14:42:20,505 [MainThread ] [WARNI] Module /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/net-vpn-dynamic:latest failed to load via
2023-10-05 14:42:20,505 [MainThread ] [WARNI] Unable to load module - source: /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/net-vpn-dynamic, version: latest, error: /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/net-vpn-dynamic
2023-10-05 14:42:20,506 [MainThread ] [WARNI] Module /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/net-cloudnat:latest failed to load via
2023-10-05 14:42:20,506 [MainThread ] [WARNI] Unable to load module - source: /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/net-cloudnat, version: latest, error: /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/net-cloudnat
2023-10-05 14:42:20,506 [MainThread ] [WARNI] Module /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/net-cloudnat:latest failed to load via
2023-10-05 14:42:20,506 [MainThread ] [WARNI] Unable to load module - source: /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/net-cloudnat, version: latest, error: /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/net-cloudnat
2023-10-05 14:42:20,506 [MainThread ] [WARNI] Module /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/dns:latest failed to load via
2023-10-05 14:42:20,506 [MainThread ] [WARNI] Unable to load module - source: /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/dns, version: latest, error: /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/dns
2023-10-05 14:42:20,506 [MainThread ] [WARNI] Module /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/dns:latest failed to load via
2023-10-05 14:42:20,506 [MainThread ] [WARNI] Unable to load module - source: /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/dns, version: latest, error: /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/dns
2023-10-05 14:42:20,506 [MainThread ] [WARNI] Module /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/dns:latest failed to load via
2023-10-05 14:42:20,506 [MainThread ] [WARNI] Unable to load module - source: /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/dns, version: latest, error: /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/dns
2023-10-05 14:42:20,506 [MainThread ] [WARNI] Module /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/iam-service-account:latest failed to load via
2023-10-05 14:42:20,506 [MainThread ] [WARNI] Unable to load module - source: /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/iam-service-account, version: latest, error: /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/iam-service-account
2023-10-05 14:42:20,506 [MainThread ] [WARNI] Module /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/compute-vm:latest failed to load via
2023-10-05 14:42:20,506 [MainThread ] [WARNI] Unable to load module - source: /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/compute-vm, version: latest, error: /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/compute-vm
2023-10-05 14:42:20,507 [MainThread ] [WARNI] Module /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/compute-vm:latest failed to load via
2023-10-05 14:42:20,507 [MainThread ] [WARNI] Unable to load module - source: /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/compute-vm, version: latest, error: /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/compute-vm
2023-10-05 14:42:20,507 [MainThread ] [WARNI] Module /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/cloud-config-container/onprem:latest failed to load via
2023-10-05 14:42:20,507 [MainThread ] [WARNI] Unable to load module - source: /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/cloud-config-container/onprem, version: latest, error: /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/cloud-config-container/onprem
2023-10-05 14:42:20,507 [MainThread ] [WARNI] Module /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/iam-service-account:latest failed to load via
2023-10-05 14:42:20,507 [MainThread ] [WARNI] Unable to load module - source: /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/iam-service-account, version: latest, error: /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/iam-service-account
2023-10-05 14:42:20,507 [MainThread ] [WARNI] Module /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/compute-vm:latest failed to load via
2023-10-05 14:42:20,507 [MainThread ] [WARNI] Unable to load module - source: /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/compute-vm, version: latest, error: /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/compute-vm
2023-10-05 14:42:20,532 [MainThread ] [WARNI] Module /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/project:latest failed to load via
2023-10-05 14:42:20,532 [MainThread ] [WARNI] Unable to load module - source: /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/project, version: latest, error: /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/project
2023-10-05 14:42:20,532 [MainThread ] [WARNI] Module /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/net-vpc:latest failed to load via
2023-10-05 14:42:20,532 [MainThread ] [WARNI] Unable to load module - source: /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/net-vpc, version: latest, error: /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/net-vpc
2023-10-05 14:42:20,532 [MainThread ] [WARNI] Module /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/net-vpc-firewall:latest failed to load via
2023-10-05 14:42:20,532 [MainThread ] [WARNI] Unable to load module - source: /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/net-vpc-firewall, version: latest, error: /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/net-vpc-firewall
2023-10-05 14:42:20,532 [MainThread ] [WARNI] Module /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/net-cloudnat:latest failed to load via
2023-10-05 14:42:20,532 [MainThread ] [WARNI] Unable to load module - source: /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/net-cloudnat, version: latest, error: /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/net-cloudnat
2023-10-05 14:42:20,533 [MainThread ] [WARNI] Module /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/iam-service-account:latest failed to load via
2023-10-05 14:42:20,533 [MainThread ] [WARNI] Unable to load module - source: /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/iam-service-account, version: latest, error: /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/iam-service-account
2023-10-05 14:42:20,533 [MainThread ] [WARNI] Module /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/cloud-config-container/nginx:latest failed to load via
2023-10-05 14:42:20,533 [MainThread ] [WARNI] Unable to load module - source: /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/cloud-config-container/nginx, version: latest, error: /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/cloud-config-container/nginx
2023-10-05 14:42:20,533 [MainThread ] [WARNI] Module /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/cloud-config-container/nginx-tls:latest failed to load via
2023-10-05 14:42:20,533 [MainThread ] [WARNI] Unable to load module - source: /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/cloud-config-container/nginx-tls, version: latest, error: /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/cloud-config-container/nginx-tls
2023-10-05 14:42:20,533 [MainThread ] [WARNI] Module /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/compute-mig:latest failed to load via
2023-10-05 14:42:20,533 [MainThread ] [WARNI] Unable to load module - source: /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/compute-mig, version: latest, error: /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/compute-mig
2023-10-05 14:42:20,533 [MainThread ] [WARNI] Module /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/compute-vm:latest failed to load via
2023-10-05 14:42:20,533 [MainThread ] [WARNI] Unable to load module - source: /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/compute-vm, version: latest, error: /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/compute-vm
2023-10-05 14:42:20,533 [MainThread ] [WARNI] Module /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/net-lb-app-ext:latest failed to load via
2023-10-05 14:42:20,533 [MainThread ] [WARNI] Unable to load module - source: /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/net-lb-app-ext, version: latest, error: /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/modules/net-lb-app-ext
2023-10-05 14:42:21,163 [MainThread ] [WARNI] Module /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/networking/onprem-google-access-dns:latest failed to load via
2023-10-05 14:42:21,163 [MainThread ] [WARNI] Unable to load module - source: /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/networking/onprem-google-access-dns, version: latest, error: /home/brett/smallbets/ladoj/gh_scraper/tfcheck/cloud-foundation-fabric/blueprints/networking/onprem-google-access-dns
terraform scan results:
Passed checks: 4923, Failed checks: 715, Skipped checks: 0, Parsing errors: 7
Check: CKV_GCP_49: "Ensure roles do not impersonate or manage Service Accounts used at project level"
FAILED for resource: google_project_iam_binding.iam_bindings
File: /blueprints/cloud-operations/iam-delegated-role-grants/main.tf:65-75
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-iam-policies/bc-gcp-iam-10.html
65 | resource "google_project_iam_binding" "iam_bindings" {
66 | for_each = local.delegated_binding_pairs
67 | project = var.project_id
68 | role = var.restricted_role_grant
69 | members = var.project_administrators
70 | condition {
71 | title = "delegated_role_grant_${each.value.index}"
72 | description = "Delegated role grants (${each.value.index}/${length(local.expressions)})."
73 | expression = each.value.expression
74 | }
75 | }
Check: CKV_GCP_114: "Ensure public access prevention is enforced on Cloud Storage bucket"
FAILED for resource: google_storage_bucket.test-bucket
File: /blueprints/cloud-operations/terraform-cloud-dynamic-credentials/tfc-workflow-using-wif/main.tf:20-25
20 | resource "google_storage_bucket" "test-bucket" {
21 | project = var.project_id
22 | name = "${var.project_id}-test"
23 | location = "US"
24 | force_destroy = true
25 | }
Check: CKV_GCP_78: "Ensure Cloud storage has versioning enabled"
FAILED for resource: google_storage_bucket.test-bucket
File: /blueprints/cloud-operations/terraform-cloud-dynamic-credentials/tfc-workflow-using-wif/main.tf:20-25
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-cloud-storage-has-versioning-enabled.html
20 | resource "google_storage_bucket" "test-bucket" {
21 | project = var.project_id
22 | name = "${var.project_id}-test"
23 | location = "US"
24 | force_destroy = true
25 | }
Check: CKV_GCP_29: "Ensure that Cloud Storage buckets have uniform bucket-level access enabled"
FAILED for resource: google_storage_bucket.test-bucket
File: /blueprints/cloud-operations/terraform-cloud-dynamic-credentials/tfc-workflow-using-wif/main.tf:20-25
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-storage-gcs-policies/bc-gcp-gcs-2.html
20 | resource "google_storage_bucket" "test-bucket" {
21 | project = var.project_id
22 | name = "${var.project_id}-test"
23 | location = "US"
24 | force_destroy = true
25 | }
Check: CKV_GCP_62: "Bucket should log access"
FAILED for resource: google_storage_bucket.test-bucket
File: /blueprints/cloud-operations/terraform-cloud-dynamic-credentials/tfc-workflow-using-wif/main.tf:20-25
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-storage-gcs-policies/bc-gcp-logging-2.html
20 | resource "google_storage_bucket" "test-bucket" {
21 | project = var.project_id
22 | name = "${var.project_id}-test"
23 | location = "US"
24 | force_destroy = true
25 | }
Check: CKV_GCP_118: "Ensure IAM workload identity pool provider is restricted"
FAILED for resource: google_iam_workload_identity_pool_provider.provider
File: /blueprints/cloud-operations/workload-identity-federation/google-cloud.tf:49-61
49 | resource "google_iam_workload_identity_pool_provider" "provider" {
50 | provider = google-beta
51 | project = module.prj.project_id
52 | workload_identity_pool_id = google_iam_workload_identity_pool.pool.workload_identity_pool_id
53 | workload_identity_pool_provider_id = "test-provider"
54 | attribute_mapping = {
55 | "google.subject" = "assertion.sub"
56 | }
57 | oidc {
58 | allowed_audiences = ["api://${local.app_name}"]
59 | issuer_uri = "https://sts.windows.net/${data.azuread_client_config.config.tenant_id}"
60 | }
61 | }
Check: CKV_GCP_118: "Ensure IAM workload identity pool provider is restricted"
FAILED for resource: google_iam_workload_identity_pool_provider.github_provider[0]
File: /blueprints/data-solutions/vertex-mlops/ci-cd.tf:25-39
25 | resource "google_iam_workload_identity_pool_provider" "github_provider" {
26 | count = var.identity_pool_claims == null ? 0 : 1
27 | project = module.project.project_id
28 | workload_identity_pool_id = google_iam_workload_identity_pool.github_pool[0].workload_identity_pool_id
29 | workload_identity_pool_provider_id = "gh-provider"
30 | display_name = "Github Actions provider"
31 | description = "OIDC provider for Github Actions"
32 | attribute_mapping = {
33 | "google.subject" = "assertion.sub"
34 | "attribute.repository" = "assertion.repository"
35 | }
36 | oidc {
37 | issuer_uri = "https://token.actions.githubusercontent.com"
38 | }
39 | }
Check: CKV_GCP_89: "Ensure Vertex AI instances are private"
FAILED for resource: google_notebooks_instance.playground
File: /blueprints/data-solutions/vertex-mlops/vertex.tf:82-126
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-public-policies/ensure-gcp-vertex-ai-workbench-does-not-have-public-ips.html
82 | resource "google_notebooks_instance" "playground" {
83 | for_each = { for k, v in var.notebooks : k => v if v.type == "USER_MANAGED" }
84 | name = "${var.prefix}-${each.key}"
85 | location = "${var.region}-b"
86 | machine_type = var.notebooks[each.key].machine_type
87 | project = module.project.project_id
88 |
89 | container_image {
90 | repository = "gcr.io/deeplearning-platform-release/base-cpu"
91 | tag = "latest"
92 | }
93 |
94 | install_gpu_driver = true
95 | boot_disk_type = "PD_SSD"
96 | boot_disk_size_gb = 110
97 | disk_encryption = var.service_encryption_keys.notebooks != null ? "CMEK" : null
98 | kms_key = var.service_encryption_keys.notebooks
99 |
100 | no_public_ip = var.notebooks[each.key].internal_ip_only
101 | no_proxy_access = false
102 |
103 | network = local.vpc
104 | subnet = local.subnet
105 |
106 | instance_owners = try(tolist(var.notebooks[each.key].owner), null)
107 | service_account = module.service-account-notebook.email
108 |
109 | metadata = {
110 | notebook-disable-nbconvert = "false"
111 | notebook-disable-downloads = "false"
112 | notebook-disable-terminal = "false"
113 | notebook-disable-root = "true"
114 | }
115 |
116 | # Remove once terraform-provider-google/issues/9164 is fixed
117 | lifecycle {
118 | ignore_changes = [disk_encryption, kms_key]
119 | }
120 |
121 | #TODO Uncomment once terraform-provider-google/issues/9273 is fixed
122 | # tags = ["ssh"]
123 | depends_on = [
124 | google_project_iam_member.shared_vpc,
125 | ]
126 | }
Check: CKV_GCP_73: "Ensure Cloud Armor prevents message lookup in Log4j2. See CVE-2021-44228 aka log4jshell"
FAILED for resource: google_compute_security_policy.policy[0]
File: /blueprints/networking/glb-and-armor/main.tf:210-236
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-cloud-armor-prevents-message-lookup-in-log4j2.html
210 | resource "google_compute_security_policy" "policy" {
211 | count = var.enforce_security_policy ? 1 : 0
212 | name = "${var.prefix}-denylist-siege"
213 | project = module.project.project_id
214 | rule {
215 | action = "deny(403)"
216 | priority = "1000"
217 | match {
218 | versioned_expr = "SRC_IPS_V1"
219 | config {
220 | src_ip_ranges = [module.vm_siege.external_ip]
221 | }
222 | }
223 | description = "Deny access to siege VM IP"
224 | }
225 | rule {
226 | action = "allow"
227 | priority = "2147483647"
228 | match {
229 | versioned_expr = "SRC_IPS_V1"
230 | config {
231 | src_ip_ranges = ["*"]
232 | }
233 | }
234 | description = "default rule"
235 | }
236 | }
Check: CKV_GCP_73: "Ensure Cloud Armor prevents message lookup in Log4j2. See CVE-2021-44228 aka log4jshell"
FAILED for resource: google_compute_security_policy.policy
File: /blueprints/networking/psc-glb-and-armor/consumer.tf:75-84
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-cloud-armor-prevents-message-lookup-in-log4j2.html
75 | resource "google_compute_security_policy" "policy" {
76 | provider = google-beta
77 | project = module.consumer_project.project_id
78 | name = "ddos-protection"
79 | adaptive_protection_config {
80 | layer_7_ddos_defense_config {
81 | enable = true
82 | }
83 | }
84 | }
Check: CKV_GCP_26: "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network"
FAILED for resource: google_compute_subnetwork.psc_private_subnetwork
File: /blueprints/networking/psc-glb-and-armor/producer.tf:164-173
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/bc-gcp-logging-1.html
164 | resource "google_compute_subnetwork" "psc_private_subnetwork" {
165 | name = "psc-private-subnetwork"
166 | region = var.region
167 | project = module.producer_project.project_id
168 |
169 | network = google_compute_network.psc_ilb_network.id
170 | ip_cidr_range = "10.3.0.0/16"
171 | purpose = "PRIVATE"
172 | role = "ACTIVE"
173 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: google_compute_subnetwork.psc_private_subnetwork
File: /blueprints/networking/psc-glb-and-armor/producer.tf:164-173
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
164 | resource "google_compute_subnetwork" "psc_private_subnetwork" {
165 | name = "psc-private-subnetwork"
166 | region = var.region
167 | project = module.producer_project.project_id
168 |
169 | network = google_compute_network.psc_ilb_network.id
170 | ip_cidr_range = "10.3.0.0/16"
171 | purpose = "PRIVATE"
172 | role = "ACTIVE"
173 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: google_compute_subnetwork.psc_private_subnetwork
File: /blueprints/networking/psc-glb-and-armor/producer.tf:164-173
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
164 | resource "google_compute_subnetwork" "psc_private_subnetwork" {
165 | name = "psc-private-subnetwork"
166 | region = var.region
167 | project = module.producer_project.project_id
168 |
169 | network = google_compute_network.psc_ilb_network.id
170 | ip_cidr_range = "10.3.0.0/16"
171 | purpose = "PRIVATE"
172 | role = "ACTIVE"
173 | }
Check: CKV_GCP_26: "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network"
FAILED for resource: google_compute_subnetwork.psc_ilb_nat
File: /blueprints/networking/psc-glb-and-armor/producer.tf:175-183
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/bc-gcp-logging-1.html
175 | resource "google_compute_subnetwork" "psc_ilb_nat" {
176 | name = "psc-ilb-nat"
177 | region = var.region
178 | project = module.producer_project.project_id
179 |
180 | network = google_compute_network.psc_ilb_network.id
181 | purpose = "PRIVATE_SERVICE_CONNECT"
182 | ip_cidr_range = "10.1.0.0/16"
183 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: google_compute_subnetwork.psc_ilb_nat
File: /blueprints/networking/psc-glb-and-armor/producer.tf:175-183
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
175 | resource "google_compute_subnetwork" "psc_ilb_nat" {
176 | name = "psc-ilb-nat"
177 | region = var.region
178 | project = module.producer_project.project_id
179 |
180 | network = google_compute_network.psc_ilb_network.id
181 | purpose = "PRIVATE_SERVICE_CONNECT"
182 | ip_cidr_range = "10.1.0.0/16"
183 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: google_compute_subnetwork.psc_ilb_nat
File: /blueprints/networking/psc-glb-and-armor/producer.tf:175-183
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
175 | resource "google_compute_subnetwork" "psc_ilb_nat" {
176 | name = "psc-ilb-nat"
177 | region = var.region
178 | project = module.producer_project.project_id
179 |
180 | network = google_compute_network.psc_ilb_network.id
181 | purpose = "PRIVATE_SERVICE_CONNECT"
182 | ip_cidr_range = "10.1.0.0/16"
183 | }
Check: CKV_GCP_26: "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network"
FAILED for resource: google_compute_subnetwork.vms
File: /blueprints/networking/psc-glb-and-armor/producer.tf:185-192
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/bc-gcp-logging-1.html
185 | resource "google_compute_subnetwork" "vms" {
186 | name = "vms"
187 | region = var.region
188 | project = module.producer_project.project_id
189 |
190 | network = google_compute_network.psc_ilb_network.id
191 | ip_cidr_range = "10.4.0.0/16"
192 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: google_compute_subnetwork.vms
File: /blueprints/networking/psc-glb-and-armor/producer.tf:185-192
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
185 | resource "google_compute_subnetwork" "vms" {
186 | name = "vms"
187 | region = var.region
188 | project = module.producer_project.project_id
189 |
190 | network = google_compute_network.psc_ilb_network.id
191 | ip_cidr_range = "10.4.0.0/16"
192 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: google_compute_subnetwork.vms
File: /blueprints/networking/psc-glb-and-armor/producer.tf:185-192
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
185 | resource "google_compute_subnetwork" "vms" {
186 | name = "vms"
187 | region = var.region
188 | project = module.producer_project.project_id
189 |
190 | network = google_compute_network.psc_ilb_network.id
191 | ip_cidr_range = "10.4.0.0/16"
192 | }
Check: CKV_GCP_39: "Ensure Compute instances are launched with Shielded VM enabled"
FAILED for resource: google_compute_instance.noop-vm
File: /blueprints/networking/psc-glb-and-armor/producer.tf:212-231
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/bc-gcp-general-y.html
212 | resource "google_compute_instance" "noop-vm" {
213 | project = module.producer_project.project_id
214 | name = "noop-ilb-vm"
215 | machine_type = "e2-medium"
216 | zone = var.zone
217 | boot_disk {
218 | initialize_params {
219 | image = "debian-cloud/debian-11"
220 | }
221 | }
222 |
223 | network_interface {
224 | network = google_compute_network.psc_ilb_network.id
225 | subnetwork = google_compute_subnetwork.vms.id
226 | }
227 | service_account {
228 | email = google_service_account.noop.email
229 | scopes = []
230 | }
231 | }
Check: CKV_GCP_32: "Ensure 'Block Project-wide SSH keys' is enabled for VM instances"
FAILED for resource: google_compute_instance.noop-vm
File: /blueprints/networking/psc-glb-and-armor/producer.tf:212-231
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/bc-gcp-networking-8.html
212 | resource "google_compute_instance" "noop-vm" {
213 | project = module.producer_project.project_id
214 | name = "noop-ilb-vm"
215 | machine_type = "e2-medium"
216 | zone = var.zone
217 | boot_disk {
218 | initialize_params {
219 | image = "debian-cloud/debian-11"
220 | }
221 | }
222 |
223 | network_interface {
224 | network = google_compute_network.psc_ilb_network.id
225 | subnetwork = google_compute_subnetwork.vms.id
226 | }
227 | service_account {
228 | email = google_service_account.noop.email
229 | scopes = []
230 | }
231 | }
Check: CKV_GCP_38: "Ensure VM disks for critical VMs are encrypted with Customer Supplied Encryption Keys (CSEK)"
FAILED for resource: google_compute_instance.noop-vm
File: /blueprints/networking/psc-glb-and-armor/producer.tf:212-231
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/encrypt-boot-disks-for-instances-with-cseks.html
212 | resource "google_compute_instance" "noop-vm" {
213 | project = module.producer_project.project_id
214 | name = "noop-ilb-vm"
215 | machine_type = "e2-medium"
216 | zone = var.zone
217 | boot_disk {
218 | initialize_params {
219 | image = "debian-cloud/debian-11"
220 | }
221 | }
222 |
223 | network_interface {
224 | network = google_compute_network.psc_ilb_network.id
225 | subnetwork = google_compute_subnetwork.vms.id
226 | }
227 | service_account {
228 | email = google_service_account.noop.email
229 | scopes = []
230 | }
231 | }
Check: CKV_GCP_73: "Ensure Cloud Armor prevents message lookup in Log4j2. See CVE-2021-44228 aka log4jshell"
FAILED for resource: google_compute_security_policy.policy
File: /blueprints/serverless/cloud-run-explore/main.tf:112-148
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-cloud-armor-prevents-message-lookup-in-log4j2.html
112 | resource "google_compute_security_policy" "policy" {
113 | count = local.gclb_create && var.security_policy.enabled ? 1 : 0
114 | name = "cloud-run-policy"
115 | project = module.project.project_id
116 | rule {
117 | action = "deny(403)"
118 | priority = 1000
119 | match {
120 | versioned_expr = "SRC_IPS_V1"
121 | config {
122 | src_ip_ranges = var.security_policy.ip_blacklist
123 | }
124 | }
125 | description = "Deny access to list of IPs"
126 | }
127 | rule {
128 | action = "deny(403)"
129 | priority = 900
130 | match {
131 | expr {
132 | expression = "request.path.matches(\"${var.security_policy.path_blocked}\")"
133 | }
134 | }
135 | description = "Deny access to specific URL paths"
136 | }
137 | rule {
138 | action = "allow"
139 | priority = "2147483647"
140 | match {
141 | versioned_expr = "SRC_IPS_V1"
142 | config {
143 | src_ip_ranges = ["*"]
144 | }
145 | }
146 | description = "Default rule"
147 | }
148 | }
Check: CKV_GCP_114: "Ensure public access prevention is enforced on Cloud Storage bucket"
FAILED for resource: google_storage_bucket.bootstrap-ignition
File: /blueprints/third-party-solutions/openshift/tf/bootstrap.tf:17-22
17 | resource "google_storage_bucket" "bootstrap-ignition" {
18 | project = var.service_project.project_id
19 | name = local.infra_id
20 | location = var.region
21 | force_destroy = true
22 | }
Check: CKV_GCP_78: "Ensure Cloud storage has versioning enabled"
FAILED for resource: google_storage_bucket.bootstrap-ignition
File: /blueprints/third-party-solutions/openshift/tf/bootstrap.tf:17-22
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-cloud-storage-has-versioning-enabled.html
17 | resource "google_storage_bucket" "bootstrap-ignition" {
18 | project = var.service_project.project_id
19 | name = local.infra_id
20 | location = var.region
21 | force_destroy = true
22 | }
Check: CKV_GCP_29: "Ensure that Cloud Storage buckets have uniform bucket-level access enabled"
FAILED for resource: google_storage_bucket.bootstrap-ignition
File: /blueprints/third-party-solutions/openshift/tf/bootstrap.tf:17-22
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-storage-gcs-policies/bc-gcp-gcs-2.html
17 | resource "google_storage_bucket" "bootstrap-ignition" {
18 | project = var.service_project.project_id
19 | name = local.infra_id
20 | location = var.region
21 | force_destroy = true
22 | }
Check: CKV_GCP_62: "Bucket should log access"
FAILED for resource: google_storage_bucket.bootstrap-ignition
File: /blueprints/third-party-solutions/openshift/tf/bootstrap.tf:17-22
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-storage-gcs-policies/bc-gcp-logging-2.html
17 | resource "google_storage_bucket" "bootstrap-ignition" {
18 | project = var.service_project.project_id
19 | name = local.infra_id
20 | location = var.region
21 | force_destroy = true
22 | }
Check: CKV_GCP_39: "Ensure Compute instances are launched with Shielded VM enabled"
FAILED for resource: google_compute_instance.bootstrap
File: /blueprints/third-party-solutions/openshift/tf/bootstrap.tf:38-79
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/bc-gcp-general-y.html
38 | resource "google_compute_instance" "bootstrap" {
39 | count = local.bootstrapping ? 1 : 0
40 | project = var.service_project.project_id
41 | name = "${local.infra_id}-b"
42 | hostname = "${local.infra_id}-bootstrap.${local.subdomain}"
43 | machine_type = "n1-standard-4"
44 | zone = "${var.region}-${element(var.zones, 0)}"
45 | network_interface {
46 | subnetwork = var.host_project.masters_subnet_name
47 | subnetwork_project = var.host_project.project_id
48 | }
49 | boot_disk {
50 | initialize_params {
51 | image = var.rhcos_gcp_image
52 | size = 16
53 | type = "pd-balanced"
54 | }
55 | kms_key_self_link = local.disk_encryption_key
56 | }
57 | service_account {
58 | email = google_service_account.default["m"].email
59 | scopes = ["cloud-platform", "userinfo-email"]
60 | }
61 | tags = concat(
62 | [local.tags.bootstrap, local.tags.master, "ocp-master"],
63 | var.tags == null ? [] : var.tags
64 | )
65 | metadata = {
66 | user-data = jsonencode({
67 | ignition = {
68 | config = {
69 | replace = !local.bootstrapping ? {} : {
70 | source = data.google_storage_object_signed_url.bootstrap-ignition.0.signed_url
71 | }
72 | }
73 | version = "3.1.0"
74 | }
75 | })
76 | VmDnsSetting = "GlobalDefault"
77 | }
78 | labels = var.install_config_params.labels
79 | }
Check: CKV_GCP_32: "Ensure 'Block Project-wide SSH keys' is enabled for VM instances"
FAILED for resource: google_compute_instance.bootstrap
File: /blueprints/third-party-solutions/openshift/tf/bootstrap.tf:38-79
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/bc-gcp-networking-8.html
38 | resource "google_compute_instance" "bootstrap" {
39 | count = local.bootstrapping ? 1 : 0
40 | project = var.service_project.project_id
41 | name = "${local.infra_id}-b"
42 | hostname = "${local.infra_id}-bootstrap.${local.subdomain}"
43 | machine_type = "n1-standard-4"
44 | zone = "${var.region}-${element(var.zones, 0)}"
45 | network_interface {
46 | subnetwork = var.host_project.masters_subnet_name
47 | subnetwork_project = var.host_project.project_id
48 | }
49 | boot_disk {
50 | initialize_params {
51 | image = var.rhcos_gcp_image
52 | size = 16
53 | type = "pd-balanced"
54 | }
55 | kms_key_self_link = local.disk_encryption_key
56 | }
57 | service_account {
58 | email = google_service_account.default["m"].email
59 | scopes = ["cloud-platform", "userinfo-email"]
60 | }
61 | tags = concat(
62 | [local.tags.bootstrap, local.tags.master, "ocp-master"],
63 | var.tags == null ? [] : var.tags
64 | )
65 | metadata = {
66 | user-data = jsonencode({
67 | ignition = {
68 | config = {
69 | replace = !local.bootstrapping ? {} : {
70 | source = data.google_storage_object_signed_url.bootstrap-ignition.0.signed_url
71 | }
72 | }
73 | version = "3.1.0"
74 | }
75 | })
76 | VmDnsSetting = "GlobalDefault"
77 | }
78 | labels = var.install_config_params.labels
79 | }
Check: CKV_GCP_49: "Ensure roles do not impersonate or manage Service Accounts used at project level"
FAILED for resource: google_project_iam_member.service-master["roles/iam.serviceAccountUser"]
File: /blueprints/third-party-solutions/openshift/tf/iam.tf:55-66
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-iam-policies/bc-gcp-iam-10.html
55 | resource "google_project_iam_member" "service-master" {
56 | for_each = toset(concat(local.minimal_sa_roles, [
57 | "roles/compute.instanceAdmin",
58 | "roles/compute.networkAdmin",
59 | "roles/compute.securityAdmin",
60 | "roles/iam.serviceAccountUser",
61 | "roles/storage.admin"
62 | ]))
63 | project = var.service_project.project_id
64 | role = each.key
65 | member = "serviceAccount:${google_service_account.default["m"].email}"
66 | }
Check: CKV_GCP_41: "Ensure that IAM users are not assigned the Service Account User or Service Account Token Creator roles at project level"
FAILED for resource: google_project_iam_member.service-master["roles/iam.serviceAccountUser"]
File: /blueprints/third-party-solutions/openshift/tf/iam.tf:55-66
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-iam-policies/bc-gcp-iam-3.html
55 | resource "google_project_iam_member" "service-master" {
56 | for_each = toset(concat(local.minimal_sa_roles, [
57 | "roles/compute.instanceAdmin",
58 | "roles/compute.networkAdmin",
59 | "roles/compute.securityAdmin",
60 | "roles/iam.serviceAccountUser",
61 | "roles/storage.admin"
62 | ]))
63 | project = var.service_project.project_id
64 | role = each.key
65 | member = "serviceAccount:${google_service_account.default["m"].email}"
66 | }
Check: CKV_GCP_39: "Ensure Compute instances are launched with Shielded VM enabled"
FAILED for resource: google_compute_instance.master["c"]
File: /blueprints/third-party-solutions/openshift/tf/masters.tf:17-49
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/bc-gcp-general-y.html
17 | resource "google_compute_instance" "master" {
18 | for_each = toset(var.zones)
19 | project = var.service_project.project_id
20 | name = "${local.infra_id}-master-${each.key}"
21 | hostname = "${local.infra_id}-master-${each.key}.${local.subdomain}"
22 | machine_type = "n1-standard-4"
23 | zone = "${var.region}-${each.key}"
24 | network_interface {
25 | subnetwork = var.host_project.masters_subnet_name
26 | subnetwork_project = var.host_project.project_id
27 | }
28 | boot_disk {
29 | initialize_params {
30 | image = var.rhcos_gcp_image
31 | size = var.install_config_params.disk_size
32 | type = "pd-ssd"
33 | }
34 | kms_key_self_link = local.disk_encryption_key
35 | }
36 | service_account {
37 | email = google_service_account.default["m"].email
38 | scopes = ["cloud-platform", "userinfo-email"]
39 | }
40 | tags = concat(
41 | [local.tags.master, "ocp-master"],
42 | var.tags == null ? [] : var.tags
43 | )
44 | metadata = {
45 | user-data = file("${local.fs_paths.config_dir}/master.ign"),
46 | VmDnsSetting = "GlobalDefault"
47 | }
48 | labels = var.install_config_params.labels
49 | }
Check: CKV_GCP_32: "Ensure 'Block Project-wide SSH keys' is enabled for VM instances"
FAILED for resource: google_compute_instance.master["c"]
File: /blueprints/third-party-solutions/openshift/tf/masters.tf:17-49
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/bc-gcp-networking-8.html
17 | resource "google_compute_instance" "master" {
18 | for_each = toset(var.zones)
19 | project = var.service_project.project_id
20 | name = "${local.infra_id}-master-${each.key}"
21 | hostname = "${local.infra_id}-master-${each.key}.${local.subdomain}"
22 | machine_type = "n1-standard-4"
23 | zone = "${var.region}-${each.key}"
24 | network_interface {
25 | subnetwork = var.host_project.masters_subnet_name
26 | subnetwork_project = var.host_project.project_id
27 | }
28 | boot_disk {
29 | initialize_params {
30 | image = var.rhcos_gcp_image
31 | size = var.install_config_params.disk_size
32 | type = "pd-ssd"
33 | }
34 | kms_key_self_link = local.disk_encryption_key
35 | }
36 | service_account {
37 | email = google_service_account.default["m"].email
38 | scopes = ["cloud-platform", "userinfo-email"]
39 | }
40 | tags = concat(
41 | [local.tags.master, "ocp-master"],
42 | var.tags == null ? [] : var.tags
43 | )
44 | metadata = {
45 | user-data = file("${local.fs_paths.config_dir}/master.ign"),
46 | VmDnsSetting = "GlobalDefault"
47 | }
48 | labels = var.install_config_params.labels
49 | }
Check: CKV_GCP_39: "Ensure Compute instances are launched with Shielded VM enabled"
FAILED for resource: google_compute_instance.master["d"]
File: /blueprints/third-party-solutions/openshift/tf/masters.tf:17-49
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/bc-gcp-general-y.html
17 | resource "google_compute_instance" "master" {
18 | for_each = toset(var.zones)
19 | project = var.service_project.project_id
20 | name = "${local.infra_id}-master-${each.key}"
21 | hostname = "${local.infra_id}-master-${each.key}.${local.subdomain}"
22 | machine_type = "n1-standard-4"
23 | zone = "${var.region}-${each.key}"
24 | network_interface {
25 | subnetwork = var.host_project.masters_subnet_name
26 | subnetwork_project = var.host_project.project_id
27 | }
28 | boot_disk {
29 | initialize_params {
30 | image = var.rhcos_gcp_image
31 | size = var.install_config_params.disk_size
32 | type = "pd-ssd"
33 | }
34 | kms_key_self_link = local.disk_encryption_key
35 | }
36 | service_account {
37 | email = google_service_account.default["m"].email
38 | scopes = ["cloud-platform", "userinfo-email"]
39 | }
40 | tags = concat(
41 | [local.tags.master, "ocp-master"],
42 | var.tags == null ? [] : var.tags
43 | )
44 | metadata = {
45 | user-data = file("${local.fs_paths.config_dir}/master.ign"),
46 | VmDnsSetting = "GlobalDefault"
47 | }
48 | labels = var.install_config_params.labels
49 | }
Check: CKV_GCP_32: "Ensure 'Block Project-wide SSH keys' is enabled for VM instances"
FAILED for resource: google_compute_instance.master["d"]
File: /blueprints/third-party-solutions/openshift/tf/masters.tf:17-49
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/bc-gcp-networking-8.html
17 | resource "google_compute_instance" "master" {
18 | for_each = toset(var.zones)
19 | project = var.service_project.project_id
20 | name = "${local.infra_id}-master-${each.key}"
21 | hostname = "${local.infra_id}-master-${each.key}.${local.subdomain}"
22 | machine_type = "n1-standard-4"
23 | zone = "${var.region}-${each.key}"
24 | network_interface {
25 | subnetwork = var.host_project.masters_subnet_name
26 | subnetwork_project = var.host_project.project_id
27 | }
28 | boot_disk {
29 | initialize_params {
30 | image = var.rhcos_gcp_image
31 | size = var.install_config_params.disk_size
32 | type = "pd-ssd"
33 | }
34 | kms_key_self_link = local.disk_encryption_key
35 | }
36 | service_account {
37 | email = google_service_account.default["m"].email
38 | scopes = ["cloud-platform", "userinfo-email"]
39 | }
40 | tags = concat(
41 | [local.tags.master, "ocp-master"],
42 | var.tags == null ? [] : var.tags
43 | )
44 | metadata = {
45 | user-data = file("${local.fs_paths.config_dir}/master.ign"),
46 | VmDnsSetting = "GlobalDefault"
47 | }
48 | labels = var.install_config_params.labels
49 | }
Check: CKV_GCP_39: "Ensure Compute instances are launched with Shielded VM enabled"
FAILED for resource: google_compute_instance.master["b"]
File: /blueprints/third-party-solutions/openshift/tf/masters.tf:17-49
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/bc-gcp-general-y.html
17 | resource "google_compute_instance" "master" {
18 | for_each = toset(var.zones)
19 | project = var.service_project.project_id
20 | name = "${local.infra_id}-master-${each.key}"
21 | hostname = "${local.infra_id}-master-${each.key}.${local.subdomain}"
22 | machine_type = "n1-standard-4"
23 | zone = "${var.region}-${each.key}"
24 | network_interface {
25 | subnetwork = var.host_project.masters_subnet_name
26 | subnetwork_project = var.host_project.project_id
27 | }
28 | boot_disk {
29 | initialize_params {
30 | image = var.rhcos_gcp_image
31 | size = var.install_config_params.disk_size
32 | type = "pd-ssd"
33 | }
34 | kms_key_self_link = local.disk_encryption_key
35 | }
36 | service_account {
37 | email = google_service_account.default["m"].email
38 | scopes = ["cloud-platform", "userinfo-email"]
39 | }
40 | tags = concat(
41 | [local.tags.master, "ocp-master"],
42 | var.tags == null ? [] : var.tags
43 | )
44 | metadata = {
45 | user-data = file("${local.fs_paths.config_dir}/master.ign"),
46 | VmDnsSetting = "GlobalDefault"
47 | }
48 | labels = var.install_config_params.labels
49 | }
Check: CKV_GCP_32: "Ensure 'Block Project-wide SSH keys' is enabled for VM instances"
FAILED for resource: google_compute_instance.master["b"]
File: /blueprints/third-party-solutions/openshift/tf/masters.tf:17-49
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/bc-gcp-networking-8.html
17 | resource "google_compute_instance" "master" {
18 | for_each = toset(var.zones)
19 | project = var.service_project.project_id
20 | name = "${local.infra_id}-master-${each.key}"
21 | hostname = "${local.infra_id}-master-${each.key}.${local.subdomain}"
22 | machine_type = "n1-standard-4"
23 | zone = "${var.region}-${each.key}"
24 | network_interface {
25 | subnetwork = var.host_project.masters_subnet_name
26 | subnetwork_project = var.host_project.project_id
27 | }
28 | boot_disk {
29 | initialize_params {
30 | image = var.rhcos_gcp_image
31 | size = var.install_config_params.disk_size
32 | type = "pd-ssd"
33 | }
34 | kms_key_self_link = local.disk_encryption_key
35 | }
36 | service_account {
37 | email = google_service_account.default["m"].email
38 | scopes = ["cloud-platform", "userinfo-email"]
39 | }
40 | tags = concat(
41 | [local.tags.master, "ocp-master"],
42 | var.tags == null ? [] : var.tags
43 | )
44 | metadata = {
45 | user-data = file("${local.fs_paths.config_dir}/master.ign"),
46 | VmDnsSetting = "GlobalDefault"
47 | }
48 | labels = var.install_config_params.labels
49 | }
Check: CKV_GCP_73: "Ensure Cloud Armor prevents message lookup in Log4j2. See CVE-2021-44228 aka log4jshell"
FAILED for resource: google_compute_security_policy.policy
File: /blueprints/third-party-solutions/phpipam/glb.tf:75-112
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-cloud-armor-prevents-message-lookup-in-log4j2.html
75 | resource "google_compute_security_policy" "policy" {
76 | count = local.glb_create && var.security_policy.enabled ? 1 : 0
77 | project = module.project.project_id
78 | name = "cloud-run-policy"
79 |
80 | rule {
81 | action = "deny(403)"
82 | priority = 1000
83 | match {
84 | versioned_expr = "SRC_IPS_V1"
85 | config {
86 | src_ip_ranges = var.security_policy.ip_blacklist
87 | }
88 | }
89 | description = "Deny access to list of IPs"
90 | }
91 | rule {
92 | action = "deny(403)"
93 | priority = 900
94 | match {
95 | expr {
96 | expression = "request.path.matches(\"${var.security_policy.path_blocked}\")"
97 | }
98 | }
99 | description = "Deny access to specific URL paths"
100 | }
101 | rule {
102 | action = "allow"
103 | priority = "2147483647"
104 | match {
105 | versioned_expr = "SRC_IPS_V1"
106 | config {
107 | src_ip_ranges = ["*"]
108 | }
109 | }
110 | description = "Default rule"
111 | }
112 | }
Check: CKV_GIT_1: "Ensure GitHub repository is Private"
FAILED for resource: github_repository.default
File: /fast/extras/0-cicd-github/main.tf:73-106
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/secrets-policies/secrets-policy-index/ensure-repository-is-private.html
73 | resource "github_repository" "default" {
74 | for_each = {
75 | for k, v in var.repositories : k => v if v.create_options != null
76 | }
77 | name = each.key
78 | description = (
79 | each.value.create_options.description != null
80 | ? each.value.create_options.description
81 | : "FAST stage ${each.key}."
82 | )
83 | visibility = each.value.create_options.visibility
84 | auto_init = each.value.create_options.auto_init
85 | allow_auto_merge = try(each.value.create_options.allow.auto_merge, null)
86 | allow_merge_commit = try(each.value.create_options.allow.merge_commit, null)
87 | allow_rebase_merge = try(each.value.create_options.allow.rebase_merge, null)
88 | allow_squash_merge = try(each.value.create_options.allow.squash_merge, null)
89 | has_issues = try(each.value.create_options.features.issues, null)
90 | has_projects = try(each.value.create_options.features.projects, null)
91 | has_wiki = try(each.value.create_options.features.wiki, null)
92 | gitignore_template = try(each.value.create_options.templates.gitignore, null)
93 | license_template = try(each.value.create_options.templates.license, null)
94 |
95 | dynamic "template" {
96 | for_each = (
97 | try(each.value.create_options.templates.repository, null) != null
98 | ? [""]
99 | : []
100 | )
101 | content {
102 | owner = each.value.create_options.templates.repository.owner
103 | repository = each.value.create_options.templates.repository.name
104 | }
105 | }
106 | }
Check: CKV_GCP_49: "Ensure roles do not impersonate or manage Service Accounts used at project level"
FAILED for resource: google_project_iam_binding.dev_spoke_project_iam_delegated
File: /fast/stages/2-networking-a-peering/spoke-dev.tf:89-106
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-iam-policies/bc-gcp-iam-10.html
89 | resource "google_project_iam_binding" "dev_spoke_project_iam_delegated" {
90 | project = module.dev-spoke-project.project_id
91 | role = "roles/resourcemanager.projectIamAdmin"
92 | members = compact([
93 | try(local.service_accounts.data-platform-dev, null),
94 | try(local.service_accounts.project-factory-dev, null),
95 | try(local.service_accounts.project-factory-prod, null),
96 | try(local.service_accounts.gke-dev, null),
97 | ])
98 | condition {
99 | title = "dev_stage3_sa_delegated_grants"
100 | description = "Development host project delegated grants."
101 | expression = format(
102 | "api.getAttribute('iam.googleapis.com/modifiedGrantsByRole', []).hasOnly([%s])",
103 | join(",", formatlist("'%s'", local.stage3_sas_delegated_grants))
104 | )
105 | }
106 | }
Check: CKV_GCP_49: "Ensure roles do not impersonate or manage Service Accounts used at project level"
FAILED for resource: google_project_iam_binding.prod_spoke_project_iam_delegated
File: /fast/stages/2-networking-a-peering/spoke-prod.tf:88-104
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-iam-policies/bc-gcp-iam-10.html
88 | resource "google_project_iam_binding" "prod_spoke_project_iam_delegated" {
89 | project = module.prod-spoke-project.project_id
90 | role = "roles/resourcemanager.projectIamAdmin"
91 | members = compact([
92 | try(local.service_accounts.data-platform-prod, null),
93 | try(local.service_accounts.project-factory-prod, null),
94 | try(local.service_accounts.gke-prod, null),
95 | ])
96 | condition {
97 | title = "prod_stage3_sa_delegated_grants"
98 | description = "Production host project delegated grants."
99 | expression = format(
100 | "api.getAttribute('iam.googleapis.com/modifiedGrantsByRole', []).hasOnly([%s])",
101 | join(",", formatlist("'%s'", local.stage3_sas_delegated_grants))
102 | )
103 | }
104 | }
Check: CKV_GCP_49: "Ensure roles do not impersonate or manage Service Accounts used at project level"
FAILED for resource: google_project_iam_binding.dev_spoke_project_iam_delegated
File: /fast/stages/2-networking-b-vpn/spoke-dev.tf:89-106
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-iam-policies/bc-gcp-iam-10.html
89 | resource "google_project_iam_binding" "dev_spoke_project_iam_delegated" {
90 | project = module.dev-spoke-project.project_id
91 | role = "roles/resourcemanager.projectIamAdmin"
92 | members = compact([
93 | try(local.service_accounts.data-platform-dev, null),
94 | try(local.service_accounts.project-factory-dev, null),
95 | try(local.service_accounts.project-factory-prod, null),
96 | try(local.service_accounts.gke-dev, null),
97 | ])
98 | condition {
99 | title = "dev_stage3_sa_delegated_grants"
100 | description = "Development host project delegated grants."
101 | expression = format(
102 | "api.getAttribute('iam.googleapis.com/modifiedGrantsByRole', []).hasOnly([%s])",
103 | join(",", formatlist("'%s'", local.stage3_sas_delegated_grants))
104 | )
105 | }
106 | }
Check: CKV_GCP_49: "Ensure roles do not impersonate or manage Service Accounts used at project level"
FAILED for resource: google_project_iam_binding.prod_spoke_project_iam_delegated
File: /fast/stages/2-networking-b-vpn/spoke-prod.tf:88-104
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-iam-policies/bc-gcp-iam-10.html
88 | resource "google_project_iam_binding" "prod_spoke_project_iam_delegated" {
89 | project = module.prod-spoke-project.project_id
90 | role = "roles/resourcemanager.projectIamAdmin"
91 | members = compact([
92 | try(local.service_accounts.data-platform-prod, null),
93 | try(local.service_accounts.project-factory-prod, null),
94 | try(local.service_accounts.gke-prod, null),
95 | ])
96 | condition {
97 | title = "prod_stage3_sa_delegated_grants"
98 | description = "Production host project delegated grants."
99 | expression = format(
100 | "api.getAttribute('iam.googleapis.com/modifiedGrantsByRole', []).hasOnly([%s])",
101 | join(",", formatlist("'%s'", local.stage3_sas_delegated_grants))
102 | )
103 | }
104 | }
Check: CKV_GCP_49: "Ensure roles do not impersonate or manage Service Accounts used at project level"
FAILED for resource: google_project_iam_binding.dev_spoke_project_iam_delegated
File: /fast/stages/2-networking-c-nva/spoke-dev.tf:115-132
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-iam-policies/bc-gcp-iam-10.html
115 | resource "google_project_iam_binding" "dev_spoke_project_iam_delegated" {
116 | project = module.dev-spoke-project.project_id
117 | role = "roles/resourcemanager.projectIamAdmin"
118 | members = compact([
119 | try(local.service_accounts.data-platform-dev, null),
120 | try(local.service_accounts.project-factory-dev, null),
121 | try(local.service_accounts.project-factory-prod, null),
122 | try(local.service_accounts.gke-dev, null),
123 | ])
124 | condition {
125 | title = "dev_stage3_sa_delegated_grants"
126 | description = "Development host project delegated grants."
127 | expression = format(
128 | "api.getAttribute('iam.googleapis.com/modifiedGrantsByRole', []).hasOnly([%s])",
129 | join(",", formatlist("'%s'", local.stage3_sas_delegated_grants))
130 | )
131 | }
132 | }
Check: CKV_GCP_49: "Ensure roles do not impersonate or manage Service Accounts used at project level"
FAILED for resource: google_project_iam_binding.prod_spoke_project_iam_delegated
File: /fast/stages/2-networking-c-nva/spoke-prod.tf:114-130
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-iam-policies/bc-gcp-iam-10.html
114 | resource "google_project_iam_binding" "prod_spoke_project_iam_delegated" {
115 | project = module.prod-spoke-project.project_id
116 | role = "roles/resourcemanager.projectIamAdmin"
117 | members = compact([
118 | try(local.service_accounts.data-platform-prod, null),
119 | try(local.service_accounts.project-factory-prod, null),
120 | try(local.service_accounts.gke-prod, null),
121 | ])
122 | condition {
123 | title = "prod_stage3_sa_delegated_grants"
124 | description = "Production host project delegated grants."
125 | expression = format(
126 | "api.getAttribute('iam.googleapis.com/modifiedGrantsByRole', []).hasOnly([%s])",
127 | join(",", formatlist("'%s'", local.stage3_sas_delegated_grants))
128 | )
129 | }
130 | }
Check: CKV_GCP_49: "Ensure roles do not impersonate or manage Service Accounts used at project level"
FAILED for resource: google_project_iam_binding.dev_spoke_project_iam_delegated
File: /fast/stages/2-networking-d-separate-envs/spoke-dev.tf:89-106
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-iam-policies/bc-gcp-iam-10.html
89 | resource "google_project_iam_binding" "dev_spoke_project_iam_delegated" {
90 | project = module.dev-spoke-project.project_id
91 | role = "roles/resourcemanager.projectIamAdmin"
92 | members = compact([
93 | try(local.service_accounts.data-platform-dev, null),
94 | try(local.service_accounts.gke-dev, null),
95 | try(local.service_accounts.project-factory-dev, null),
96 | try(local.service_accounts.project-factory-prod, null),
97 | ])
98 | condition {
99 | title = "dev_stage3_sa_delegated_grants"
100 | description = "Development host project delegated grants."
101 | expression = format(
102 | "api.getAttribute('iam.googleapis.com/modifiedGrantsByRole', []).hasOnly([%s])",
103 | join(",", formatlist("'%s'", local.stage3_sas_delegated_grants))
104 | )
105 | }
106 | }
Check: CKV_GCP_49: "Ensure roles do not impersonate or manage Service Accounts used at project level"
FAILED for resource: google_project_iam_binding.prod_spoke_project_iam_delegated
File: /fast/stages/2-networking-d-separate-envs/spoke-prod.tf:88-104
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-iam-policies/bc-gcp-iam-10.html
88 | resource "google_project_iam_binding" "prod_spoke_project_iam_delegated" {
89 | project = module.prod-spoke-project.project_id
90 | role = "roles/resourcemanager.projectIamAdmin"
91 | members = compact([
92 | try(local.service_accounts.data-platform-prod, null),
93 | try(local.service_accounts.gke-platform-prod, null),
94 | try(local.service_accounts.project-factory-prod, null),
95 | ])
96 | condition {
97 | title = "prod_stage3_sa_delegated_grants"
98 | description = "Production host project delegated grants."
99 | expression = format(
100 | "api.getAttribute('iam.googleapis.com/modifiedGrantsByRole', []).hasOnly([%s])",
101 | join(",", formatlist("'%s'", local.stage3_sas_delegated_grants))
102 | )
103 | }
104 | }
Check: CKV_GCP_49: "Ensure roles do not impersonate or manage Service Accounts used at project level"
FAILED for resource: google_project_iam_binding.dev_spoke_project_iam_delegated
File: /fast/stages/2-networking-e-nva-bgp/spoke-dev.tf:85-102
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-iam-policies/bc-gcp-iam-10.html
85 | resource "google_project_iam_binding" "dev_spoke_project_iam_delegated" {
86 | project = module.dev-spoke-project.project_id
87 | role = "roles/resourcemanager.projectIamAdmin"
88 | members = compact([
89 | try(local.service_accounts.data-platform-dev, null),
90 | try(local.service_accounts.project-factory-dev, null),
91 | try(local.service_accounts.project-factory-prod, null),
92 | try(local.service_accounts.gke-dev, null),
93 | ])
94 | condition {
95 | title = "dev_stage3_sa_delegated_grants"
96 | description = "Development host project delegated grants."
97 | expression = format(
98 | "api.getAttribute('iam.googleapis.com/modifiedGrantsByRole', []).hasOnly([%s])",
99 | join(",", formatlist("'%s'", local.stage3_sas_delegated_grants))
100 | )
101 | }
102 | }
Check: CKV_GCP_49: "Ensure roles do not impersonate or manage Service Accounts used at project level"
FAILED for resource: google_project_iam_binding.prod_spoke_project_iam_delegated
File: /fast/stages/2-networking-e-nva-bgp/spoke-prod.tf:84-100
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-iam-policies/bc-gcp-iam-10.html
84 | resource "google_project_iam_binding" "prod_spoke_project_iam_delegated" {
85 | project = module.prod-spoke-project.project_id
86 | role = "roles/resourcemanager.projectIamAdmin"
87 | members = compact([
88 | try(local.service_accounts.data-platform-prod, null),
89 | try(local.service_accounts.project-factory-prod, null),
90 | try(local.service_accounts.gke-prod, null),
91 | ])
92 | condition {
93 | title = "prod_stage3_sa_delegated_grants"
94 | description = "Production host project delegated grants."
95 | expression = format(
96 | "api.getAttribute('iam.googleapis.com/modifiedGrantsByRole', []).hasOnly([%s])",
97 | join(",", formatlist("'%s'", local.stage3_sas_delegated_grants))
98 | )
99 | }
100 | }
Check: CKV_GCP_80: "Ensure Big Query Tables are encrypted with Customer Supplied Encryption Keys (CSEK)"
FAILED for resource: module.bigquery_dataset.google_bigquery_table.views
File: /modules/bigquery-dataset/main.tf:255-270
Calling File: /blueprints/apigee/bigquery-analytics/main.tf:226-250
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-big-query-tables-are-encrypted-with-customer-supplied-encryption-keys-csek.html
255 | resource "google_bigquery_table" "views" {
256 | depends_on = [google_bigquery_table.default]
257 | for_each = var.views
258 | project = var.project_id
259 | dataset_id = google_bigquery_dataset.default.dataset_id
260 | table_id = each.key
261 | friendly_name = each.value.friendly_name
262 | description = each.value.description
263 | labels = each.value.labels
264 | deletion_protection = each.value.deletion_protection
265 |
266 | view {
267 | query = each.value.query
268 | use_legacy_sql = each.value.use_legacy_sql
269 | }
270 | }
Check: CKV_GCP_80: "Ensure Big Query Tables are encrypted with Customer Supplied Encryption Keys (CSEK)"
FAILED for resource: module.bigquery_dataset.google_bigquery_table.materialized_view
File: /modules/bigquery-dataset/main.tf:272-313
Calling File: /blueprints/apigee/bigquery-analytics/main.tf:226-250
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-big-query-tables-are-encrypted-with-customer-supplied-encryption-keys-csek.html
272 | resource "google_bigquery_table" "materialized_view" {
273 | depends_on = [google_bigquery_table.default]
274 | for_each = var.materialized_views
275 | project = var.project_id
276 | dataset_id = google_bigquery_dataset.default.dataset_id
277 | table_id = each.key
278 | friendly_name = each.value.friendly_name
279 | description = each.value.description
280 | labels = each.value.labels
281 | clustering = each.value.options.clustering
282 | expiration_time = each.value.options.expiration_time
283 | deletion_protection = each.value.deletion_protection
284 |
285 | dynamic "range_partitioning" {
286 | for_each = try(each.value.partitioning.range, null) != null ? [""] : []
287 | content {
288 | field = each.value.partitioning.field
289 | range {
290 | start = each.value.partitioning.range.start
291 | end = each.value.partitioning.range.end
292 | interval = each.value.partitioning.range.interval
293 | }
294 | }
295 | }
296 |
297 | dynamic "time_partitioning" {
298 | for_each = try(each.value.partitioning.time, null) != null ? [""] : []
299 | content {
300 | expiration_ms = each.value.partitioning.time.expiration_ms
301 | field = each.value.partitioning.time.field
302 | type = each.value.partitioning.time.type
303 | require_partition_filter = each.value.partitioning.time.require_partition_filter
304 | }
305 | }
306 |
307 | materialized_view {
308 | query = each.value.query
309 | enable_refresh = each.value.enable_refresh
310 | refresh_interval_ms = each.value.refresh_interval_ms
311 | allow_non_incremental_definition = each.value.allow_non_incremental_definition
312 | }
313 | }
Check: CKV_GCP_80: "Ensure Big Query Tables are encrypted with Customer Supplied Encryption Keys (CSEK)"
FAILED for resource: module.bq.google_bigquery_table.views
File: /modules/bigquery-dataset/main.tf:255-270
Calling File: /blueprints/factories/bigquery-factory/main.tf:64-71
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-big-query-tables-are-encrypted-with-customer-supplied-encryption-keys-csek.html
255 | resource "google_bigquery_table" "views" {
256 | depends_on = [google_bigquery_table.default]
257 | for_each = var.views
258 | project = var.project_id
259 | dataset_id = google_bigquery_dataset.default.dataset_id
260 | table_id = each.key
261 | friendly_name = each.value.friendly_name
262 | description = each.value.description
263 | labels = each.value.labels
264 | deletion_protection = each.value.deletion_protection
265 |
266 | view {
267 | query = each.value.query
268 | use_legacy_sql = each.value.use_legacy_sql
269 | }
270 | }
Check: CKV_GCP_80: "Ensure Big Query Tables are encrypted with Customer Supplied Encryption Keys (CSEK)"
FAILED for resource: module.bq.google_bigquery_table.materialized_view
File: /modules/bigquery-dataset/main.tf:272-313
Calling File: /blueprints/factories/bigquery-factory/main.tf:64-71
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-big-query-tables-are-encrypted-with-customer-supplied-encryption-keys-csek.html
272 | resource "google_bigquery_table" "materialized_view" {
273 | depends_on = [google_bigquery_table.default]
274 | for_each = var.materialized_views
275 | project = var.project_id
276 | dataset_id = google_bigquery_dataset.default.dataset_id
277 | table_id = each.key
278 | friendly_name = each.value.friendly_name
279 | description = each.value.description
280 | labels = each.value.labels
281 | clustering = each.value.options.clustering
282 | expiration_time = each.value.options.expiration_time
283 | deletion_protection = each.value.deletion_protection
284 |
285 | dynamic "range_partitioning" {
286 | for_each = try(each.value.partitioning.range, null) != null ? [""] : []
287 | content {
288 | field = each.value.partitioning.field
289 | range {
290 | start = each.value.partitioning.range.start
291 | end = each.value.partitioning.range.end
292 | interval = each.value.partitioning.range.interval
293 | }
294 | }
295 | }
296 |
297 | dynamic "time_partitioning" {
298 | for_each = try(each.value.partitioning.time, null) != null ? [""] : []
299 | content {
300 | expiration_ms = each.value.partitioning.time.expiration_ms
301 | field = each.value.partitioning.time.field
302 | type = each.value.partitioning.time.type
303 | require_partition_filter = each.value.partitioning.time.require_partition_filter
304 | }
305 | }
306 |
307 | materialized_view {
308 | query = each.value.query
309 | enable_refresh = each.value.enable_refresh
310 | refresh_interval_ms = each.value.refresh_interval_ms
311 | allow_non_incremental_definition = each.value.allow_non_incremental_definition
312 | }
313 | }
Check: CKV_GCP_80: "Ensure Big Query Tables are encrypted with Customer Supplied Encryption Keys (CSEK)"
FAILED for resource: module.dataset.google_bigquery_table.views
File: /modules/bigquery-dataset/main.tf:255-270
Calling File: /blueprints/data-solutions/data-playground/main.tf:169-174
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-big-query-tables-are-encrypted-with-customer-supplied-encryption-keys-csek.html
255 | resource "google_bigquery_table" "views" {
256 | depends_on = [google_bigquery_table.default]
257 | for_each = var.views
258 | project = var.project_id
259 | dataset_id = google_bigquery_dataset.default.dataset_id
260 | table_id = each.key
261 | friendly_name = each.value.friendly_name
262 | description = each.value.description
263 | labels = each.value.labels
264 | deletion_protection = each.value.deletion_protection
265 |
266 | view {
267 | query = each.value.query
268 | use_legacy_sql = each.value.use_legacy_sql
269 | }
270 | }
Check: CKV_GCP_80: "Ensure Big Query Tables are encrypted with Customer Supplied Encryption Keys (CSEK)"
FAILED for resource: module.dataset.google_bigquery_table.materialized_view
File: /modules/bigquery-dataset/main.tf:272-313
Calling File: /blueprints/data-solutions/data-playground/main.tf:169-174
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-big-query-tables-are-encrypted-with-customer-supplied-encryption-keys-csek.html
272 | resource "google_bigquery_table" "materialized_view" {
273 | depends_on = [google_bigquery_table.default]
274 | for_each = var.materialized_views
275 | project = var.project_id
276 | dataset_id = google_bigquery_dataset.default.dataset_id
277 | table_id = each.key
278 | friendly_name = each.value.friendly_name
279 | description = each.value.description
280 | labels = each.value.labels
281 | clustering = each.value.options.clustering
282 | expiration_time = each.value.options.expiration_time
283 | deletion_protection = each.value.deletion_protection
284 |
285 | dynamic "range_partitioning" {
286 | for_each = try(each.value.partitioning.range, null) != null ? [""] : []
287 | content {
288 | field = each.value.partitioning.field
289 | range {
290 | start = each.value.partitioning.range.start
291 | end = each.value.partitioning.range.end
292 | interval = each.value.partitioning.range.interval
293 | }
294 | }
295 | }
296 |
297 | dynamic "time_partitioning" {
298 | for_each = try(each.value.partitioning.time, null) != null ? [""] : []
299 | content {
300 | expiration_ms = each.value.partitioning.time.expiration_ms
301 | field = each.value.partitioning.time.field
302 | type = each.value.partitioning.time.type
303 | require_partition_filter = each.value.partitioning.time.require_partition_filter
304 | }
305 | }
306 |
307 | materialized_view {
308 | query = each.value.query
309 | enable_refresh = each.value.enable_refresh
310 | refresh_interval_ms = each.value.refresh_interval_ms
311 | allow_non_incremental_definition = each.value.allow_non_incremental_definition
312 | }
313 | }
Check: CKV_GCP_80: "Ensure Big Query Tables are encrypted with Customer Supplied Encryption Keys (CSEK)"
FAILED for resource: module.data-platform.module.drop-bq-0.google_bigquery_table.views
File: /modules/bigquery-dataset/main.tf:255-270
Calling File: /blueprints/data-solutions/data-platform-foundations/01-dropoff.tf:132-138
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-big-query-tables-are-encrypted-with-customer-supplied-encryption-keys-csek.html
255 | resource "google_bigquery_table" "views" {
256 | depends_on = [google_bigquery_table.default]
257 | for_each = var.views
258 | project = var.project_id
259 | dataset_id = google_bigquery_dataset.default.dataset_id
260 | table_id = each.key
261 | friendly_name = each.value.friendly_name
262 | description = each.value.description
263 | labels = each.value.labels
264 | deletion_protection = each.value.deletion_protection
265 |
266 | view {
267 | query = each.value.query
268 | use_legacy_sql = each.value.use_legacy_sql
269 | }
270 | }
Check: CKV_GCP_80: "Ensure Big Query Tables are encrypted with Customer Supplied Encryption Keys (CSEK)"
FAILED for resource: module.data-platform.module.drop-bq-0.google_bigquery_table.materialized_view
File: /modules/bigquery-dataset/main.tf:272-313
Calling File: /blueprints/data-solutions/data-platform-foundations/01-dropoff.tf:132-138
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-big-query-tables-are-encrypted-with-customer-supplied-encryption-keys-csek.html
272 | resource "google_bigquery_table" "materialized_view" {
273 | depends_on = [google_bigquery_table.default]
274 | for_each = var.materialized_views
275 | project = var.project_id
276 | dataset_id = google_bigquery_dataset.default.dataset_id
277 | table_id = each.key
278 | friendly_name = each.value.friendly_name
279 | description = each.value.description
280 | labels = each.value.labels
281 | clustering = each.value.options.clustering
282 | expiration_time = each.value.options.expiration_time
283 | deletion_protection = each.value.deletion_protection
284 |
285 | dynamic "range_partitioning" {
286 | for_each = try(each.value.partitioning.range, null) != null ? [""] : []
287 | content {
288 | field = each.value.partitioning.field
289 | range {
290 | start = each.value.partitioning.range.start
291 | end = each.value.partitioning.range.end
292 | interval = each.value.partitioning.range.interval
293 | }
294 | }
295 | }
296 |
297 | dynamic "time_partitioning" {
298 | for_each = try(each.value.partitioning.time, null) != null ? [""] : []
299 | content {
300 | expiration_ms = each.value.partitioning.time.expiration_ms
301 | field = each.value.partitioning.time.field
302 | type = each.value.partitioning.time.type
303 | require_partition_filter = each.value.partitioning.time.require_partition_filter
304 | }
305 | }
306 |
307 | materialized_view {
308 | query = each.value.query
309 | enable_refresh = each.value.enable_refresh
310 | refresh_interval_ms = each.value.refresh_interval_ms
311 | allow_non_incremental_definition = each.value.allow_non_incremental_definition
312 | }
313 | }
Check: CKV_GCP_80: "Ensure Big Query Tables are encrypted with Customer Supplied Encryption Keys (CSEK)"
FAILED for resource: module.data-platform.module.dwh-conf-bq-0.google_bigquery_table.views
File: /modules/bigquery-dataset/main.tf:255-270
Calling File: /blueprints/data-solutions/data-platform-foundations/05-datawarehouse.tf:143-149
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-big-query-tables-are-encrypted-with-customer-supplied-encryption-keys-csek.html
255 | resource "google_bigquery_table" "views" {
256 | depends_on = [google_bigquery_table.default]
257 | for_each = var.views
258 | project = var.project_id
259 | dataset_id = google_bigquery_dataset.default.dataset_id
260 | table_id = each.key
261 | friendly_name = each.value.friendly_name
262 | description = each.value.description
263 | labels = each.value.labels
264 | deletion_protection = each.value.deletion_protection
265 |
266 | view {
267 | query = each.value.query
268 | use_legacy_sql = each.value.use_legacy_sql
269 | }
270 | }
Check: CKV_GCP_80: "Ensure Big Query Tables are encrypted with Customer Supplied Encryption Keys (CSEK)"
FAILED for resource: module.data-platform.module.dwh-conf-bq-0.google_bigquery_table.materialized_view
File: /modules/bigquery-dataset/main.tf:272-313
Calling File: /blueprints/data-solutions/data-platform-foundations/05-datawarehouse.tf:143-149
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-big-query-tables-are-encrypted-with-customer-supplied-encryption-keys-csek.html
272 | resource "google_bigquery_table" "materialized_view" {
273 | depends_on = [google_bigquery_table.default]
274 | for_each = var.materialized_views
275 | project = var.project_id
276 | dataset_id = google_bigquery_dataset.default.dataset_id
277 | table_id = each.key
278 | friendly_name = each.value.friendly_name
279 | description = each.value.description
280 | labels = each.value.labels
281 | clustering = each.value.options.clustering
282 | expiration_time = each.value.options.expiration_time
283 | deletion_protection = each.value.deletion_protection
284 |
285 | dynamic "range_partitioning" {
286 | for_each = try(each.value.partitioning.range, null) != null ? [""] : []
287 | content {
288 | field = each.value.partitioning.field
289 | range {
290 | start = each.value.partitioning.range.start
291 | end = each.value.partitioning.range.end
292 | interval = each.value.partitioning.range.interval
293 | }
294 | }
295 | }
296 |
297 | dynamic "time_partitioning" {
298 | for_each = try(each.value.partitioning.time, null) != null ? [""] : []
299 | content {
300 | expiration_ms = each.value.partitioning.time.expiration_ms
301 | field = each.value.partitioning.time.field
302 | type = each.value.partitioning.time.type
303 | require_partition_filter = each.value.partitioning.time.require_partition_filter
304 | }
305 | }
306 |
307 | materialized_view {
308 | query = each.value.query
309 | enable_refresh = each.value.enable_refresh
310 | refresh_interval_ms = each.value.refresh_interval_ms
311 | allow_non_incremental_definition = each.value.allow_non_incremental_definition
312 | }
313 | }
Check: CKV_GCP_80: "Ensure Big Query Tables are encrypted with Customer Supplied Encryption Keys (CSEK)"
FAILED for resource: module.data-platform.module.dwh-cur-bq-0.google_bigquery_table.views
File: /modules/bigquery-dataset/main.tf:255-270
Calling File: /blueprints/data-solutions/data-platform-foundations/05-datawarehouse.tf:135-141
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-big-query-tables-are-encrypted-with-customer-supplied-encryption-keys-csek.html
255 | resource "google_bigquery_table" "views" {
256 | depends_on = [google_bigquery_table.default]
257 | for_each = var.views
258 | project = var.project_id
259 | dataset_id = google_bigquery_dataset.default.dataset_id
260 | table_id = each.key
261 | friendly_name = each.value.friendly_name
262 | description = each.value.description
263 | labels = each.value.labels
264 | deletion_protection = each.value.deletion_protection
265 |
266 | view {
267 | query = each.value.query
268 | use_legacy_sql = each.value.use_legacy_sql
269 | }
270 | }
Check: CKV_GCP_80: "Ensure Big Query Tables are encrypted with Customer Supplied Encryption Keys (CSEK)"
FAILED for resource: module.data-platform.module.dwh-cur-bq-0.google_bigquery_table.materialized_view
File: /modules/bigquery-dataset/main.tf:272-313
Calling File: /blueprints/data-solutions/data-platform-foundations/05-datawarehouse.tf:135-141
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-big-query-tables-are-encrypted-with-customer-supplied-encryption-keys-csek.html
272 | resource "google_bigquery_table" "materialized_view" {
273 | depends_on = [google_bigquery_table.default]
274 | for_each = var.materialized_views
275 | project = var.project_id
276 | dataset_id = google_bigquery_dataset.default.dataset_id
277 | table_id = each.key
278 | friendly_name = each.value.friendly_name
279 | description = each.value.description
280 | labels = each.value.labels
281 | clustering = each.value.options.clustering
282 | expiration_time = each.value.options.expiration_time
283 | deletion_protection = each.value.deletion_protection
284 |
285 | dynamic "range_partitioning" {
286 | for_each = try(each.value.partitioning.range, null) != null ? [""] : []
287 | content {
288 | field = each.value.partitioning.field
289 | range {
290 | start = each.value.partitioning.range.start
291 | end = each.value.partitioning.range.end
292 | interval = each.value.partitioning.range.interval
293 | }
294 | }
295 | }
296 |
297 | dynamic "time_partitioning" {
298 | for_each = try(each.value.partitioning.time, null) != null ? [""] : []
299 | content {
300 | expiration_ms = each.value.partitioning.time.expiration_ms
301 | field = each.value.partitioning.time.field
302 | type = each.value.partitioning.time.type
303 | require_partition_filter = each.value.partitioning.time.require_partition_filter
304 | }
305 | }
306 |
307 | materialized_view {
308 | query = each.value.query
309 | enable_refresh = each.value.enable_refresh
310 | refresh_interval_ms = each.value.refresh_interval_ms
311 | allow_non_incremental_definition = each.value.allow_non_incremental_definition
312 | }
313 | }
Check: CKV_GCP_80: "Ensure Big Query Tables are encrypted with Customer Supplied Encryption Keys (CSEK)"
FAILED for resource: module.data-platform.module.dwh-lnd-bq-0.google_bigquery_table.views
File: /modules/bigquery-dataset/main.tf:255-270
Calling File: /blueprints/data-solutions/data-platform-foundations/05-datawarehouse.tf:127-133
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-big-query-tables-are-encrypted-with-customer-supplied-encryption-keys-csek.html
255 | resource "google_bigquery_table" "views" {
256 | depends_on = [google_bigquery_table.default]
257 | for_each = var.views
258 | project = var.project_id
259 | dataset_id = google_bigquery_dataset.default.dataset_id
260 | table_id = each.key
261 | friendly_name = each.value.friendly_name
262 | description = each.value.description
263 | labels = each.value.labels
264 | deletion_protection = each.value.deletion_protection
265 |
266 | view {
267 | query = each.value.query
268 | use_legacy_sql = each.value.use_legacy_sql
269 | }
270 | }
Check: CKV_GCP_80: "Ensure Big Query Tables are encrypted with Customer Supplied Encryption Keys (CSEK)"
FAILED for resource: module.data-platform.module.dwh-lnd-bq-0.google_bigquery_table.materialized_view
File: /modules/bigquery-dataset/main.tf:272-313
Calling File: /blueprints/data-solutions/data-platform-foundations/05-datawarehouse.tf:127-133
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-big-query-tables-are-encrypted-with-customer-supplied-encryption-keys-csek.html
272 | resource "google_bigquery_table" "materialized_view" {
273 | depends_on = [google_bigquery_table.default]
274 | for_each = var.materialized_views
275 | project = var.project_id
276 | dataset_id = google_bigquery_dataset.default.dataset_id
277 | table_id = each.key
278 | friendly_name = each.value.friendly_name
279 | description = each.value.description
280 | labels = each.value.labels
281 | clustering = each.value.options.clustering
282 | expiration_time = each.value.options.expiration_time
283 | deletion_protection = each.value.deletion_protection
284 |
285 | dynamic "range_partitioning" {
286 | for_each = try(each.value.partitioning.range, null) != null ? [""] : []
287 | content {
288 | field = each.value.partitioning.field
289 | range {
290 | start = each.value.partitioning.range.start
291 | end = each.value.partitioning.range.end
292 | interval = each.value.partitioning.range.interval
293 | }
294 | }
295 | }
296 |
297 | dynamic "time_partitioning" {
298 | for_each = try(each.value.partitioning.time, null) != null ? [""] : []
299 | content {
300 | expiration_ms = each.value.partitioning.time.expiration_ms
301 | field = each.value.partitioning.time.field
302 | type = each.value.partitioning.time.type
303 | require_partition_filter = each.value.partitioning.time.require_partition_filter
304 | }
305 | }
306 |
307 | materialized_view {
308 | query = each.value.query
309 | enable_refresh = each.value.enable_refresh
310 | refresh_interval_ms = each.value.refresh_interval_ms
311 | allow_non_incremental_definition = each.value.allow_non_incremental_definition
312 | }
313 | }
Check: CKV_GCP_80: "Ensure Big Query Tables are encrypted with Customer Supplied Encryption Keys (CSEK)"
FAILED for resource: module.land-bq-0.google_bigquery_table.views
File: /modules/bigquery-dataset/main.tf:255-270
Calling File: /blueprints/data-solutions/data-platform-minimal/01-landing.tf:106-112
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-big-query-tables-are-encrypted-with-customer-supplied-encryption-keys-csek.html
255 | resource "google_bigquery_table" "views" {
256 | depends_on = [google_bigquery_table.default]
257 | for_each = var.views
258 | project = var.project_id
259 | dataset_id = google_bigquery_dataset.default.dataset_id
260 | table_id = each.key
261 | friendly_name = each.value.friendly_name
262 | description = each.value.description
263 | labels = each.value.labels
264 | deletion_protection = each.value.deletion_protection
265 |
266 | view {
267 | query = each.value.query
268 | use_legacy_sql = each.value.use_legacy_sql
269 | }
270 | }
Check: CKV_GCP_80: "Ensure Big Query Tables are encrypted with Customer Supplied Encryption Keys (CSEK)"
FAILED for resource: module.land-bq-0.google_bigquery_table.materialized_view
File: /modules/bigquery-dataset/main.tf:272-313
Calling File: /blueprints/data-solutions/data-platform-minimal/01-landing.tf:106-112
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-big-query-tables-are-encrypted-with-customer-supplied-encryption-keys-csek.html
272 | resource "google_bigquery_table" "materialized_view" {
273 | depends_on = [google_bigquery_table.default]
274 | for_each = var.materialized_views
275 | project = var.project_id
276 | dataset_id = google_bigquery_dataset.default.dataset_id
277 | table_id = each.key
278 | friendly_name = each.value.friendly_name
279 | description = each.value.description
280 | labels = each.value.labels
281 | clustering = each.value.options.clustering
282 | expiration_time = each.value.options.expiration_time
283 | deletion_protection = each.value.deletion_protection
284 |
285 | dynamic "range_partitioning" {
286 | for_each = try(each.value.partitioning.range, null) != null ? [""] : []
287 | content {
288 | field = each.value.partitioning.field
289 | range {
290 | start = each.value.partitioning.range.start
291 | end = each.value.partitioning.range.end
292 | interval = each.value.partitioning.range.interval
293 | }
294 | }
295 | }
296 |
297 | dynamic "time_partitioning" {
298 | for_each = try(each.value.partitioning.time, null) != null ? [""] : []
299 | content {
300 | expiration_ms = each.value.partitioning.time.expiration_ms
301 | field = each.value.partitioning.time.field
302 | type = each.value.partitioning.time.type
303 | require_partition_filter = each.value.partitioning.time.require_partition_filter
304 | }
305 | }
306 |
307 | materialized_view {
308 | query = each.value.query
309 | enable_refresh = each.value.enable_refresh
310 | refresh_interval_ms = each.value.refresh_interval_ms
311 | allow_non_incremental_definition = each.value.allow_non_incremental_definition
312 | }
313 | }
Check: CKV_GCP_80: "Ensure Big Query Tables are encrypted with Customer Supplied Encryption Keys (CSEK)"
FAILED for resource: module.cur-bq-0.google_bigquery_table.views
File: /modules/bigquery-dataset/main.tf:255-270
Calling File: /blueprints/data-solutions/data-platform-minimal/03-curated.tf:124-130
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-big-query-tables-are-encrypted-with-customer-supplied-encryption-keys-csek.html
255 | resource "google_bigquery_table" "views" {
256 | depends_on = [google_bigquery_table.default]
257 | for_each = var.views
258 | project = var.project_id
259 | dataset_id = google_bigquery_dataset.default.dataset_id
260 | table_id = each.key
261 | friendly_name = each.value.friendly_name
262 | description = each.value.description
263 | labels = each.value.labels
264 | deletion_protection = each.value.deletion_protection
265 |
266 | view {
267 | query = each.value.query
268 | use_legacy_sql = each.value.use_legacy_sql
269 | }
270 | }
Check: CKV_GCP_80: "Ensure Big Query Tables are encrypted with Customer Supplied Encryption Keys (CSEK)"
FAILED for resource: module.cur-bq-0.google_bigquery_table.materialized_view
File: /modules/bigquery-dataset/main.tf:272-313
Calling File: /blueprints/data-solutions/data-platform-minimal/03-curated.tf:124-130
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-big-query-tables-are-encrypted-with-customer-supplied-encryption-keys-csek.html
272 | resource "google_bigquery_table" "materialized_view" {
273 | depends_on = [google_bigquery_table.default]
274 | for_each = var.materialized_views
275 | project = var.project_id
276 | dataset_id = google_bigquery_dataset.default.dataset_id
277 | table_id = each.key
278 | friendly_name = each.value.friendly_name
279 | description = each.value.description
280 | labels = each.value.labels
281 | clustering = each.value.options.clustering
282 | expiration_time = each.value.options.expiration_time
283 | deletion_protection = each.value.deletion_protection
284 |
285 | dynamic "range_partitioning" {
286 | for_each = try(each.value.partitioning.range, null) != null ? [""] : []
287 | content {
288 | field = each.value.partitioning.field
289 | range {
290 | start = each.value.partitioning.range.start
291 | end = each.value.partitioning.range.end
292 | interval = each.value.partitioning.range.interval
293 | }
294 | }
295 | }
296 |
297 | dynamic "time_partitioning" {
298 | for_each = try(each.value.partitioning.time, null) != null ? [""] : []
299 | content {
300 | expiration_ms = each.value.partitioning.time.expiration_ms
301 | field = each.value.partitioning.time.field
302 | type = each.value.partitioning.time.type
303 | require_partition_filter = each.value.partitioning.time.require_partition_filter
304 | }
305 | }
306 |
307 | materialized_view {
308 | query = each.value.query
309 | enable_refresh = each.value.enable_refresh
310 | refresh_interval_ms = each.value.refresh_interval_ms
311 | allow_non_incremental_definition = each.value.allow_non_incremental_definition
312 | }
313 | }
Check: CKV_GCP_80: "Ensure Big Query Tables are encrypted with Customer Supplied Encryption Keys (CSEK)"
FAILED for resource: module.bigquery-dataset.google_bigquery_table.views
File: /modules/bigquery-dataset/main.tf:255-270
Calling File: /blueprints/data-solutions/gcs-to-bq-with-least-privileges/datastorage.tf:37-67
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-big-query-tables-are-encrypted-with-customer-supplied-encryption-keys-csek.html
255 | resource "google_bigquery_table" "views" {
256 | depends_on = [google_bigquery_table.default]
257 | for_each = var.views
258 | project = var.project_id
259 | dataset_id = google_bigquery_dataset.default.dataset_id
260 | table_id = each.key
261 | friendly_name = each.value.friendly_name
262 | description = each.value.description
263 | labels = each.value.labels
264 | deletion_protection = each.value.deletion_protection
265 |
266 | view {
267 | query = each.value.query
268 | use_legacy_sql = each.value.use_legacy_sql
269 | }
270 | }
Check: CKV_GCP_80: "Ensure Big Query Tables are encrypted with Customer Supplied Encryption Keys (CSEK)"
FAILED for resource: module.bigquery-dataset.google_bigquery_table.materialized_view
File: /modules/bigquery-dataset/main.tf:272-313
Calling File: /blueprints/data-solutions/gcs-to-bq-with-least-privileges/datastorage.tf:37-67
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-big-query-tables-are-encrypted-with-customer-supplied-encryption-keys-csek.html
272 | resource "google_bigquery_table" "materialized_view" {
273 | depends_on = [google_bigquery_table.default]
274 | for_each = var.materialized_views
275 | project = var.project_id
276 | dataset_id = google_bigquery_dataset.default.dataset_id
277 | table_id = each.key
278 | friendly_name = each.value.friendly_name
279 | description = each.value.description
280 | labels = each.value.labels
281 | clustering = each.value.options.clustering
282 | expiration_time = each.value.options.expiration_time
283 | deletion_protection = each.value.deletion_protection
284 |
285 | dynamic "range_partitioning" {
286 | for_each = try(each.value.partitioning.range, null) != null ? [""] : []
287 | content {
288 | field = each.value.partitioning.field
289 | range {
290 | start = each.value.partitioning.range.start
291 | end = each.value.partitioning.range.end
292 | interval = each.value.partitioning.range.interval
293 | }
294 | }
295 | }
296 |
297 | dynamic "time_partitioning" {
298 | for_each = try(each.value.partitioning.time, null) != null ? [""] : []
299 | content {
300 | expiration_ms = each.value.partitioning.time.expiration_ms
301 | field = each.value.partitioning.time.field
302 | type = each.value.partitioning.time.type
303 | require_partition_filter = each.value.partitioning.time.require_partition_filter
304 | }
305 | }
306 |
307 | materialized_view {
308 | query = each.value.query
309 | enable_refresh = each.value.enable_refresh
310 | refresh_interval_ms = each.value.refresh_interval_ms
311 | allow_non_incremental_definition = each.value.allow_non_incremental_definition
312 | }
313 | }
Check: CKV_GCP_80: "Ensure Big Query Tables are encrypted with Customer Supplied Encryption Keys (CSEK)"
FAILED for resource: module.gke-multitenant.module.gke-dataset-resource-usage.google_bigquery_table.views
File: /modules/bigquery-dataset/main.tf:255-270
Calling File: /blueprints/gke/multitenant-fleet/main.tf:79-84
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-big-query-tables-are-encrypted-with-customer-supplied-encryption-keys-csek.html
255 | resource "google_bigquery_table" "views" {
256 | depends_on = [google_bigquery_table.default]
257 | for_each = var.views
258 | project = var.project_id
259 | dataset_id = google_bigquery_dataset.default.dataset_id
260 | table_id = each.key
261 | friendly_name = each.value.friendly_name
262 | description = each.value.description
263 | labels = each.value.labels
264 | deletion_protection = each.value.deletion_protection
265 |
266 | view {
267 | query = each.value.query
268 | use_legacy_sql = each.value.use_legacy_sql
269 | }
270 | }
Check: CKV_GCP_80: "Ensure Big Query Tables are encrypted with Customer Supplied Encryption Keys (CSEK)"
FAILED for resource: module.gke-multitenant.module.gke-dataset-resource-usage.google_bigquery_table.materialized_view
File: /modules/bigquery-dataset/main.tf:272-313
Calling File: /blueprints/gke/multitenant-fleet/main.tf:79-84
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-big-query-tables-are-encrypted-with-customer-supplied-encryption-keys-csek.html
272 | resource "google_bigquery_table" "materialized_view" {
273 | depends_on = [google_bigquery_table.default]
274 | for_each = var.materialized_views
275 | project = var.project_id
276 | dataset_id = google_bigquery_dataset.default.dataset_id
277 | table_id = each.key
278 | friendly_name = each.value.friendly_name
279 | description = each.value.description
280 | labels = each.value.labels
281 | clustering = each.value.options.clustering
282 | expiration_time = each.value.options.expiration_time
283 | deletion_protection = each.value.deletion_protection
284 |
285 | dynamic "range_partitioning" {
286 | for_each = try(each.value.partitioning.range, null) != null ? [""] : []
287 | content {
288 | field = each.value.partitioning.field
289 | range {
290 | start = each.value.partitioning.range.start
291 | end = each.value.partitioning.range.end
292 | interval = each.value.partitioning.range.interval
293 | }
294 | }
295 | }
296 |
297 | dynamic "time_partitioning" {
298 | for_each = try(each.value.partitioning.time, null) != null ? [""] : []
299 | content {
300 | expiration_ms = each.value.partitioning.time.expiration_ms
301 | field = each.value.partitioning.time.field
302 | type = each.value.partitioning.time.type
303 | require_partition_filter = each.value.partitioning.time.require_partition_filter
304 | }
305 | }
306 |
307 | materialized_view {
308 | query = each.value.query
309 | enable_refresh = each.value.enable_refresh
310 | refresh_interval_ms = each.value.refresh_interval_ms
311 | allow_non_incremental_definition = each.value.allow_non_incremental_definition
312 | }
313 | }
Check: CKV_GCP_80: "Ensure Big Query Tables are encrypted with Customer Supplied Encryption Keys (CSEK)"
FAILED for resource: module.log-export-dataset.google_bigquery_table.views
File: /modules/bigquery-dataset/main.tf:255-270
Calling File: /fast/stages/0-bootstrap/log-export.tf:56-63
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-big-query-tables-are-encrypted-with-customer-supplied-encryption-keys-csek.html
255 | resource "google_bigquery_table" "views" {
256 | depends_on = [google_bigquery_table.default]
257 | for_each = var.views
258 | project = var.project_id
259 | dataset_id = google_bigquery_dataset.default.dataset_id
260 | table_id = each.key
261 | friendly_name = each.value.friendly_name
262 | description = each.value.description
263 | labels = each.value.labels
264 | deletion_protection = each.value.deletion_protection
265 |
266 | view {
267 | query = each.value.query
268 | use_legacy_sql = each.value.use_legacy_sql
269 | }
270 | }
Check: CKV_GCP_80: "Ensure Big Query Tables are encrypted with Customer Supplied Encryption Keys (CSEK)"
FAILED for resource: module.log-export-dataset.google_bigquery_table.materialized_view
File: /modules/bigquery-dataset/main.tf:272-313
Calling File: /fast/stages/0-bootstrap/log-export.tf:56-63
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-big-query-tables-are-encrypted-with-customer-supplied-encryption-keys-csek.html
272 | resource "google_bigquery_table" "materialized_view" {
273 | depends_on = [google_bigquery_table.default]
274 | for_each = var.materialized_views
275 | project = var.project_id
276 | dataset_id = google_bigquery_dataset.default.dataset_id
277 | table_id = each.key
278 | friendly_name = each.value.friendly_name
279 | description = each.value.description
280 | labels = each.value.labels
281 | clustering = each.value.options.clustering
282 | expiration_time = each.value.options.expiration_time
283 | deletion_protection = each.value.deletion_protection
284 |
285 | dynamic "range_partitioning" {
286 | for_each = try(each.value.partitioning.range, null) != null ? [""] : []
287 | content {
288 | field = each.value.partitioning.field
289 | range {
290 | start = each.value.partitioning.range.start
291 | end = each.value.partitioning.range.end
292 | interval = each.value.partitioning.range.interval
293 | }
294 | }
295 | }
296 |
297 | dynamic "time_partitioning" {
298 | for_each = try(each.value.partitioning.time, null) != null ? [""] : []
299 | content {
300 | expiration_ms = each.value.partitioning.time.expiration_ms
301 | field = each.value.partitioning.time.field
302 | type = each.value.partitioning.time.type
303 | require_partition_filter = each.value.partitioning.time.require_partition_filter
304 | }
305 | }
306 |
307 | materialized_view {
308 | query = each.value.query
309 | enable_refresh = each.value.enable_refresh
310 | refresh_interval_ms = each.value.refresh_interval_ms
311 | allow_non_incremental_definition = each.value.allow_non_incremental_definition
312 | }
313 | }
Check: CKV_GCP_80: "Ensure Big Query Tables are encrypted with Customer Supplied Encryption Keys (CSEK)"
FAILED for resource: module.billing-export-dataset.google_bigquery_table.views
File: /modules/bigquery-dataset/main.tf:255-270
Calling File: /fast/stages/0-bootstrap/billing.tf:58-65
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-big-query-tables-are-encrypted-with-customer-supplied-encryption-keys-csek.html
255 | resource "google_bigquery_table" "views" {
256 | depends_on = [google_bigquery_table.default]
257 | for_each = var.views
258 | project = var.project_id
259 | dataset_id = google_bigquery_dataset.default.dataset_id
260 | table_id = each.key
261 | friendly_name = each.value.friendly_name
262 | description = each.value.description
263 | labels = each.value.labels
264 | deletion_protection = each.value.deletion_protection
265 |
266 | view {
267 | query = each.value.query
268 | use_legacy_sql = each.value.use_legacy_sql
269 | }
270 | }
Check: CKV_GCP_80: "Ensure Big Query Tables are encrypted with Customer Supplied Encryption Keys (CSEK)"
FAILED for resource: module.billing-export-dataset.google_bigquery_table.materialized_view
File: /modules/bigquery-dataset/main.tf:272-313
Calling File: /fast/stages/0-bootstrap/billing.tf:58-65
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-big-query-tables-are-encrypted-with-customer-supplied-encryption-keys-csek.html
272 | resource "google_bigquery_table" "materialized_view" {
273 | depends_on = [google_bigquery_table.default]
274 | for_each = var.materialized_views
275 | project = var.project_id
276 | dataset_id = google_bigquery_dataset.default.dataset_id
277 | table_id = each.key
278 | friendly_name = each.value.friendly_name
279 | description = each.value.description
280 | labels = each.value.labels
281 | clustering = each.value.options.clustering
282 | expiration_time = each.value.options.expiration_time
283 | deletion_protection = each.value.deletion_protection
284 |
285 | dynamic "range_partitioning" {
286 | for_each = try(each.value.partitioning.range, null) != null ? [""] : []
287 | content {
288 | field = each.value.partitioning.field
289 | range {
290 | start = each.value.partitioning.range.start
291 | end = each.value.partitioning.range.end
292 | interval = each.value.partitioning.range.interval
293 | }
294 | }
295 | }
296 |
297 | dynamic "time_partitioning" {
298 | for_each = try(each.value.partitioning.time, null) != null ? [""] : []
299 | content {
300 | expiration_ms = each.value.partitioning.time.expiration_ms
301 | field = each.value.partitioning.time.field
302 | type = each.value.partitioning.time.type
303 | require_partition_filter = each.value.partitioning.time.require_partition_filter
304 | }
305 | }
306 |
307 | materialized_view {
308 | query = each.value.query
309 | enable_refresh = each.value.enable_refresh
310 | refresh_interval_ms = each.value.refresh_interval_ms
311 | allow_non_incremental_definition = each.value.allow_non_incremental_definition
312 | }
313 | }
Check: CKV_GCP_85: "Ensure Big Table Instances are encrypted with Customer Supplied Encryption Keys (CSEK)"
FAILED for resource: google_bigtable_instance.default
File: /modules/bigtable-instance/main.tf:38-65
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-big-table-instances-are-encrypted-with-customer-supplied-encryption-keys-cseks.html
38 | resource "google_bigtable_instance" "default" {
39 | project = var.project_id
40 | name = var.name
41 |
42 | instance_type = var.instance_type
43 | display_name = var.display_name == null ? var.display_name : var.name
44 | deletion_protection = var.deletion_protection
45 |
46 | dynamic "cluster" {
47 | for_each = local.clusters_autoscaling
48 | content {
49 | cluster_id = cluster.key
50 | zone = cluster.value.zone
51 | storage_type = cluster.value.storage_type
52 | num_nodes = cluster.value.num_nodes
53 |
54 | dynamic "autoscaling_config" {
55 | for_each = cluster.value.autoscaling == null ? [] : [""]
56 | content {
57 | min_nodes = cluster.value.autoscaling.min_nodes
58 | max_nodes = cluster.value.autoscaling.max_nodes
59 | cpu_target = cluster.value.autoscaling.cpu_target
60 | storage_target = cluster.value.autoscaling.storage_target
61 | }
62 | }
63 | }
64 | }
65 | }
Check: CKV_GCP_114: "Ensure public access prevention is enforced on Cloud Storage bucket"
FAILED for resource: module.function_export.google_storage_bucket.bucket[0]
File: /modules/cloud-function-v1/main.tf:131-160
Calling File: /blueprints/apigee/bigquery-analytics/main.tf:154-188
131 | resource "google_storage_bucket" "bucket" {
132 | count = var.bucket_config == null ? 0 : 1
133 | project = var.project_id
134 | name = "${local.prefix}${var.bucket_name}"
135 | uniform_bucket_level_access = true
136 | location = (
137 | var.bucket_config.location == null
138 | ? var.region
139 | : var.bucket_config.location
140 | )
141 | labels = var.labels
142 |
143 | dynamic "lifecycle_rule" {
144 | for_each = var.bucket_config.lifecycle_delete_age_days == null ? [] : [""]
145 | content {
146 | action { type = "Delete" }
147 | condition {
148 | age = var.bucket_config.lifecycle_delete_age_days
149 | with_state = "ARCHIVED"
150 | }
151 | }
152 | }
153 |
154 | dynamic "versioning" {
155 | for_each = var.bucket_config.lifecycle_delete_age_days == null ? [] : [""]
156 | content {
157 | enabled = true
158 | }
159 | }
160 | }
Check: CKV_GCP_62: "Bucket should log access"
FAILED for resource: module.function_export.google_storage_bucket.bucket[0]
File: /modules/cloud-function-v1/main.tf:131-160
Calling File: /blueprints/apigee/bigquery-analytics/main.tf:154-188
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-storage-gcs-policies/bc-gcp-logging-2.html
131 | resource "google_storage_bucket" "bucket" {
132 | count = var.bucket_config == null ? 0 : 1
133 | project = var.project_id
134 | name = "${local.prefix}${var.bucket_name}"
135 | uniform_bucket_level_access = true
136 | location = (
137 | var.bucket_config.location == null
138 | ? var.region
139 | : var.bucket_config.location
140 | )
141 | labels = var.labels
142 |
143 | dynamic "lifecycle_rule" {
144 | for_each = var.bucket_config.lifecycle_delete_age_days == null ? [] : [""]
145 | content {
146 | action { type = "Delete" }
147 | condition {
148 | age = var.bucket_config.lifecycle_delete_age_days
149 | with_state = "ARCHIVED"
150 | }
151 | }
152 | }
153 |
154 | dynamic "versioning" {
155 | for_each = var.bucket_config.lifecycle_delete_age_days == null ? [] : [""]
156 | content {
157 | enabled = true
158 | }
159 | }
160 | }
Check: CKV_GCP_114: "Ensure public access prevention is enforced on Cloud Storage bucket"
FAILED for resource: module.function_gcs2bq.google_storage_bucket.bucket[0]
File: /modules/cloud-function-v1/main.tf:131-160
Calling File: /blueprints/apigee/bigquery-analytics/main.tf:190-224
131 | resource "google_storage_bucket" "bucket" {
132 | count = var.bucket_config == null ? 0 : 1
133 | project = var.project_id
134 | name = "${local.prefix}${var.bucket_name}"
135 | uniform_bucket_level_access = true
136 | location = (
137 | var.bucket_config.location == null
138 | ? var.region
139 | : var.bucket_config.location
140 | )
141 | labels = var.labels
142 |
143 | dynamic "lifecycle_rule" {
144 | for_each = var.bucket_config.lifecycle_delete_age_days == null ? [] : [""]
145 | content {
146 | action { type = "Delete" }
147 | condition {
148 | age = var.bucket_config.lifecycle_delete_age_days
149 | with_state = "ARCHIVED"
150 | }
151 | }
152 | }
153 |
154 | dynamic "versioning" {
155 | for_each = var.bucket_config.lifecycle_delete_age_days == null ? [] : [""]
156 | content {
157 | enabled = true
158 | }
159 | }
160 | }
Check: CKV_GCP_62: "Bucket should log access"
FAILED for resource: module.function_gcs2bq.google_storage_bucket.bucket[0]
File: /modules/cloud-function-v1/main.tf:131-160
Calling File: /blueprints/apigee/bigquery-analytics/main.tf:190-224
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-storage-gcs-policies/bc-gcp-logging-2.html
131 | resource "google_storage_bucket" "bucket" {
132 | count = var.bucket_config == null ? 0 : 1
133 | project = var.project_id
134 | name = "${local.prefix}${var.bucket_name}"
135 | uniform_bucket_level_access = true
136 | location = (
137 | var.bucket_config.location == null
138 | ? var.region
139 | : var.bucket_config.location
140 | )
141 | labels = var.labels
142 |
143 | dynamic "lifecycle_rule" {
144 | for_each = var.bucket_config.lifecycle_delete_age_days == null ? [] : [""]
145 | content {
146 | action { type = "Delete" }
147 | condition {
148 | age = var.bucket_config.lifecycle_delete_age_days
149 | with_state = "ARCHIVED"
150 | }
151 | }
152 | }
153 |
154 | dynamic "versioning" {
155 | for_each = var.bucket_config.lifecycle_delete_age_days == null ? [] : [""]
156 | content {
157 | enabled = true
158 | }
159 | }
160 | }
Check: CKV_GCP_114: "Ensure public access prevention is enforced on Cloud Storage bucket"
FAILED for resource: module.cf.google_storage_bucket.bucket[0]
File: /modules/cloud-function-v1/main.tf:131-160
Calling File: /blueprints/cloud-operations/scheduled-asset-inventory-export-bq/main.tf:87-105
131 | resource "google_storage_bucket" "bucket" {
132 | count = var.bucket_config == null ? 0 : 1
133 | project = var.project_id
134 | name = "${local.prefix}${var.bucket_name}"
135 | uniform_bucket_level_access = true
136 | location = (
137 | var.bucket_config.location == null
138 | ? var.region
139 | : var.bucket_config.location
140 | )
141 | labels = var.labels
142 |
143 | dynamic "lifecycle_rule" {
144 | for_each = var.bucket_config.lifecycle_delete_age_days == null ? [] : [""]
145 | content {
146 | action { type = "Delete" }
147 | condition {
148 | age = var.bucket_config.lifecycle_delete_age_days
149 | with_state = "ARCHIVED"
150 | }
151 | }
152 | }
153 |
154 | dynamic "versioning" {
155 | for_each = var.bucket_config.lifecycle_delete_age_days == null ? [] : [""]
156 | content {
157 | enabled = true
158 | }
159 | }
160 | }
Check: CKV_GCP_62: "Bucket should log access"
FAILED for resource: module.cf.google_storage_bucket.bucket[0]
File: /modules/cloud-function-v1/main.tf:131-160
Calling File: /blueprints/cloud-operations/scheduled-asset-inventory-export-bq/main.tf:87-105
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-storage-gcs-policies/bc-gcp-logging-2.html
131 | resource "google_storage_bucket" "bucket" {
132 | count = var.bucket_config == null ? 0 : 1
133 | project = var.project_id
134 | name = "${local.prefix}${var.bucket_name}"
135 | uniform_bucket_level_access = true
136 | location = (
137 | var.bucket_config.location == null
138 | ? var.region
139 | : var.bucket_config.location
140 | )
141 | labels = var.labels
142 |
143 | dynamic "lifecycle_rule" {
144 | for_each = var.bucket_config.lifecycle_delete_age_days == null ? [] : [""]
145 | content {
146 | action { type = "Delete" }
147 | condition {
148 | age = var.bucket_config.lifecycle_delete_age_days
149 | with_state = "ARCHIVED"
150 | }
151 | }
152 | }
153 |
154 | dynamic "versioning" {
155 | for_each = var.bucket_config.lifecycle_delete_age_days == null ? [] : [""]
156 | content {
157 | enabled = true
158 | }
159 | }
160 | }
Check: CKV_GCP_114: "Ensure public access prevention is enforced on Cloud Storage bucket"
FAILED for resource: module.cloud-function.google_storage_bucket.bucket[0]
File: /modules/cloud-function-v1/main.tf:131-160
Calling File: /blueprints/cloud-operations/network-dashboard/deploy-cloud-function/main.tf:53-91
131 | resource "google_storage_bucket" "bucket" {
132 | count = var.bucket_config == null ? 0 : 1
133 | project = var.project_id
134 | name = "${local.prefix}${var.bucket_name}"
135 | uniform_bucket_level_access = true
136 | location = (
137 | var.bucket_config.location == null
138 | ? var.region
139 | : var.bucket_config.location
140 | )
141 | labels = var.labels
142 |
143 | dynamic "lifecycle_rule" {
144 | for_each = var.bucket_config.lifecycle_delete_age_days == null ? [] : [""]
145 | content {
146 | action { type = "Delete" }
147 | condition {
148 | age = var.bucket_config.lifecycle_delete_age_days
149 | with_state = "ARCHIVED"
150 | }
151 | }
152 | }
153 |
154 | dynamic "versioning" {
155 | for_each = var.bucket_config.lifecycle_delete_age_days == null ? [] : [""]
156 | content {
157 | enabled = true
158 | }
159 | }
160 | }
Check: CKV_GCP_62: "Bucket should log access"
FAILED for resource: module.cloud-function.google_storage_bucket.bucket[0]
File: /modules/cloud-function-v1/main.tf:131-160
Calling File: /blueprints/cloud-operations/network-dashboard/deploy-cloud-function/main.tf:53-91
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-storage-gcs-policies/bc-gcp-logging-2.html
131 | resource "google_storage_bucket" "bucket" {
132 | count = var.bucket_config == null ? 0 : 1
133 | project = var.project_id
134 | name = "${local.prefix}${var.bucket_name}"
135 | uniform_bucket_level_access = true
136 | location = (
137 | var.bucket_config.location == null
138 | ? var.region
139 | : var.bucket_config.location
140 | )
141 | labels = var.labels
142 |
143 | dynamic "lifecycle_rule" {
144 | for_each = var.bucket_config.lifecycle_delete_age_days == null ? [] : [""]
145 | content {
146 | action { type = "Delete" }
147 | condition {
148 | age = var.bucket_config.lifecycle_delete_age_days
149 | with_state = "ARCHIVED"
150 | }
151 | }
152 | }
153 |
154 | dynamic "versioning" {
155 | for_each = var.bucket_config.lifecycle_delete_age_days == null ? [] : [""]
156 | content {
157 | enabled = true
158 | }
159 | }
160 | }
Check: CKV_GCP_114: "Ensure public access prevention is enforced on Cloud Storage bucket"
FAILED for resource: module.cffile.google_storage_bucket.bucket[0]
File: /modules/cloud-function-v1/main.tf:131-160
Calling File: /blueprints/cloud-operations/scheduled-asset-inventory-export-bq/main.tf:107-129
131 | resource "google_storage_bucket" "bucket" {
132 | count = var.bucket_config == null ? 0 : 1
133 | project = var.project_id
134 | name = "${local.prefix}${var.bucket_name}"
135 | uniform_bucket_level_access = true
136 | location = (
137 | var.bucket_config.location == null
138 | ? var.region
139 | : var.bucket_config.location
140 | )
141 | labels = var.labels
142 |
143 | dynamic "lifecycle_rule" {
144 | for_each = var.bucket_config.lifecycle_delete_age_days == null ? [] : [""]
145 | content {
146 | action { type = "Delete" }
147 | condition {
148 | age = var.bucket_config.lifecycle_delete_age_days
149 | with_state = "ARCHIVED"
150 | }
151 | }
152 | }
153 |
154 | dynamic "versioning" {
155 | for_each = var.bucket_config.lifecycle_delete_age_days == null ? [] : [""]
156 | content {
157 | enabled = true
158 | }
159 | }
160 | }
Check: CKV_GCP_62: "Bucket should log access"
FAILED for resource: module.cffile.google_storage_bucket.bucket[0]
File: /modules/cloud-function-v1/main.tf:131-160
Calling File: /blueprints/cloud-operations/scheduled-asset-inventory-export-bq/main.tf:107-129
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-storage-gcs-policies/bc-gcp-logging-2.html
131 | resource "google_storage_bucket" "bucket" {
132 | count = var.bucket_config == null ? 0 : 1
133 | project = var.project_id
134 | name = "${local.prefix}${var.bucket_name}"
135 | uniform_bucket_level_access = true
136 | location = (
137 | var.bucket_config.location == null
138 | ? var.region
139 | : var.bucket_config.location
140 | )
141 | labels = var.labels
142 |
143 | dynamic "lifecycle_rule" {
144 | for_each = var.bucket_config.lifecycle_delete_age_days == null ? [] : [""]
145 | content {
146 | action { type = "Delete" }
147 | condition {
148 | age = var.bucket_config.lifecycle_delete_age_days
149 | with_state = "ARCHIVED"
150 | }
151 | }
152 | }
153 |
154 | dynamic "versioning" {
155 | for_each = var.bucket_config.lifecycle_delete_age_days == null ? [] : [""]
156 | content {
157 | enabled = true
158 | }
159 | }
160 | }
Check: CKV_GCP_114: "Ensure public access prevention is enforced on Cloud Storage bucket"
FAILED for resource: module.cf-healthchecker.google_storage_bucket.bucket[0]
File: /modules/cloud-function-v1/main.tf:131-160
Calling File: /blueprints/cloud-operations/unmanaged-instances-healthcheck/main.tf:141-184
131 | resource "google_storage_bucket" "bucket" {
132 | count = var.bucket_config == null ? 0 : 1
133 | project = var.project_id
134 | name = "${local.prefix}${var.bucket_name}"
135 | uniform_bucket_level_access = true
136 | location = (
137 | var.bucket_config.location == null
138 | ? var.region
139 | : var.bucket_config.location
140 | )
141 | labels = var.labels
142 |
143 | dynamic "lifecycle_rule" {
144 | for_each = var.bucket_config.lifecycle_delete_age_days == null ? [] : [""]
145 | content {
146 | action { type = "Delete" }
147 | condition {
148 | age = var.bucket_config.lifecycle_delete_age_days
149 | with_state = "ARCHIVED"
150 | }
151 | }
152 | }
153 |
154 | dynamic "versioning" {
155 | for_each = var.bucket_config.lifecycle_delete_age_days == null ? [] : [""]
156 | content {
157 | enabled = true
158 | }
159 | }
160 | }
Check: CKV_GCP_62: "Bucket should log access"
FAILED for resource: module.cf-healthchecker.google_storage_bucket.bucket[0]
File: /modules/cloud-function-v1/main.tf:131-160
Calling File: /blueprints/cloud-operations/unmanaged-instances-healthcheck/main.tf:141-184
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-storage-gcs-policies/bc-gcp-logging-2.html
131 | resource "google_storage_bucket" "bucket" {
132 | count = var.bucket_config == null ? 0 : 1
133 | project = var.project_id
134 | name = "${local.prefix}${var.bucket_name}"
135 | uniform_bucket_level_access = true
136 | location = (
137 | var.bucket_config.location == null
138 | ? var.region
139 | : var.bucket_config.location
140 | )
141 | labels = var.labels
142 |
143 | dynamic "lifecycle_rule" {
144 | for_each = var.bucket_config.lifecycle_delete_age_days == null ? [] : [""]
145 | content {
146 | action { type = "Delete" }
147 | condition {
148 | age = var.bucket_config.lifecycle_delete_age_days
149 | with_state = "ARCHIVED"
150 | }
151 | }
152 | }
153 |
154 | dynamic "versioning" {
155 | for_each = var.bucket_config.lifecycle_delete_age_days == null ? [] : [""]
156 | content {
157 | enabled = true
158 | }
159 | }
160 | }
Check: CKV_GCP_114: "Ensure public access prevention is enforced on Cloud Storage bucket"
FAILED for resource: module.cf-restarter.google_storage_bucket.bucket[0]
File: /modules/cloud-function-v1/main.tf:131-160
Calling File: /blueprints/cloud-operations/unmanaged-instances-healthcheck/main.tf:110-139
131 | resource "google_storage_bucket" "bucket" {
132 | count = var.bucket_config == null ? 0 : 1
133 | project = var.project_id
134 | name = "${local.prefix}${var.bucket_name}"
135 | uniform_bucket_level_access = true
136 | location = (
137 | var.bucket_config.location == null
138 | ? var.region
139 | : var.bucket_config.location
140 | )
141 | labels = var.labels
142 |
143 | dynamic "lifecycle_rule" {
144 | for_each = var.bucket_config.lifecycle_delete_age_days == null ? [] : [""]
145 | content {
146 | action { type = "Delete" }
147 | condition {
148 | age = var.bucket_config.lifecycle_delete_age_days
149 | with_state = "ARCHIVED"
150 | }
151 | }
152 | }
153 |
154 | dynamic "versioning" {
155 | for_each = var.bucket_config.lifecycle_delete_age_days == null ? [] : [""]
156 | content {
157 | enabled = true
158 | }
159 | }
160 | }
Check: CKV_GCP_62: "Bucket should log access"
FAILED for resource: module.cf-restarter.google_storage_bucket.bucket[0]
File: /modules/cloud-function-v1/main.tf:131-160
Calling File: /blueprints/cloud-operations/unmanaged-instances-healthcheck/main.tf:110-139
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-storage-gcs-policies/bc-gcp-logging-2.html
131 | resource "google_storage_bucket" "bucket" {
132 | count = var.bucket_config == null ? 0 : 1
133 | project = var.project_id
134 | name = "${local.prefix}${var.bucket_name}"
135 | uniform_bucket_level_access = true
136 | location = (
137 | var.bucket_config.location == null
138 | ? var.region
139 | : var.bucket_config.location
140 | )
141 | labels = var.labels
142 |
143 | dynamic "lifecycle_rule" {
144 | for_each = var.bucket_config.lifecycle_delete_age_days == null ? [] : [""]
145 | content {
146 | action { type = "Delete" }
147 | condition {
148 | age = var.bucket_config.lifecycle_delete_age_days
149 | with_state = "ARCHIVED"
150 | }
151 | }
152 | }
153 |
154 | dynamic "versioning" {
155 | for_each = var.bucket_config.lifecycle_delete_age_days == null ? [] : [""]
156 | content {
157 | enabled = true
158 | }
159 | }
160 | }
Check: CKV_GCP_114: "Ensure public access prevention is enforced on Cloud Storage bucket"
FAILED for resource: module.function-hello.google_storage_bucket.bucket[0]
File: /modules/cloud-function-v1/main.tf:131-160
Calling File: /blueprints/networking/private-cloud-function-from-onprem/main.tf:179-195
131 | resource "google_storage_bucket" "bucket" {
132 | count = var.bucket_config == null ? 0 : 1
133 | project = var.project_id
134 | name = "${local.prefix}${var.bucket_name}"
135 | uniform_bucket_level_access = true
136 | location = (
137 | var.bucket_config.location == null
138 | ? var.region
139 | : var.bucket_config.location
140 | )
141 | labels = var.labels
142 |
143 | dynamic "lifecycle_rule" {
144 | for_each = var.bucket_config.lifecycle_delete_age_days == null ? [] : [""]
145 | content {
146 | action { type = "Delete" }
147 | condition {
148 | age = var.bucket_config.lifecycle_delete_age_days
149 | with_state = "ARCHIVED"
150 | }
151 | }
152 | }
153 |
154 | dynamic "versioning" {
155 | for_each = var.bucket_config.lifecycle_delete_age_days == null ? [] : [""]
156 | content {
157 | enabled = true
158 | }
159 | }
160 | }
Check: CKV_GCP_62: "Bucket should log access"
FAILED for resource: module.function-hello.google_storage_bucket.bucket[0]
File: /modules/cloud-function-v1/main.tf:131-160
Calling File: /blueprints/networking/private-cloud-function-from-onprem/main.tf:179-195
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-storage-gcs-policies/bc-gcp-logging-2.html
131 | resource "google_storage_bucket" "bucket" {
132 | count = var.bucket_config == null ? 0 : 1
133 | project = var.project_id
134 | name = "${local.prefix}${var.bucket_name}"
135 | uniform_bucket_level_access = true
136 | location = (
137 | var.bucket_config.location == null
138 | ? var.region
139 | : var.bucket_config.location
140 | )
141 | labels = var.labels
142 |
143 | dynamic "lifecycle_rule" {
144 | for_each = var.bucket_config.lifecycle_delete_age_days == null ? [] : [""]
145 | content {
146 | action { type = "Delete" }
147 | condition {
148 | age = var.bucket_config.lifecycle_delete_age_days
149 | with_state = "ARCHIVED"
150 | }
151 | }
152 | }
153 |
154 | dynamic "versioning" {
155 | for_each = var.bucket_config.lifecycle_delete_age_days == null ? [] : [""]
156 | content {
157 | enabled = true
158 | }
159 | }
160 | }
Check: CKV_GCP_6: "Ensure all Cloud SQL database instance requires all incoming connections to use SSL"
FAILED for resource: module.db.google_sql_database_instance.replicas
File: /modules/cloudsql-instance/main.tf:126-170
Calling File: /blueprints/data-solutions/cloudsql-multiregion/cloudsql.tf:15-39
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/bc-gcp-general-1.html
126 | resource "google_sql_database_instance" "replicas" {
127 | provider = google-beta
128 | for_each = local.has_replicas ? var.replicas : {}
129 | project = var.project_id
130 | name = "${local.prefix}${each.key}"
131 | region = each.value.region
132 | database_version = var.database_version
133 | encryption_key_name = each.value.encryption_key_name
134 | master_instance_name = google_sql_database_instance.primary.name
135 |
136 | settings {
137 | tier = var.tier
138 | deletion_protection_enabled = var.deletion_protection_enabled
139 | disk_autoresize = var.disk_size == null
140 | disk_size = var.disk_size
141 | disk_type = var.disk_type
142 | # availability_type = var.availability_type
143 | user_labels = var.labels
144 | activation_policy = var.activation_policy
145 |
146 | ip_configuration {
147 | ipv4_enabled = var.ipv4_enabled
148 | private_network = var.network
149 | allocated_ip_range = var.allocated_ip_ranges.replica
150 | dynamic "authorized_networks" {
151 | for_each = var.authorized_networks != null ? var.authorized_networks : {}
152 | iterator = network
153 | content {
154 | name = network.key
155 | value = network.value
156 | }
157 | }
158 | }
159 |
160 | dynamic "database_flags" {
161 | for_each = var.flags != null ? var.flags : {}
162 | iterator = flag
163 | content {
164 | name = flag.key
165 | value = flag.value
166 | }
167 | }
168 | }
169 | deletion_protection = var.deletion_protection
170 | }
Check: CKV_GCP_6: "Ensure all Cloud SQL database instance requires all incoming connections to use SSL"
FAILED for resource: module.cloudsql.google_sql_database_instance.replicas
File: /modules/cloudsql-instance/main.tf:126-170
Calling File: /blueprints/third-party-solutions/wordpress/cloudrun/cloudsql.tf:54-67
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/bc-gcp-general-1.html
126 | resource "google_sql_database_instance" "replicas" {
127 | provider = google-beta
128 | for_each = local.has_replicas ? var.replicas : {}
129 | project = var.project_id
130 | name = "${local.prefix}${each.key}"
131 | region = each.value.region
132 | database_version = var.database_version
133 | encryption_key_name = each.value.encryption_key_name
134 | master_instance_name = google_sql_database_instance.primary.name
135 |
136 | settings {
137 | tier = var.tier
138 | deletion_protection_enabled = var.deletion_protection_enabled
139 | disk_autoresize = var.disk_size == null
140 | disk_size = var.disk_size
141 | disk_type = var.disk_type
142 | # availability_type = var.availability_type
143 | user_labels = var.labels
144 | activation_policy = var.activation_policy
145 |
146 | ip_configuration {
147 | ipv4_enabled = var.ipv4_enabled
148 | private_network = var.network
149 | allocated_ip_range = var.allocated_ip_ranges.replica
150 | dynamic "authorized_networks" {
151 | for_each = var.authorized_networks != null ? var.authorized_networks : {}
152 | iterator = network
153 | content {
154 | name = network.key
155 | value = network.value
156 | }
157 | }
158 | }
159 |
160 | dynamic "database_flags" {
161 | for_each = var.flags != null ? var.flags : {}
162 | iterator = flag
163 | content {
164 | name = flag.key
165 | value = flag.value
166 | }
167 | }
168 | }
169 | deletion_protection = var.deletion_protection
170 | }
Check: CKV_GCP_104: "Ensure Datafusion has stack driver logging enabled"
FAILED for resource: google_data_fusion_instance.default
File: /modules/datafusion/main.tf:63-78
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-datafusion-has-stack-driver-logging-enabled.html
63 | resource "google_data_fusion_instance" "default" {
64 | provider = google-beta
65 | project = var.project_id
66 | name = var.name
67 | type = var.type
68 | description = var.description
69 | labels = var.labels
70 | region = var.region
71 | private_instance = var.private_instance
72 | enable_stackdriver_logging = var.enable_stackdriver_logging
73 | enable_stackdriver_monitoring = var.enable_stackdriver_monitoring
74 | network_config {
75 | network = var.network
76 | ip_allocation = local.ip_allocation
77 | }
78 | }
Check: CKV_GCP_105: "Ensure Datafusion has stack driver monitoring enabled"
FAILED for resource: google_data_fusion_instance.default
File: /modules/datafusion/main.tf:63-78
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-datafusion-has-stack-driver-monitoring-enabled.html
63 | resource "google_data_fusion_instance" "default" {
64 | provider = google-beta
65 | project = var.project_id
66 | name = var.name
67 | type = var.type
68 | description = var.description
69 | labels = var.labels
70 | region = var.region
71 | private_instance = var.private_instance
72 | enable_stackdriver_logging = var.enable_stackdriver_logging
73 | enable_stackdriver_monitoring = var.enable_stackdriver_monitoring
74 | network_config {
75 | network = var.network
76 | ip_allocation = local.ip_allocation
77 | }
78 | }
Check: CKV_GCP_114: "Ensure public access prevention is enforced on Cloud Storage bucket"
FAILED for resource: module.bucket_export.google_storage_bucket.bucket
File: /modules/gcs/main.tf:22-100
Calling File: /blueprints/apigee/bigquery-analytics/main.tf:135-152
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_GCP_78: "Ensure Cloud storage has versioning enabled"
FAILED for resource: module.bucket_export.google_storage_bucket.bucket
File: /modules/gcs/main.tf:22-100
Calling File: /blueprints/apigee/bigquery-analytics/main.tf:135-152
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-cloud-storage-has-versioning-enabled.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_GCP_83: "Ensure PubSub Topics are encrypted with Customer Supplied Encryption Keys (CSEK)"
FAILED for resource: module.bucket_export.google_pubsub_topic.topic
File: /modules/gcs/main.tf:147-151
Calling File: /blueprints/apigee/bigquery-analytics/main.tf:135-152
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-pubsub-topics-are-encrypted-with-customer-supplied-encryption-keys-csek.html
147 | resource "google_pubsub_topic" "topic" {
148 | count = local.notification ? 1 : 0
149 | project = var.project_id
150 | name = var.notification_config.topic_name
151 | }
Check: CKV_GCP_114: "Ensure public access prevention is enforced on Cloud Storage bucket"
FAILED for resource: module.bucket.google_storage_bucket.bucket
File: /modules/gcs/main.tf:22-100
Calling File: /blueprints/data-solutions/data-playground/main.tf:159-167
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_GCP_78: "Ensure Cloud storage has versioning enabled"
FAILED for resource: module.bucket.google_storage_bucket.bucket
File: /modules/gcs/main.tf:22-100
Calling File: /blueprints/data-solutions/data-playground/main.tf:159-167
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-cloud-storage-has-versioning-enabled.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_GCP_83: "Ensure PubSub Topics are encrypted with Customer Supplied Encryption Keys (CSEK)"
FAILED for resource: module.bucket.google_pubsub_topic.topic
File: /modules/gcs/main.tf:147-151
Calling File: /blueprints/data-solutions/data-playground/main.tf:159-167
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-pubsub-topics-are-encrypted-with-customer-supplied-encryption-keys-csek.html
147 | resource "google_pubsub_topic" "topic" {
148 | count = local.notification ? 1 : 0
149 | project = var.project_id
150 | name = var.notification_config.topic_name
151 | }
Check: CKV_GCP_114: "Ensure public access prevention is enforced on Cloud Storage bucket"
FAILED for resource: module.gcs.google_storage_bucket.bucket
File: /modules/gcs/main.tf:22-100
Calling File: /blueprints/data-solutions/cloudsql-multiregion/main.tf:136-145
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_GCP_78: "Ensure Cloud storage has versioning enabled"
FAILED for resource: module.gcs.google_storage_bucket.bucket
File: /modules/gcs/main.tf:22-100
Calling File: /blueprints/data-solutions/cloudsql-multiregion/main.tf:136-145
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-cloud-storage-has-versioning-enabled.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_GCP_83: "Ensure PubSub Topics are encrypted with Customer Supplied Encryption Keys (CSEK)"
FAILED for resource: module.gcs.google_pubsub_topic.topic
File: /modules/gcs/main.tf:147-151
Calling File: /blueprints/data-solutions/cloudsql-multiregion/main.tf:136-145
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-pubsub-topics-are-encrypted-with-customer-supplied-encryption-keys-csek.html
147 | resource "google_pubsub_topic" "topic" {
148 | count = local.notification ? 1 : 0
149 | project = var.project_id
150 | name = var.notification_config.topic_name
151 | }
Check: CKV_GCP_114: "Ensure public access prevention is enforced on Cloud Storage bucket"
FAILED for resource: module.kms-gcs.google_storage_bucket.bucket
File: /modules/gcs/main.tf:22-100
Calling File: /blueprints/data-solutions/cmek-via-centralized-kms/main.tf:158-167
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_GCP_78: "Ensure Cloud storage has versioning enabled"
FAILED for resource: module.kms-gcs.google_storage_bucket.bucket
File: /modules/gcs/main.tf:22-100
Calling File: /blueprints/data-solutions/cmek-via-centralized-kms/main.tf:158-167
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-cloud-storage-has-versioning-enabled.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_GCP_83: "Ensure PubSub Topics are encrypted with Customer Supplied Encryption Keys (CSEK)"
FAILED for resource: module.kms-gcs.google_pubsub_topic.topic
File: /modules/gcs/main.tf:147-151
Calling File: /blueprints/data-solutions/cmek-via-centralized-kms/main.tf:158-167
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-pubsub-topics-are-encrypted-with-customer-supplied-encryption-keys-csek.html
147 | resource "google_pubsub_topic" "topic" {
148 | count = local.notification ? 1 : 0
149 | project = var.project_id
150 | name = var.notification_config.topic_name
151 | }
Check: CKV_GCP_114: "Ensure public access prevention is enforced on Cloud Storage bucket"
FAILED for resource: module.data-platform.module.drop-cs-0.google_storage_bucket.bucket
File: /modules/gcs/main.tf:22-100
Calling File: /blueprints/data-solutions/data-platform-foundations/01-dropoff.tf:86-99
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_GCP_78: "Ensure Cloud storage has versioning enabled"
FAILED for resource: module.data-platform.module.drop-cs-0.google_storage_bucket.bucket
File: /modules/gcs/main.tf:22-100
Calling File: /blueprints/data-solutions/data-platform-foundations/01-dropoff.tf:86-99
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-cloud-storage-has-versioning-enabled.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_GCP_83: "Ensure PubSub Topics are encrypted with Customer Supplied Encryption Keys (CSEK)"
FAILED for resource: module.data-platform.module.drop-cs-0.google_pubsub_topic.topic
File: /modules/gcs/main.tf:147-151
Calling File: /blueprints/data-solutions/data-platform-foundations/01-dropoff.tf:86-99
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-pubsub-topics-are-encrypted-with-customer-supplied-encryption-keys-csek.html
147 | resource "google_pubsub_topic" "topic" {
148 | count = local.notification ? 1 : 0
149 | project = var.project_id
150 | name = var.notification_config.topic_name
151 | }
Check: CKV_GCP_114: "Ensure public access prevention is enforced on Cloud Storage bucket"
FAILED for resource: module.data-platform.module.load-cs-df-0.google_storage_bucket.bucket
File: /modules/gcs/main.tf:22-100
Calling File: /blueprints/data-solutions/data-platform-foundations/02-load.tf:93-102
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_GCP_78: "Ensure Cloud storage has versioning enabled"
FAILED for resource: module.data-platform.module.load-cs-df-0.google_storage_bucket.bucket
File: /modules/gcs/main.tf:22-100
Calling File: /blueprints/data-solutions/data-platform-foundations/02-load.tf:93-102
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-cloud-storage-has-versioning-enabled.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_GCP_83: "Ensure PubSub Topics are encrypted with Customer Supplied Encryption Keys (CSEK)"
FAILED for resource: module.data-platform.module.load-cs-df-0.google_pubsub_topic.topic
File: /modules/gcs/main.tf:147-151
Calling File: /blueprints/data-solutions/data-platform-foundations/02-load.tf:93-102
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-pubsub-topics-are-encrypted-with-customer-supplied-encryption-keys-csek.html
147 | resource "google_pubsub_topic" "topic" {
148 | count = local.notification ? 1 : 0
149 | project = var.project_id
150 | name = var.notification_config.topic_name
151 | }
Check: CKV_GCP_114: "Ensure public access prevention is enforced on Cloud Storage bucket"
FAILED for resource: module.data-platform.module.orch-cs-0.google_storage_bucket.bucket
File: /modules/gcs/main.tf:22-100
Calling File: /blueprints/data-solutions/data-platform-foundations/03-orchestration.tf:104-113
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_GCP_78: "Ensure Cloud storage has versioning enabled"
FAILED for resource: module.data-platform.module.orch-cs-0.google_storage_bucket.bucket
File: /modules/gcs/main.tf:22-100
Calling File: /blueprints/data-solutions/data-platform-foundations/03-orchestration.tf:104-113
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-cloud-storage-has-versioning-enabled.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_GCP_83: "Ensure PubSub Topics are encrypted with Customer Supplied Encryption Keys (CSEK)"
FAILED for resource: module.data-platform.module.orch-cs-0.google_pubsub_topic.topic
File: /modules/gcs/main.tf:147-151
Calling File: /blueprints/data-solutions/data-platform-foundations/03-orchestration.tf:104-113
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-pubsub-topics-are-encrypted-with-customer-supplied-encryption-keys-csek.html
147 | resource "google_pubsub_topic" "topic" {
148 | count = local.notification ? 1 : 0
149 | project = var.project_id
150 | name = var.notification_config.topic_name
151 | }
Check: CKV_GCP_114: "Ensure public access prevention is enforced on Cloud Storage bucket"
FAILED for resource: module.data-platform.module.orch-cs-build-staging.google_storage_bucket.bucket
File: /modules/gcs/main.tf:22-100
Calling File: /blueprints/data-solutions/data-platform-foundations/03-orchestration.tf:171-180
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_GCP_78: "Ensure Cloud storage has versioning enabled"
FAILED for resource: module.data-platform.module.orch-cs-build-staging.google_storage_bucket.bucket
File: /modules/gcs/main.tf:22-100
Calling File: /blueprints/data-solutions/data-platform-foundations/03-orchestration.tf:171-180
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-cloud-storage-has-versioning-enabled.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_GCP_83: "Ensure PubSub Topics are encrypted with Customer Supplied Encryption Keys (CSEK)"
FAILED for resource: module.data-platform.module.orch-cs-build-staging.google_pubsub_topic.topic
File: /modules/gcs/main.tf:147-151
Calling File: /blueprints/data-solutions/data-platform-foundations/03-orchestration.tf:171-180
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-pubsub-topics-are-encrypted-with-customer-supplied-encryption-keys-csek.html
147 | resource "google_pubsub_topic" "topic" {
148 | count = local.notification ? 1 : 0
149 | project = var.project_id
150 | name = var.notification_config.topic_name
151 | }
Check: CKV_GCP_114: "Ensure public access prevention is enforced on Cloud Storage bucket"
FAILED for resource: module.data-platform.module.orch-cs-df-template.google_storage_bucket.bucket
File: /modules/gcs/main.tf:22-100
Calling File: /blueprints/data-solutions/data-platform-foundations/03-orchestration.tf:160-169
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_GCP_78: "Ensure Cloud storage has versioning enabled"
FAILED for resource: module.data-platform.module.orch-cs-df-template.google_storage_bucket.bucket
File: /modules/gcs/main.tf:22-100
Calling File: /blueprints/data-solutions/data-platform-foundations/03-orchestration.tf:160-169
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-cloud-storage-has-versioning-enabled.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_GCP_83: "Ensure PubSub Topics are encrypted with Customer Supplied Encryption Keys (CSEK)"
FAILED for resource: module.data-platform.module.orch-cs-df-template.google_pubsub_topic.topic
File: /modules/gcs/main.tf:147-151
Calling File: /blueprints/data-solutions/data-platform-foundations/03-orchestration.tf:160-169
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-pubsub-topics-are-encrypted-with-customer-supplied-encryption-keys-csek.html
147 | resource "google_pubsub_topic" "topic" {
148 | count = local.notification ? 1 : 0
149 | project = var.project_id
150 | name = var.notification_config.topic_name
151 | }
Check: CKV_GCP_114: "Ensure public access prevention is enforced on Cloud Storage bucket"
FAILED for resource: module.data-platform.module.transf-cs-df-0.google_storage_bucket.bucket
File: /modules/gcs/main.tf:22-100
Calling File: /blueprints/data-solutions/data-platform-foundations/04-transformation.tf:92-101
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_GCP_78: "Ensure Cloud storage has versioning enabled"
FAILED for resource: module.data-platform.module.transf-cs-df-0.google_storage_bucket.bucket
File: /modules/gcs/main.tf:22-100
Calling File: /blueprints/data-solutions/data-platform-foundations/04-transformation.tf:92-101
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-cloud-storage-has-versioning-enabled.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_GCP_83: "Ensure PubSub Topics are encrypted with Customer Supplied Encryption Keys (CSEK)"
FAILED for resource: module.data-platform.module.transf-cs-df-0.google_pubsub_topic.topic
File: /modules/gcs/main.tf:147-151
Calling File: /blueprints/data-solutions/data-platform-foundations/04-transformation.tf:92-101
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-pubsub-topics-are-encrypted-with-customer-supplied-encryption-keys-csek.html
147 | resource "google_pubsub_topic" "topic" {
148 | count = local.notification ? 1 : 0
149 | project = var.project_id
150 | name = var.notification_config.topic_name
151 | }
Check: CKV_GCP_114: "Ensure public access prevention is enforced on Cloud Storage bucket"
FAILED for resource: module.data-platform.module.dwh-conf-cs-0.google_storage_bucket.bucket
File: /modules/gcs/main.tf:22-100
Calling File: /blueprints/data-solutions/data-platform-foundations/05-datawarehouse.tf:173-182
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_GCP_78: "Ensure Cloud storage has versioning enabled"
FAILED for resource: module.data-platform.module.dwh-conf-cs-0.google_storage_bucket.bucket
File: /modules/gcs/main.tf:22-100
Calling File: /blueprints/data-solutions/data-platform-foundations/05-datawarehouse.tf:173-182
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-cloud-storage-has-versioning-enabled.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_GCP_83: "Ensure PubSub Topics are encrypted with Customer Supplied Encryption Keys (CSEK)"
FAILED for resource: module.data-platform.module.dwh-conf-cs-0.google_pubsub_topic.topic
File: /modules/gcs/main.tf:147-151
Calling File: /blueprints/data-solutions/data-platform-foundations/05-datawarehouse.tf:173-182
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-pubsub-topics-are-encrypted-with-customer-supplied-encryption-keys-csek.html
147 | resource "google_pubsub_topic" "topic" {
148 | count = local.notification ? 1 : 0
149 | project = var.project_id
150 | name = var.notification_config.topic_name
151 | }
Check: CKV_GCP_114: "Ensure public access prevention is enforced on Cloud Storage bucket"
FAILED for resource: module.data-platform.module.dwh-cur-cs-0.google_storage_bucket.bucket
File: /modules/gcs/main.tf:22-100
Calling File: /blueprints/data-solutions/data-platform-foundations/05-datawarehouse.tf:162-171
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_GCP_78: "Ensure Cloud storage has versioning enabled"
FAILED for resource: module.data-platform.module.dwh-cur-cs-0.google_storage_bucket.bucket
File: /modules/gcs/main.tf:22-100
Calling File: /blueprints/data-solutions/data-platform-foundations/05-datawarehouse.tf:162-171
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-cloud-storage-has-versioning-enabled.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_GCP_83: "Ensure PubSub Topics are encrypted with Customer Supplied Encryption Keys (CSEK)"
FAILED for resource: module.data-platform.module.dwh-cur-cs-0.google_pubsub_topic.topic
File: /modules/gcs/main.tf:147-151
Calling File: /blueprints/data-solutions/data-platform-foundations/05-datawarehouse.tf:162-171
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-pubsub-topics-are-encrypted-with-customer-supplied-encryption-keys-csek.html
147 | resource "google_pubsub_topic" "topic" {
148 | count = local.notification ? 1 : 0
149 | project = var.project_id
150 | name = var.notification_config.topic_name
151 | }
Check: CKV_GCP_114: "Ensure public access prevention is enforced on Cloud Storage bucket"
FAILED for resource: module.data-platform.module.dwh-lnd-cs-0.google_storage_bucket.bucket
File: /modules/gcs/main.tf:22-100
Calling File: /blueprints/data-solutions/data-platform-foundations/05-datawarehouse.tf:151-160
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_GCP_78: "Ensure Cloud storage has versioning enabled"
FAILED for resource: module.data-platform.module.dwh-lnd-cs-0.google_storage_bucket.bucket
File: /modules/gcs/main.tf:22-100
Calling File: /blueprints/data-solutions/data-platform-foundations/05-datawarehouse.tf:151-160
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-cloud-storage-has-versioning-enabled.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_GCP_83: "Ensure PubSub Topics are encrypted with Customer Supplied Encryption Keys (CSEK)"
FAILED for resource: module.data-platform.module.dwh-lnd-cs-0.google_pubsub_topic.topic
File: /modules/gcs/main.tf:147-151
Calling File: /blueprints/data-solutions/data-platform-foundations/05-datawarehouse.tf:151-160
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-pubsub-topics-are-encrypted-with-customer-supplied-encryption-keys-csek.html
147 | resource "google_pubsub_topic" "topic" {
148 | count = local.notification ? 1 : 0
149 | project = var.project_id
150 | name = var.notification_config.topic_name
151 | }
Check: CKV_GCP_114: "Ensure public access prevention is enforced on Cloud Storage bucket"
FAILED for resource: module.land-cs-0.google_storage_bucket.bucket
File: /modules/gcs/main.tf:22-100
Calling File: /blueprints/data-solutions/data-platform-minimal/01-landing.tf:95-104
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_GCP_78: "Ensure Cloud storage has versioning enabled"
FAILED for resource: module.land-cs-0.google_storage_bucket.bucket
File: /modules/gcs/main.tf:22-100
Calling File: /blueprints/data-solutions/data-platform-minimal/01-landing.tf:95-104
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-cloud-storage-has-versioning-enabled.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_GCP_83: "Ensure PubSub Topics are encrypted with Customer Supplied Encryption Keys (CSEK)"
FAILED for resource: module.land-cs-0.google_pubsub_topic.topic
File: /modules/gcs/main.tf:147-151
Calling File: /blueprints/data-solutions/data-platform-minimal/01-landing.tf:95-104
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-pubsub-topics-are-encrypted-with-customer-supplied-encryption-keys-csek.html
147 | resource "google_pubsub_topic" "topic" {
148 | count = local.notification ? 1 : 0
149 | project = var.project_id
150 | name = var.notification_config.topic_name
151 | }
Check: CKV_GCP_114: "Ensure public access prevention is enforced on Cloud Storage bucket"
FAILED for resource: module.processing-dp-history.google_storage_bucket.bucket
File: /modules/gcs/main.tf:22-100
Calling File: /blueprints/data-solutions/data-platform-minimal/02-dataproc.tf:17-27
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_GCP_78: "Ensure Cloud storage has versioning enabled"
FAILED for resource: module.processing-dp-history.google_storage_bucket.bucket
File: /modules/gcs/main.tf:22-100
Calling File: /blueprints/data-solutions/data-platform-minimal/02-dataproc.tf:17-27
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-cloud-storage-has-versioning-enabled.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_GCP_83: "Ensure PubSub Topics are encrypted with Customer Supplied Encryption Keys (CSEK)"
FAILED for resource: module.processing-dp-history.google_pubsub_topic.topic
File: /modules/gcs/main.tf:147-151
Calling File: /blueprints/data-solutions/data-platform-minimal/02-dataproc.tf:17-27
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-pubsub-topics-are-encrypted-with-customer-supplied-encryption-keys-csek.html
147 | resource "google_pubsub_topic" "topic" {
148 | count = local.notification ? 1 : 0
149 | project = var.project_id
150 | name = var.notification_config.topic_name
151 | }
Check: CKV_GCP_114: "Ensure public access prevention is enforced on Cloud Storage bucket"
FAILED for resource: module.processing-log-0.google_storage_bucket.bucket
File: /modules/gcs/main.tf:22-100
Calling File: /blueprints/data-solutions/data-platform-minimal/02-dataproc.tf:68-77
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_GCP_78: "Ensure Cloud storage has versioning enabled"
FAILED for resource: module.processing-log-0.google_storage_bucket.bucket
File: /modules/gcs/main.tf:22-100
Calling File: /blueprints/data-solutions/data-platform-minimal/02-dataproc.tf:68-77
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-cloud-storage-has-versioning-enabled.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_GCP_83: "Ensure PubSub Topics are encrypted with Customer Supplied Encryption Keys (CSEK)"
FAILED for resource: module.processing-log-0.google_pubsub_topic.topic
File: /modules/gcs/main.tf:147-151
Calling File: /blueprints/data-solutions/data-platform-minimal/02-dataproc.tf:68-77
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-pubsub-topics-are-encrypted-with-customer-supplied-encryption-keys-csek.html
147 | resource "google_pubsub_topic" "topic" {
148 | count = local.notification ? 1 : 0
149 | project = var.project_id
150 | name = var.notification_config.topic_name
151 | }
Check: CKV_GCP_114: "Ensure public access prevention is enforced on Cloud Storage bucket"
FAILED for resource: module.processing-staging-0.google_storage_bucket.bucket
File: /modules/gcs/main.tf:22-100
Calling File: /blueprints/data-solutions/data-platform-minimal/02-dataproc.tf:46-55
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_GCP_78: "Ensure Cloud storage has versioning enabled"
FAILED for resource: module.processing-staging-0.google_storage_bucket.bucket
File: /modules/gcs/main.tf:22-100
Calling File: /blueprints/data-solutions/data-platform-minimal/02-dataproc.tf:46-55
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-cloud-storage-has-versioning-enabled.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_GCP_83: "Ensure PubSub Topics are encrypted with Customer Supplied Encryption Keys (CSEK)"
FAILED for resource: module.processing-staging-0.google_pubsub_topic.topic
File: /modules/gcs/main.tf:147-151
Calling File: /blueprints/data-solutions/data-platform-minimal/02-dataproc.tf:46-55
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-pubsub-topics-are-encrypted-with-customer-supplied-encryption-keys-csek.html
147 | resource "google_pubsub_topic" "topic" {
148 | count = local.notification ? 1 : 0
149 | project = var.project_id
150 | name = var.notification_config.topic_name
151 | }
Check: CKV_GCP_114: "Ensure public access prevention is enforced on Cloud Storage bucket"
FAILED for resource: module.processing-temp-0.google_storage_bucket.bucket
File: /modules/gcs/main.tf:22-100
Calling File: /blueprints/data-solutions/data-platform-minimal/02-dataproc.tf:57-66
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_GCP_78: "Ensure Cloud storage has versioning enabled"
FAILED for resource: module.processing-temp-0.google_storage_bucket.bucket
File: /modules/gcs/main.tf:22-100
Calling File: /blueprints/data-solutions/data-platform-minimal/02-dataproc.tf:57-66
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-cloud-storage-has-versioning-enabled.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_GCP_83: "Ensure PubSub Topics are encrypted with Customer Supplied Encryption Keys (CSEK)"
FAILED for resource: module.processing-temp-0.google_pubsub_topic.topic
File: /modules/gcs/main.tf:147-151
Calling File: /blueprints/data-solutions/data-platform-minimal/02-dataproc.tf:57-66
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-pubsub-topics-are-encrypted-with-customer-supplied-encryption-keys-csek.html
147 | resource "google_pubsub_topic" "topic" {
148 | count = local.notification ? 1 : 0
149 | project = var.project_id
150 | name = var.notification_config.topic_name
151 | }
Check: CKV_GCP_114: "Ensure public access prevention is enforced on Cloud Storage bucket"
FAILED for resource: module.processing-cs-0.google_storage_bucket.bucket
File: /modules/gcs/main.tf:22-100
Calling File: /blueprints/data-solutions/data-platform-minimal/02-processing.tf:152-161
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_GCP_78: "Ensure Cloud storage has versioning enabled"
FAILED for resource: module.processing-cs-0.google_storage_bucket.bucket
File: /modules/gcs/main.tf:22-100
Calling File: /blueprints/data-solutions/data-platform-minimal/02-processing.tf:152-161
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-cloud-storage-has-versioning-enabled.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_GCP_83: "Ensure PubSub Topics are encrypted with Customer Supplied Encryption Keys (CSEK)"
FAILED for resource: module.processing-cs-0.google_pubsub_topic.topic
File: /modules/gcs/main.tf:147-151
Calling File: /blueprints/data-solutions/data-platform-minimal/02-processing.tf:152-161
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-pubsub-topics-are-encrypted-with-customer-supplied-encryption-keys-csek.html
147 | resource "google_pubsub_topic" "topic" {
148 | count = local.notification ? 1 : 0
149 | project = var.project_id
150 | name = var.notification_config.topic_name
151 | }
Check: CKV_GCP_114: "Ensure public access prevention is enforced on Cloud Storage bucket"
FAILED for resource: module.cur-cs-0.google_storage_bucket.bucket
File: /modules/gcs/main.tf:22-100
Calling File: /blueprints/data-solutions/data-platform-minimal/03-curated.tf:134-143
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_GCP_78: "Ensure Cloud storage has versioning enabled"
FAILED for resource: module.cur-cs-0.google_storage_bucket.bucket
File: /modules/gcs/main.tf:22-100
Calling File: /blueprints/data-solutions/data-platform-minimal/03-curated.tf:134-143
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-cloud-storage-has-versioning-enabled.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_GCP_83: "Ensure PubSub Topics are encrypted with Customer Supplied Encryption Keys (CSEK)"
FAILED for resource: module.cur-cs-0.google_pubsub_topic.topic
File: /modules/gcs/main.tf:147-151
Calling File: /blueprints/data-solutions/data-platform-minimal/03-curated.tf:134-143
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-pubsub-topics-are-encrypted-with-customer-supplied-encryption-keys-csek.html
147 | resource "google_pubsub_topic" "topic" {
148 | count = local.notification ? 1 : 0
149 | project = var.project_id
150 | name = var.notification_config.topic_name
151 | }
Check: CKV_GCP_114: "Ensure public access prevention is enforced on Cloud Storage bucket"
FAILED for resource: module.gcs-data.google_storage_bucket.bucket
File: /modules/gcs/main.tf:22-100
Calling File: /blueprints/data-solutions/gcs-to-bq-with-least-privileges/datastorage.tf:15-24
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_GCP_78: "Ensure Cloud storage has versioning enabled"
FAILED for resource: module.gcs-data.google_storage_bucket.bucket
File: /modules/gcs/main.tf:22-100
Calling File: /blueprints/data-solutions/gcs-to-bq-with-least-privileges/datastorage.tf:15-24
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-cloud-storage-has-versioning-enabled.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_GCP_83: "Ensure PubSub Topics are encrypted with Customer Supplied Encryption Keys (CSEK)"
FAILED for resource: module.gcs-data.google_pubsub_topic.topic
File: /modules/gcs/main.tf:147-151
Calling File: /blueprints/data-solutions/gcs-to-bq-with-least-privileges/datastorage.tf:15-24
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-pubsub-topics-are-encrypted-with-customer-supplied-encryption-keys-csek.html
147 | resource "google_pubsub_topic" "topic" {
148 | count = local.notification ? 1 : 0
149 | project = var.project_id
150 | name = var.notification_config.topic_name
151 | }
Check: CKV_GCP_114: "Ensure public access prevention is enforced on Cloud Storage bucket"
FAILED for resource: module.gcs-df-tmp.google_storage_bucket.bucket
File: /modules/gcs/main.tf:22-100
Calling File: /blueprints/data-solutions/gcs-to-bq-with-least-privileges/datastorage.tf:26-35
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_GCP_78: "Ensure Cloud storage has versioning enabled"
FAILED for resource: module.gcs-df-tmp.google_storage_bucket.bucket
File: /modules/gcs/main.tf:22-100
Calling File: /blueprints/data-solutions/gcs-to-bq-with-least-privileges/datastorage.tf:26-35
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-cloud-storage-has-versioning-enabled.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_GCP_83: "Ensure PubSub Topics are encrypted with Customer Supplied Encryption Keys (CSEK)"
FAILED for resource: module.gcs-df-tmp.google_pubsub_topic.topic
File: /modules/gcs/main.tf:147-151
Calling File: /blueprints/data-solutions/gcs-to-bq-with-least-privileges/datastorage.tf:26-35
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-pubsub-topics-are-encrypted-with-customer-supplied-encryption-keys-csek.html
147 | resource "google_pubsub_topic" "topic" {
148 | count = local.notification ? 1 : 0
149 | project = var.project_id
150 | name = var.notification_config.topic_name
151 | }
Check: CKV_GCP_114: "Ensure public access prevention is enforced on Cloud Storage bucket"
FAILED for resource: module.gcs-bucket-cloudbuild.google_storage_bucket.bucket
File: /modules/gcs/main.tf:22-100
Calling File: /blueprints/data-solutions/vertex-mlops/main.tf:117-126
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_GCP_83: "Ensure PubSub Topics are encrypted with Customer Supplied Encryption Keys (CSEK)"
FAILED for resource: module.gcs-bucket-cloudbuild.google_pubsub_topic.topic
File: /modules/gcs/main.tf:147-151
Calling File: /blueprints/data-solutions/vertex-mlops/main.tf:117-126
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-pubsub-topics-are-encrypted-with-customer-supplied-encryption-keys-csek.html
147 | resource "google_pubsub_topic" "topic" {
148 | count = local.notification ? 1 : 0
149 | project = var.project_id
150 | name = var.notification_config.topic_name
151 | }
Check: CKV_GCP_114: "Ensure public access prevention is enforced on Cloud Storage bucket"
FAILED for resource: module.automation-tf-output-gcs.google_storage_bucket.bucket
File: /modules/gcs/main.tf:22-100
Calling File: /fast/stages/0-bootstrap/automation.tf:93-102
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_GCP_83: "Ensure PubSub Topics are encrypted with Customer Supplied Encryption Keys (CSEK)"
FAILED for resource: module.automation-tf-output-gcs.google_pubsub_topic.topic
File: /modules/gcs/main.tf:147-151
Calling File: /fast/stages/0-bootstrap/automation.tf:93-102
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-pubsub-topics-are-encrypted-with-customer-supplied-encryption-keys-csek.html
147 | resource "google_pubsub_topic" "topic" {
148 | count = local.notification ? 1 : 0
149 | project = var.project_id
150 | name = var.notification_config.topic_name
151 | }
Check: CKV_GCP_114: "Ensure public access prevention is enforced on Cloud Storage bucket"
FAILED for resource: module.automation-tf-resman-gcs.google_storage_bucket.bucket
File: /modules/gcs/main.tf:22-100
Calling File: /fast/stages/0-bootstrap/automation.tf:136-148
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_GCP_83: "Ensure PubSub Topics are encrypted with Customer Supplied Encryption Keys (CSEK)"
FAILED for resource: module.automation-tf-resman-gcs.google_pubsub_topic.topic
File: /modules/gcs/main.tf:147-151
Calling File: /fast/stages/0-bootstrap/automation.tf:136-148
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-pubsub-topics-are-encrypted-with-customer-supplied-encryption-keys-csek.html
147 | resource "google_pubsub_topic" "topic" {
148 | count = local.notification ? 1 : 0
149 | project = var.project_id
150 | name = var.notification_config.topic_name
151 | }
Check: CKV_GCP_114: "Ensure public access prevention is enforced on Cloud Storage bucket"
FAILED for resource: module.log-export-gcs.google_storage_bucket.bucket
File: /modules/gcs/main.tf:22-100
Calling File: /fast/stages/0-bootstrap/log-export.tf:65-73
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_GCP_78: "Ensure Cloud storage has versioning enabled"
FAILED for resource: module.log-export-gcs.google_storage_bucket.bucket
File: /modules/gcs/main.tf:22-100
Calling File: /fast/stages/0-bootstrap/log-export.tf:65-73
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-cloud-storage-has-versioning-enabled.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_GCP_83: "Ensure PubSub Topics are encrypted with Customer Supplied Encryption Keys (CSEK)"
FAILED for resource: module.log-export-gcs.google_pubsub_topic.topic
File: /modules/gcs/main.tf:147-151
Calling File: /fast/stages/0-bootstrap/log-export.tf:65-73
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-pubsub-topics-are-encrypted-with-customer-supplied-encryption-keys-csek.html
147 | resource "google_pubsub_topic" "topic" {
148 | count = local.notification ? 1 : 0
149 | project = var.project_id
150 | name = var.notification_config.topic_name
151 | }
Check: CKV_GCP_114: "Ensure public access prevention is enforced on Cloud Storage bucket"
FAILED for resource: module.branch-dp-dev-gcs.google_storage_bucket.bucket
File: /modules/gcs/main.tf:22-100
Calling File: /fast/stages/1-resman/branch-data-platform.tf:113-125
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_GCP_83: "Ensure PubSub Topics are encrypted with Customer Supplied Encryption Keys (CSEK)"
FAILED for resource: module.branch-dp-dev-gcs.google_pubsub_topic.topic
File: /modules/gcs/main.tf:147-151
Calling File: /fast/stages/1-resman/branch-data-platform.tf:113-125
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-pubsub-topics-are-encrypted-with-customer-supplied-encryption-keys-csek.html
147 | resource "google_pubsub_topic" "topic" {
148 | count = local.notification ? 1 : 0
149 | project = var.project_id
150 | name = var.notification_config.topic_name
151 | }
Check: CKV_GCP_114: "Ensure public access prevention is enforced on Cloud Storage bucket"
FAILED for resource: module.branch-dp-prod-gcs.google_storage_bucket.bucket
File: /modules/gcs/main.tf:22-100
Calling File: /fast/stages/1-resman/branch-data-platform.tf:127-139
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_GCP_83: "Ensure PubSub Topics are encrypted with Customer Supplied Encryption Keys (CSEK)"
FAILED for resource: module.branch-dp-prod-gcs.google_pubsub_topic.topic
File: /modules/gcs/main.tf:147-151
Calling File: /fast/stages/1-resman/branch-data-platform.tf:127-139
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-pubsub-topics-are-encrypted-with-customer-supplied-encryption-keys-csek.html
147 | resource "google_pubsub_topic" "topic" {
148 | count = local.notification ? 1 : 0
149 | project = var.project_id
150 | name = var.notification_config.topic_name
151 | }
Check: CKV_GCP_114: "Ensure public access prevention is enforced on Cloud Storage bucket"
FAILED for resource: module.branch-gke-dev-gcs.google_storage_bucket.bucket
File: /modules/gcs/main.tf:22-100
Calling File: /fast/stages/1-resman/branch-gke.tf:119-131
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_GCP_83: "Ensure PubSub Topics are encrypted with Customer Supplied Encryption Keys (CSEK)"
FAILED for resource: module.branch-gke-dev-gcs.google_pubsub_topic.topic
File: /modules/gcs/main.tf:147-151
Calling File: /fast/stages/1-resman/branch-gke.tf:119-131
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-pubsub-topics-are-encrypted-with-customer-supplied-encryption-keys-csek.html
147 | resource "google_pubsub_topic" "topic" {
148 | count = local.notification ? 1 : 0
149 | project = var.project_id
150 | name = var.notification_config.topic_name
151 | }
Check: CKV_GCP_114: "Ensure public access prevention is enforced on Cloud Storage bucket"
FAILED for resource: module.branch-gke-prod-gcs.google_storage_bucket.bucket
File: /modules/gcs/main.tf:22-100
Calling File: /fast/stages/1-resman/branch-gke.tf:133-145
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_GCP_83: "Ensure PubSub Topics are encrypted with Customer Supplied Encryption Keys (CSEK)"
FAILED for resource: module.branch-gke-prod-gcs.google_pubsub_topic.topic
File: /modules/gcs/main.tf:147-151
Calling File: /fast/stages/1-resman/branch-gke.tf:133-145
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-pubsub-topics-are-encrypted-with-customer-supplied-encryption-keys-csek.html
147 | resource "google_pubsub_topic" "topic" {
148 | count = local.notification ? 1 : 0
149 | project = var.project_id
150 | name = var.notification_config.topic_name
151 | }
Check: CKV_GCP_114: "Ensure public access prevention is enforced on Cloud Storage bucket"
FAILED for resource: module.branch-network-gcs.google_storage_bucket.bucket
File: /modules/gcs/main.tf:22-100
Calling File: /fast/stages/1-resman/branch-networking.tf:104-115
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_GCP_83: "Ensure PubSub Topics are encrypted with Customer Supplied Encryption Keys (CSEK)"
FAILED for resource: module.branch-network-gcs.google_pubsub_topic.topic
File: /modules/gcs/main.tf:147-151
Calling File: /fast/stages/1-resman/branch-networking.tf:104-115
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-pubsub-topics-are-encrypted-with-customer-supplied-encryption-keys-csek.html
147 | resource "google_pubsub_topic" "topic" {
148 | count = local.notification ? 1 : 0
149 | project = var.project_id
150 | name = var.notification_config.topic_name
151 | }
Check: CKV_GCP_114: "Ensure public access prevention is enforced on Cloud Storage bucket"
FAILED for resource: module.branch-pf-dev-gcs.google_storage_bucket.bucket
File: /modules/gcs/main.tf:22-100
Calling File: /fast/stages/1-resman/branch-project-factory.tf:55-67
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_GCP_83: "Ensure PubSub Topics are encrypted with Customer Supplied Encryption Keys (CSEK)"
FAILED for resource: module.branch-pf-dev-gcs.google_pubsub_topic.topic
File: /modules/gcs/main.tf:147-151
Calling File: /fast/stages/1-resman/branch-project-factory.tf:55-67
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-pubsub-topics-are-encrypted-with-customer-supplied-encryption-keys-csek.html
147 | resource "google_pubsub_topic" "topic" {
148 | count = local.notification ? 1 : 0
149 | project = var.project_id
150 | name = var.notification_config.topic_name
151 | }
Check: CKV_GCP_114: "Ensure public access prevention is enforced on Cloud Storage bucket"
FAILED for resource: module.branch-pf-prod-gcs.google_storage_bucket.bucket
File: /modules/gcs/main.tf:22-100
Calling File: /fast/stages/1-resman/branch-project-factory.tf:69-81
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_GCP_83: "Ensure PubSub Topics are encrypted with Customer Supplied Encryption Keys (CSEK)"
FAILED for resource: module.branch-pf-prod-gcs.google_pubsub_topic.topic
File: /modules/gcs/main.tf:147-151
Calling File: /fast/stages/1-resman/branch-project-factory.tf:69-81
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-pubsub-topics-are-encrypted-with-customer-supplied-encryption-keys-csek.html
147 | resource "google_pubsub_topic" "topic" {
148 | count = local.notification ? 1 : 0
149 | project = var.project_id
150 | name = var.notification_config.topic_name
151 | }
Check: CKV_GCP_114: "Ensure public access prevention is enforced on Cloud Storage bucket"
FAILED for resource: module.branch-sandbox-gcs.google_storage_bucket.bucket
File: /modules/gcs/main.tf:22-100
Calling File: /fast/stages/1-resman/branch-sandbox.tf:41-53
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_GCP_83: "Ensure PubSub Topics are encrypted with Customer Supplied Encryption Keys (CSEK)"
FAILED for resource: module.branch-sandbox-gcs.google_pubsub_topic.topic
File: /modules/gcs/main.tf:147-151
Calling File: /fast/stages/1-resman/branch-sandbox.tf:41-53
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-pubsub-topics-are-encrypted-with-customer-supplied-encryption-keys-csek.html
147 | resource "google_pubsub_topic" "topic" {
148 | count = local.notification ? 1 : 0
149 | project = var.project_id
150 | name = var.notification_config.topic_name
151 | }
Check: CKV_GCP_114: "Ensure public access prevention is enforced on Cloud Storage bucket"
FAILED for resource: module.branch-security-gcs.google_storage_bucket.bucket
File: /modules/gcs/main.tf:22-100
Calling File: /fast/stages/1-resman/branch-security.tf:72-83
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_GCP_83: "Ensure PubSub Topics are encrypted with Customer Supplied Encryption Keys (CSEK)"
FAILED for resource: module.branch-security-gcs.google_pubsub_topic.topic
File: /modules/gcs/main.tf:147-151
Calling File: /fast/stages/1-resman/branch-security.tf:72-83
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-pubsub-topics-are-encrypted-with-customer-supplied-encryption-keys-csek.html
147 | resource "google_pubsub_topic" "topic" {
148 | count = local.notification ? 1 : 0
149 | project = var.project_id
150 | name = var.notification_config.topic_name
151 | }
Check: CKV_GCP_114: "Ensure public access prevention is enforced on Cloud Storage bucket"
FAILED for resource: module.branch-teams-gcs.google_storage_bucket.bucket
File: /modules/gcs/main.tf:22-100
Calling File: /fast/stages/1-resman/branch-teams.tf:54-66
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_GCP_83: "Ensure PubSub Topics are encrypted with Customer Supplied Encryption Keys (CSEK)"
FAILED for resource: module.branch-teams-gcs.google_pubsub_topic.topic
File: /modules/gcs/main.tf:147-151
Calling File: /fast/stages/1-resman/branch-teams.tf:54-66
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-pubsub-topics-are-encrypted-with-customer-supplied-encryption-keys-csek.html
147 | resource "google_pubsub_topic" "topic" {
148 | count = local.notification ? 1 : 0
149 | project = var.project_id
150 | name = var.notification_config.topic_name
151 | }
Check: CKV_GCP_114: "Ensure public access prevention is enforced on Cloud Storage bucket"
FAILED for resource: module.branch-teams-team-gcs.google_storage_bucket.bucket
File: /modules/gcs/main.tf:22-100
Calling File: /fast/stages/1-resman/branch-teams.tf:104-116
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_GCP_83: "Ensure PubSub Topics are encrypted with Customer Supplied Encryption Keys (CSEK)"
FAILED for resource: module.branch-teams-team-gcs.google_pubsub_topic.topic
File: /modules/gcs/main.tf:147-151
Calling File: /fast/stages/1-resman/branch-teams.tf:104-116
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-pubsub-topics-are-encrypted-with-customer-supplied-encryption-keys-csek.html
147 | resource "google_pubsub_topic" "topic" {
148 | count = local.notification ? 1 : 0
149 | project = var.project_id
150 | name = var.notification_config.topic_name
151 | }
Check: CKV_GCP_114: "Ensure public access prevention is enforced on Cloud Storage bucket"
FAILED for resource: module.automation-tf-bootstrap-gcs.google_storage_bucket.bucket
File: /modules/gcs/main.tf:22-100
Calling File: /fast/stages/0-bootstrap/automation.tf:106-115
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_GCP_83: "Ensure PubSub Topics are encrypted with Customer Supplied Encryption Keys (CSEK)"
FAILED for resource: module.automation-tf-bootstrap-gcs.google_pubsub_topic.topic
File: /modules/gcs/main.tf:147-151
Calling File: /fast/stages/0-bootstrap/automation.tf:106-115
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-pubsub-topics-are-encrypted-with-customer-supplied-encryption-keys-csek.html
147 | resource "google_pubsub_topic" "topic" {
148 | count = local.notification ? 1 : 0
149 | project = var.project_id
150 | name = var.notification_config.topic_name
151 | }
Check: CKV_GCP_114: "Ensure public access prevention is enforced on Cloud Storage bucket"
FAILED for resource: module.tenant-core-gcs.google_storage_bucket.bucket
File: /modules/gcs/main.tf:22-100
Calling File: /fast/stages/1-resman/branch-tenants.tf:140-152
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_GCP_83: "Ensure PubSub Topics are encrypted with Customer Supplied Encryption Keys (CSEK)"
FAILED for resource: module.tenant-core-gcs.google_pubsub_topic.topic
File: /modules/gcs/main.tf:147-151
Calling File: /fast/stages/1-resman/branch-tenants.tf:140-152
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-pubsub-topics-are-encrypted-with-customer-supplied-encryption-keys-csek.html
147 | resource "google_pubsub_topic" "topic" {
148 | count = local.notification ? 1 : 0
149 | project = var.project_id
150 | name = var.notification_config.topic_name
151 | }
Check: CKV_GCP_114: "Ensure public access prevention is enforced on Cloud Storage bucket"
FAILED for resource: module.tenant-self-iac-gcs-outputs.google_storage_bucket.bucket
File: /modules/gcs/main.tf:22-100
Calling File: /fast/stages/1-resman/branch-tenants.tf:202-214
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_GCP_83: "Ensure PubSub Topics are encrypted with Customer Supplied Encryption Keys (CSEK)"
FAILED for resource: module.tenant-self-iac-gcs-outputs.google_pubsub_topic.topic
File: /modules/gcs/main.tf:147-151
Calling File: /fast/stages/1-resman/branch-tenants.tf:202-214
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-pubsub-topics-are-encrypted-with-customer-supplied-encryption-keys-csek.html
147 | resource "google_pubsub_topic" "topic" {
148 | count = local.notification ? 1 : 0
149 | project = var.project_id
150 | name = var.notification_config.topic_name
151 | }
Check: CKV_GCP_114: "Ensure public access prevention is enforced on Cloud Storage bucket"
FAILED for resource: module.tenant-self-iac-gcs-state.google_storage_bucket.bucket
File: /modules/gcs/main.tf:22-100
Calling File: /fast/stages/1-resman/branch-tenants.tf:216-225
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_GCP_83: "Ensure PubSub Topics are encrypted with Customer Supplied Encryption Keys (CSEK)"
FAILED for resource: module.tenant-self-iac-gcs-state.google_pubsub_topic.topic
File: /modules/gcs/main.tf:147-151
Calling File: /fast/stages/1-resman/branch-tenants.tf:216-225
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-pubsub-topics-are-encrypted-with-customer-supplied-encryption-keys-csek.html
147 | resource "google_pubsub_topic" "topic" {
148 | count = local.notification ? 1 : 0
149 | project = var.project_id
150 | name = var.notification_config.topic_name
151 | }
Check: CKV_GCP_12: "Ensure Network Policy is enabled on Kubernetes Engine Clusters"
FAILED for resource: module.cluster.google_container_cluster.cluster
File: /modules/gke-cluster-autopilot/main.tf:17-300
Calling File: /blueprints/gke/autopilot/cluster.tf:17-55
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-kubernetes-policies/bc-gcp-kubernetes-7.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_GCP_21: "Ensure Kubernetes Clusters are configured with Labels"
FAILED for resource: module.cluster.google_container_cluster.cluster
File: /modules/gke-cluster-autopilot/main.tf:17-300
Calling File: /blueprints/gke/autopilot/cluster.tf:17-55
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-kubernetes-policies/bc-gcp-kubernetes-13.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_GCP_69: "Ensure the GKE Metadata Server is Enabled"
FAILED for resource: module.cluster.google_container_cluster.cluster
File: /modules/gke-cluster-autopilot/main.tf:17-300
Calling File: /blueprints/gke/autopilot/cluster.tf:17-55
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-kubernetes-policies/ensure-the-gke-metadata-server-is-enabled.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_GCP_61: "Enable VPC Flow Logs and Intranode Visibility"
FAILED for resource: module.cluster.google_container_cluster.cluster
File: /modules/gke-cluster-autopilot/main.tf:17-300
Calling File: /blueprints/gke/autopilot/cluster.tf:17-55
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-kubernetes-policies/enable-vpc-flow-logs-and-intranode-visibility.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_GCP_83: "Ensure PubSub Topics are encrypted with Customer Supplied Encryption Keys (CSEK)"
FAILED for resource: module.cluster.google_pubsub_topic.notifications[0]
File: /modules/gke-cluster-autopilot/main.tf:352-362
Calling File: /blueprints/gke/autopilot/cluster.tf:17-55
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-pubsub-topics-are-encrypted-with-customer-supplied-encryption-keys-csek.html
352 | resource "google_pubsub_topic" "notifications" {
353 | count = (
354 | try(var.enable_features.upgrade_notifications, null) != null &&
355 | try(var.enable_features.upgrade_notifications.topic_id, null) == null ? 1 : 0
356 | )
357 | project = var.project_id
358 | name = "gke-pubsub-notifications"
359 | labels = {
360 | content = "gke-notifications"
361 | }
362 | }
Check: CKV_GCP_43: "Ensure KMS encryption keys are rotated within a period of 90 days"
FAILED for resource: module.kms.google_kms_crypto_key.default["key-gce"]
File: /modules/kms/main.tf:39-55
Calling File: /blueprints/data-solutions/cmek-via-centralized-kms/main.tf:102-113
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/bc-gcp-general-4.html
39 | resource "google_kms_crypto_key" "default" {
40 | for_each = var.keys
41 | key_ring = local.keyring.id
42 | name = each.key
43 | rotation_period = each.value.rotation_period
44 | labels = each.value.labels
45 | purpose = each.value.purpose
46 | skip_initial_version_creation = each.value.skip_initial_version_creation
47 |
48 | dynamic "version_template" {
49 | for_each = each.value.version_template == null ? [] : [""]
50 | content {
51 | algorithm = each.value.version_template.algorithm
52 | protection_level = each.value.version_template.protection_level
53 | }
54 | }
55 | }
Check: CKV_GCP_82: "Ensure KMS keys are protected from deletion"
FAILED for resource: module.kms.google_kms_crypto_key.default["key-gce"]
File: /modules/kms/main.tf:39-55
Calling File: /blueprints/data-solutions/cmek-via-centralized-kms/main.tf:102-113
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-kms-keys-are-protected-from-deletion.html
39 | resource "google_kms_crypto_key" "default" {
40 | for_each = var.keys
41 | key_ring = local.keyring.id
42 | name = each.key
43 | rotation_period = each.value.rotation_period
44 | labels = each.value.labels
45 | purpose = each.value.purpose
46 | skip_initial_version_creation = each.value.skip_initial_version_creation
47 |
48 | dynamic "version_template" {
49 | for_each = each.value.version_template == null ? [] : [""]
50 | content {
51 | algorithm = each.value.version_template.algorithm
52 | protection_level = each.value.version_template.protection_level
53 | }
54 | }
55 | }
Check: CKV_GCP_43: "Ensure KMS encryption keys are rotated within a period of 90 days"
FAILED for resource: module.kms.google_kms_crypto_key.default["key-gcs"]
File: /modules/kms/main.tf:39-55
Calling File: /blueprints/data-solutions/cmek-via-centralized-kms/main.tf:102-113
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/bc-gcp-general-4.html
39 | resource "google_kms_crypto_key" "default" {
40 | for_each = var.keys
41 | key_ring = local.keyring.id
42 | name = each.key
43 | rotation_period = each.value.rotation_period
44 | labels = each.value.labels
45 | purpose = each.value.purpose
46 | skip_initial_version_creation = each.value.skip_initial_version_creation
47 |
48 | dynamic "version_template" {
49 | for_each = each.value.version_template == null ? [] : [""]
50 | content {
51 | algorithm = each.value.version_template.algorithm
52 | protection_level = each.value.version_template.protection_level
53 | }
54 | }
55 | }
Check: CKV_GCP_82: "Ensure KMS keys are protected from deletion"
FAILED for resource: module.kms.google_kms_crypto_key.default["key-gcs"]
File: /modules/kms/main.tf:39-55
Calling File: /blueprints/data-solutions/cmek-via-centralized-kms/main.tf:102-113
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-kms-keys-are-protected-from-deletion.html
39 | resource "google_kms_crypto_key" "default" {
40 | for_each = var.keys
41 | key_ring = local.keyring.id
42 | name = each.key
43 | rotation_period = each.value.rotation_period
44 | labels = each.value.labels
45 | purpose = each.value.purpose
46 | skip_initial_version_creation = each.value.skip_initial_version_creation
47 |
48 | dynamic "version_template" {
49 | for_each = each.value.version_template == null ? [] : [""]
50 | content {
51 | algorithm = each.value.version_template.algorithm
52 | protection_level = each.value.version_template.protection_level
53 | }
54 | }
55 | }
Check: CKV_GCP_43: "Ensure KMS encryption keys are rotated within a period of 90 days"
FAILED for resource: module.kms.google_kms_crypto_key.default
File: /modules/kms/main.tf:39-55
Calling File: /blueprints/gke/binauthz/main.tf:114-131
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/bc-gcp-general-4.html
39 | resource "google_kms_crypto_key" "default" {
40 | for_each = var.keys
41 | key_ring = local.keyring.id
42 | name = each.key
43 | rotation_period = each.value.rotation_period
44 | labels = each.value.labels
45 | purpose = each.value.purpose
46 | skip_initial_version_creation = each.value.skip_initial_version_creation
47 |
48 | dynamic "version_template" {
49 | for_each = each.value.version_template == null ? [] : [""]
50 | content {
51 | algorithm = each.value.version_template.algorithm
52 | protection_level = each.value.version_template.protection_level
53 | }
54 | }
55 | }
Check: CKV_GCP_82: "Ensure KMS keys are protected from deletion"
FAILED for resource: module.kms.google_kms_crypto_key.default
File: /modules/kms/main.tf:39-55
Calling File: /blueprints/gke/binauthz/main.tf:114-131
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-kms-keys-are-protected-from-deletion.html
39 | resource "google_kms_crypto_key" "default" {
40 | for_each = var.keys
41 | key_ring = local.keyring.id
42 | name = each.key
43 | rotation_period = each.value.rotation_period
44 | labels = each.value.labels
45 | purpose = each.value.purpose
46 | skip_initial_version_creation = each.value.skip_initial_version_creation
47 |
48 | dynamic "version_template" {
49 | for_each = each.value.version_template == null ? [] : [""]
50 | content {
51 | algorithm = each.value.version_template.algorithm
52 | protection_level = each.value.version_template.protection_level
53 | }
54 | }
55 | }
Check: CKV_GCP_43: "Ensure KMS encryption keys are rotated within a period of 90 days"
FAILED for resource: module.log-kms.google_kms_crypto_key.default
File: /modules/kms/main.tf:39-55
Calling File: /blueprints/data-solutions/shielded-folder/kms.tf:96-105
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/bc-gcp-general-4.html
39 | resource "google_kms_crypto_key" "default" {
40 | for_each = var.keys
41 | key_ring = local.keyring.id
42 | name = each.key
43 | rotation_period = each.value.rotation_period
44 | labels = each.value.labels
45 | purpose = each.value.purpose
46 | skip_initial_version_creation = each.value.skip_initial_version_creation
47 |
48 | dynamic "version_template" {
49 | for_each = each.value.version_template == null ? [] : [""]
50 | content {
51 | algorithm = each.value.version_template.algorithm
52 | protection_level = each.value.version_template.protection_level
53 | }
54 | }
55 | }
Check: CKV_GCP_82: "Ensure KMS keys are protected from deletion"
FAILED for resource: module.log-kms.google_kms_crypto_key.default
File: /modules/kms/main.tf:39-55
Calling File: /blueprints/data-solutions/shielded-folder/kms.tf:96-105
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-kms-keys-are-protected-from-deletion.html
39 | resource "google_kms_crypto_key" "default" {
40 | for_each = var.keys
41 | key_ring = local.keyring.id
42 | name = each.key
43 | rotation_period = each.value.rotation_period
44 | labels = each.value.labels
45 | purpose = each.value.purpose
46 | skip_initial_version_creation = each.value.skip_initial_version_creation
47 |
48 | dynamic "version_template" {
49 | for_each = each.value.version_template == null ? [] : [""]
50 | content {
51 | algorithm = each.value.version_template.algorithm
52 | protection_level = each.value.version_template.protection_level
53 | }
54 | }
55 | }
Check: CKV_GCP_43: "Ensure KMS encryption keys are rotated within a period of 90 days"
FAILED for resource: module.sec-kms.google_kms_crypto_key.default
File: /modules/kms/main.tf:39-55
Calling File: /blueprints/data-solutions/shielded-folder/kms.tf:81-94
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/bc-gcp-general-4.html
39 | resource "google_kms_crypto_key" "default" {
40 | for_each = var.keys
41 | key_ring = local.keyring.id
42 | name = each.key
43 | rotation_period = each.value.rotation_period
44 | labels = each.value.labels
45 | purpose = each.value.purpose
46 | skip_initial_version_creation = each.value.skip_initial_version_creation
47 |
48 | dynamic "version_template" {
49 | for_each = each.value.version_template == null ? [] : [""]
50 | content {
51 | algorithm = each.value.version_template.algorithm
52 | protection_level = each.value.version_template.protection_level
53 | }
54 | }
55 | }
Check: CKV_GCP_82: "Ensure KMS keys are protected from deletion"
FAILED for resource: module.sec-kms.google_kms_crypto_key.default
File: /modules/kms/main.tf:39-55
Calling File: /blueprints/data-solutions/shielded-folder/kms.tf:81-94
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-kms-keys-are-protected-from-deletion.html
39 | resource "google_kms_crypto_key" "default" {
40 | for_each = var.keys
41 | key_ring = local.keyring.id
42 | name = each.key
43 | rotation_period = each.value.rotation_period
44 | labels = each.value.labels
45 | purpose = each.value.purpose
46 | skip_initial_version_creation = each.value.skip_initial_version_creation
47 |
48 | dynamic "version_template" {
49 | for_each = each.value.version_template == null ? [] : [""]
50 | content {
51 | algorithm = each.value.version_template.algorithm
52 | protection_level = each.value.version_template.protection_level
53 | }
54 | }
55 | }
Check: CKV_GCP_43: "Ensure KMS encryption keys are rotated within a period of 90 days"
FAILED for resource: module.dev-sec-kms.google_kms_crypto_key.default
File: /modules/kms/main.tf:39-55
Calling File: /fast/stages/2-security/core-dev.tf:46-55
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/bc-gcp-general-4.html
39 | resource "google_kms_crypto_key" "default" {
40 | for_each = var.keys
41 | key_ring = local.keyring.id
42 | name = each.key
43 | rotation_period = each.value.rotation_period
44 | labels = each.value.labels
45 | purpose = each.value.purpose
46 | skip_initial_version_creation = each.value.skip_initial_version_creation
47 |
48 | dynamic "version_template" {
49 | for_each = each.value.version_template == null ? [] : [""]
50 | content {
51 | algorithm = each.value.version_template.algorithm
52 | protection_level = each.value.version_template.protection_level
53 | }
54 | }
55 | }
Check: CKV_GCP_82: "Ensure KMS keys are protected from deletion"
FAILED for resource: module.dev-sec-kms.google_kms_crypto_key.default
File: /modules/kms/main.tf:39-55
Calling File: /fast/stages/2-security/core-dev.tf:46-55
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-kms-keys-are-protected-from-deletion.html
39 | resource "google_kms_crypto_key" "default" {
40 | for_each = var.keys
41 | key_ring = local.keyring.id
42 | name = each.key
43 | rotation_period = each.value.rotation_period
44 | labels = each.value.labels
45 | purpose = each.value.purpose
46 | skip_initial_version_creation = each.value.skip_initial_version_creation
47 |
48 | dynamic "version_template" {
49 | for_each = each.value.version_template == null ? [] : [""]
50 | content {
51 | algorithm = each.value.version_template.algorithm
52 | protection_level = each.value.version_template.protection_level
53 | }
54 | }
55 | }
Check: CKV_GCP_43: "Ensure KMS encryption keys are rotated within a period of 90 days"
FAILED for resource: module.prod-sec-kms.google_kms_crypto_key.default
File: /modules/kms/main.tf:39-55
Calling File: /fast/stages/2-security/core-prod.tf:45-54
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/bc-gcp-general-4.html
39 | resource "google_kms_crypto_key" "default" {
40 | for_each = var.keys
41 | key_ring = local.keyring.id
42 | name = each.key
43 | rotation_period = each.value.rotation_period
44 | labels = each.value.labels
45 | purpose = each.value.purpose
46 | skip_initial_version_creation = each.value.skip_initial_version_creation
47 |
48 | dynamic "version_template" {
49 | for_each = each.value.version_template == null ? [] : [""]
50 | content {
51 | algorithm = each.value.version_template.algorithm
52 | protection_level = each.value.version_template.protection_level
53 | }
54 | }
55 | }
Check: CKV_GCP_82: "Ensure KMS keys are protected from deletion"
FAILED for resource: module.prod-sec-kms.google_kms_crypto_key.default
File: /modules/kms/main.tf:39-55
Calling File: /fast/stages/2-security/core-prod.tf:45-54
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-kms-keys-are-protected-from-deletion.html
39 | resource "google_kms_crypto_key" "default" {
40 | for_each = var.keys
41 | key_ring = local.keyring.id
42 | name = each.key
43 | rotation_period = each.value.rotation_period
44 | labels = each.value.labels
45 | purpose = each.value.purpose
46 | skip_initial_version_creation = each.value.skip_initial_version_creation
47 |
48 | dynamic "version_template" {
49 | for_each = each.value.version_template == null ? [] : [""]
50 | content {
51 | algorithm = each.value.version_template.algorithm
52 | protection_level = each.value.version_template.protection_level
53 | }
54 | }
55 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.vpc.google_compute_subnetwork.subnetwork
File: /modules/net-vpc/subnets.tf:132-170
Calling File: /blueprints/third-party-solutions/wordpress/cloudrun/cloudsql.tf:23-39
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
132 | resource "google_compute_subnetwork" "subnetwork" {
133 | for_each = local.subnets
134 | project = var.project_id
135 | network = local.network.name
136 | name = each.value.name
137 | region = each.value.region
138 | ip_cidr_range = each.value.ip_cidr_range
139 | description = (
140 | each.value.description == null
141 | ? "Terraform-managed."
142 | : each.value.description
143 | )
144 | private_ip_google_access = each.value.enable_private_access
145 | secondary_ip_range = each.value.secondary_ip_ranges == null ? [] : [
146 | for name, range in each.value.secondary_ip_ranges :
147 | { range_name = name, ip_cidr_range = range }
148 | ]
149 | stack_type = (
150 | try(each.value.ipv6, null) != null ? "IPV4_IPV6" : null
151 | )
152 | ipv6_access_type = (
153 | try(each.value.ipv6, null) != null ? each.value.ipv6.access_type : null
154 | )
155 | # private_ipv6_google_access = try(each.value.ipv6.enable_private_access, null)
156 | dynamic "log_config" {
157 | for_each = each.value.flow_logs_config != null ? [""] : []
158 | content {
159 | aggregation_interval = each.value.flow_logs_config.aggregation_interval
160 | filter_expr = each.value.flow_logs_config.filter_expression
161 | flow_sampling = each.value.flow_logs_config.flow_sampling
162 | metadata = each.value.flow_logs_config.metadata
163 | metadata_fields = (
164 | each.value.flow_logs_config.metadata == "CUSTOM_METADATA"
165 | ? each.value.flow_logs_config.metadata_fields
166 | : null
167 | )
168 | }
169 | }
170 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.vpc.google_compute_subnetwork.subnetwork
File: /modules/net-vpc/subnets.tf:132-170
Calling File: /blueprints/third-party-solutions/wordpress/cloudrun/cloudsql.tf:23-39
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
132 | resource "google_compute_subnetwork" "subnetwork" {
133 | for_each = local.subnets
134 | project = var.project_id
135 | network = local.network.name
136 | name = each.value.name
137 | region = each.value.region
138 | ip_cidr_range = each.value.ip_cidr_range
139 | description = (
140 | each.value.description == null
141 | ? "Terraform-managed."
142 | : each.value.description
143 | )
144 | private_ip_google_access = each.value.enable_private_access
145 | secondary_ip_range = each.value.secondary_ip_ranges == null ? [] : [
146 | for name, range in each.value.secondary_ip_ranges :
147 | { range_name = name, ip_cidr_range = range }
148 | ]
149 | stack_type = (
150 | try(each.value.ipv6, null) != null ? "IPV4_IPV6" : null
151 | )
152 | ipv6_access_type = (
153 | try(each.value.ipv6, null) != null ? each.value.ipv6.access_type : null
154 | )
155 | # private_ipv6_google_access = try(each.value.ipv6.enable_private_access, null)
156 | dynamic "log_config" {
157 | for_each = each.value.flow_logs_config != null ? [""] : []
158 | content {
159 | aggregation_interval = each.value.flow_logs_config.aggregation_interval
160 | filter_expr = each.value.flow_logs_config.filter_expression
161 | flow_sampling = each.value.flow_logs_config.flow_sampling
162 | metadata = each.value.flow_logs_config.metadata
163 | metadata_fields = (
164 | each.value.flow_logs_config.metadata == "CUSTOM_METADATA"
165 | ? each.value.flow_logs_config.metadata_fields
166 | : null
167 | )
168 | }
169 | }
170 | }
Check: CKV_GCP_26: "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network"
FAILED for resource: module.vpc.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/third-party-solutions/wordpress/cloudrun/cloudsql.tf:23-39
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/bc-gcp-logging-1.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.vpc.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/third-party-solutions/wordpress/cloudrun/cloudsql.tf:23-39
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.vpc.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/third-party-solutions/wordpress/cloudrun/cloudsql.tf:23-39
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_26: "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network"
FAILED for resource: module.vpc.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/third-party-solutions/wordpress/cloudrun/cloudsql.tf:23-39
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/bc-gcp-logging-1.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.vpc.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/third-party-solutions/wordpress/cloudrun/cloudsql.tf:23-39
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.vpc.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/third-party-solutions/wordpress/cloudrun/cloudsql.tf:23-39
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.apigee_vpc.google_compute_subnetwork.subnetwork
File: /modules/net-vpc/subnets.tf:132-170
Calling File: /blueprints/apigee/network-patterns/nb-glb-psc-neg-sb-psc-ilbl7-hybrid-neg/apigee.tf:34-64
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
132 | resource "google_compute_subnetwork" "subnetwork" {
133 | for_each = local.subnets
134 | project = var.project_id
135 | network = local.network.name
136 | name = each.value.name
137 | region = each.value.region
138 | ip_cidr_range = each.value.ip_cidr_range
139 | description = (
140 | each.value.description == null
141 | ? "Terraform-managed."
142 | : each.value.description
143 | )
144 | private_ip_google_access = each.value.enable_private_access
145 | secondary_ip_range = each.value.secondary_ip_ranges == null ? [] : [
146 | for name, range in each.value.secondary_ip_ranges :
147 | { range_name = name, ip_cidr_range = range }
148 | ]
149 | stack_type = (
150 | try(each.value.ipv6, null) != null ? "IPV4_IPV6" : null
151 | )
152 | ipv6_access_type = (
153 | try(each.value.ipv6, null) != null ? each.value.ipv6.access_type : null
154 | )
155 | # private_ipv6_google_access = try(each.value.ipv6.enable_private_access, null)
156 | dynamic "log_config" {
157 | for_each = each.value.flow_logs_config != null ? [""] : []
158 | content {
159 | aggregation_interval = each.value.flow_logs_config.aggregation_interval
160 | filter_expr = each.value.flow_logs_config.filter_expression
161 | flow_sampling = each.value.flow_logs_config.flow_sampling
162 | metadata = each.value.flow_logs_config.metadata
163 | metadata_fields = (
164 | each.value.flow_logs_config.metadata == "CUSTOM_METADATA"
165 | ? each.value.flow_logs_config.metadata_fields
166 | : null
167 | )
168 | }
169 | }
170 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.apigee_vpc.google_compute_subnetwork.subnetwork
File: /modules/net-vpc/subnets.tf:132-170
Calling File: /blueprints/apigee/network-patterns/nb-glb-psc-neg-sb-psc-ilbl7-hybrid-neg/apigee.tf:34-64
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
132 | resource "google_compute_subnetwork" "subnetwork" {
133 | for_each = local.subnets
134 | project = var.project_id
135 | network = local.network.name
136 | name = each.value.name
137 | region = each.value.region
138 | ip_cidr_range = each.value.ip_cidr_range
139 | description = (
140 | each.value.description == null
141 | ? "Terraform-managed."
142 | : each.value.description
143 | )
144 | private_ip_google_access = each.value.enable_private_access
145 | secondary_ip_range = each.value.secondary_ip_ranges == null ? [] : [
146 | for name, range in each.value.secondary_ip_ranges :
147 | { range_name = name, ip_cidr_range = range }
148 | ]
149 | stack_type = (
150 | try(each.value.ipv6, null) != null ? "IPV4_IPV6" : null
151 | )
152 | ipv6_access_type = (
153 | try(each.value.ipv6, null) != null ? each.value.ipv6.access_type : null
154 | )
155 | # private_ipv6_google_access = try(each.value.ipv6.enable_private_access, null)
156 | dynamic "log_config" {
157 | for_each = each.value.flow_logs_config != null ? [""] : []
158 | content {
159 | aggregation_interval = each.value.flow_logs_config.aggregation_interval
160 | filter_expr = each.value.flow_logs_config.filter_expression
161 | flow_sampling = each.value.flow_logs_config.flow_sampling
162 | metadata = each.value.flow_logs_config.metadata
163 | metadata_fields = (
164 | each.value.flow_logs_config.metadata == "CUSTOM_METADATA"
165 | ? each.value.flow_logs_config.metadata_fields
166 | : null
167 | )
168 | }
169 | }
170 | }
Check: CKV_GCP_26: "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network"
FAILED for resource: module.apigee_vpc.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/apigee/network-patterns/nb-glb-psc-neg-sb-psc-ilbl7-hybrid-neg/apigee.tf:34-64
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/bc-gcp-logging-1.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.apigee_vpc.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/apigee/network-patterns/nb-glb-psc-neg-sb-psc-ilbl7-hybrid-neg/apigee.tf:34-64
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.apigee_vpc.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/apigee/network-patterns/nb-glb-psc-neg-sb-psc-ilbl7-hybrid-neg/apigee.tf:34-64
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_26: "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network"
FAILED for resource: module.apigee_vpc.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/apigee/network-patterns/nb-glb-psc-neg-sb-psc-ilbl7-hybrid-neg/apigee.tf:34-64
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/bc-gcp-logging-1.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.apigee_vpc.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/apigee/network-patterns/nb-glb-psc-neg-sb-psc-ilbl7-hybrid-neg/apigee.tf:34-64
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.apigee_vpc.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/apigee/network-patterns/nb-glb-psc-neg-sb-psc-ilbl7-hybrid-neg/apigee.tf:34-64
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.onprem_vpc.google_compute_subnetwork.subnetwork
File: /modules/net-vpc/subnets.tf:132-170
Calling File: /blueprints/apigee/network-patterns/nb-glb-psc-neg-sb-psc-ilbl7-hybrid-neg/onprem.tf:27-46
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
132 | resource "google_compute_subnetwork" "subnetwork" {
133 | for_each = local.subnets
134 | project = var.project_id
135 | network = local.network.name
136 | name = each.value.name
137 | region = each.value.region
138 | ip_cidr_range = each.value.ip_cidr_range
139 | description = (
140 | each.value.description == null
141 | ? "Terraform-managed."
142 | : each.value.description
143 | )
144 | private_ip_google_access = each.value.enable_private_access
145 | secondary_ip_range = each.value.secondary_ip_ranges == null ? [] : [
146 | for name, range in each.value.secondary_ip_ranges :
147 | { range_name = name, ip_cidr_range = range }
148 | ]
149 | stack_type = (
150 | try(each.value.ipv6, null) != null ? "IPV4_IPV6" : null
151 | )
152 | ipv6_access_type = (
153 | try(each.value.ipv6, null) != null ? each.value.ipv6.access_type : null
154 | )
155 | # private_ipv6_google_access = try(each.value.ipv6.enable_private_access, null)
156 | dynamic "log_config" {
157 | for_each = each.value.flow_logs_config != null ? [""] : []
158 | content {
159 | aggregation_interval = each.value.flow_logs_config.aggregation_interval
160 | filter_expr = each.value.flow_logs_config.filter_expression
161 | flow_sampling = each.value.flow_logs_config.flow_sampling
162 | metadata = each.value.flow_logs_config.metadata
163 | metadata_fields = (
164 | each.value.flow_logs_config.metadata == "CUSTOM_METADATA"
165 | ? each.value.flow_logs_config.metadata_fields
166 | : null
167 | )
168 | }
169 | }
170 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.onprem_vpc.google_compute_subnetwork.subnetwork
File: /modules/net-vpc/subnets.tf:132-170
Calling File: /blueprints/apigee/network-patterns/nb-glb-psc-neg-sb-psc-ilbl7-hybrid-neg/onprem.tf:27-46
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
132 | resource "google_compute_subnetwork" "subnetwork" {
133 | for_each = local.subnets
134 | project = var.project_id
135 | network = local.network.name
136 | name = each.value.name
137 | region = each.value.region
138 | ip_cidr_range = each.value.ip_cidr_range
139 | description = (
140 | each.value.description == null
141 | ? "Terraform-managed."
142 | : each.value.description
143 | )
144 | private_ip_google_access = each.value.enable_private_access
145 | secondary_ip_range = each.value.secondary_ip_ranges == null ? [] : [
146 | for name, range in each.value.secondary_ip_ranges :
147 | { range_name = name, ip_cidr_range = range }
148 | ]
149 | stack_type = (
150 | try(each.value.ipv6, null) != null ? "IPV4_IPV6" : null
151 | )
152 | ipv6_access_type = (
153 | try(each.value.ipv6, null) != null ? each.value.ipv6.access_type : null
154 | )
155 | # private_ipv6_google_access = try(each.value.ipv6.enable_private_access, null)
156 | dynamic "log_config" {
157 | for_each = each.value.flow_logs_config != null ? [""] : []
158 | content {
159 | aggregation_interval = each.value.flow_logs_config.aggregation_interval
160 | filter_expr = each.value.flow_logs_config.filter_expression
161 | flow_sampling = each.value.flow_logs_config.flow_sampling
162 | metadata = each.value.flow_logs_config.metadata
163 | metadata_fields = (
164 | each.value.flow_logs_config.metadata == "CUSTOM_METADATA"
165 | ? each.value.flow_logs_config.metadata_fields
166 | : null
167 | )
168 | }
169 | }
170 | }
Check: CKV_GCP_26: "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network"
FAILED for resource: module.onprem_vpc.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/apigee/network-patterns/nb-glb-psc-neg-sb-psc-ilbl7-hybrid-neg/onprem.tf:27-46
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/bc-gcp-logging-1.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.onprem_vpc.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/apigee/network-patterns/nb-glb-psc-neg-sb-psc-ilbl7-hybrid-neg/onprem.tf:27-46
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.onprem_vpc.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/apigee/network-patterns/nb-glb-psc-neg-sb-psc-ilbl7-hybrid-neg/onprem.tf:27-46
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_26: "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network"
FAILED for resource: module.onprem_vpc.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/apigee/network-patterns/nb-glb-psc-neg-sb-psc-ilbl7-hybrid-neg/onprem.tf:27-46
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/bc-gcp-logging-1.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.onprem_vpc.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/apigee/network-patterns/nb-glb-psc-neg-sb-psc-ilbl7-hybrid-neg/onprem.tf:27-46
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.onprem_vpc.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/apigee/network-patterns/nb-glb-psc-neg-sb-psc-ilbl7-hybrid-neg/onprem.tf:27-46
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.cloud-dns.module.vpc.google_compute_subnetwork.subnetwork
File: /modules/net-vpc/subnets.tf:132-170
Calling File: /blueprints/cloud-operations/dns-shared-vpc/main.tf:34-39
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
132 | resource "google_compute_subnetwork" "subnetwork" {
133 | for_each = local.subnets
134 | project = var.project_id
135 | network = local.network.name
136 | name = each.value.name
137 | region = each.value.region
138 | ip_cidr_range = each.value.ip_cidr_range
139 | description = (
140 | each.value.description == null
141 | ? "Terraform-managed."
142 | : each.value.description
143 | )
144 | private_ip_google_access = each.value.enable_private_access
145 | secondary_ip_range = each.value.secondary_ip_ranges == null ? [] : [
146 | for name, range in each.value.secondary_ip_ranges :
147 | { range_name = name, ip_cidr_range = range }
148 | ]
149 | stack_type = (
150 | try(each.value.ipv6, null) != null ? "IPV4_IPV6" : null
151 | )
152 | ipv6_access_type = (
153 | try(each.value.ipv6, null) != null ? each.value.ipv6.access_type : null
154 | )
155 | # private_ipv6_google_access = try(each.value.ipv6.enable_private_access, null)
156 | dynamic "log_config" {
157 | for_each = each.value.flow_logs_config != null ? [""] : []
158 | content {
159 | aggregation_interval = each.value.flow_logs_config.aggregation_interval
160 | filter_expr = each.value.flow_logs_config.filter_expression
161 | flow_sampling = each.value.flow_logs_config.flow_sampling
162 | metadata = each.value.flow_logs_config.metadata
163 | metadata_fields = (
164 | each.value.flow_logs_config.metadata == "CUSTOM_METADATA"
165 | ? each.value.flow_logs_config.metadata_fields
166 | : null
167 | )
168 | }
169 | }
170 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.cloud-dns.module.vpc.google_compute_subnetwork.subnetwork
File: /modules/net-vpc/subnets.tf:132-170
Calling File: /blueprints/cloud-operations/dns-shared-vpc/main.tf:34-39
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
132 | resource "google_compute_subnetwork" "subnetwork" {
133 | for_each = local.subnets
134 | project = var.project_id
135 | network = local.network.name
136 | name = each.value.name
137 | region = each.value.region
138 | ip_cidr_range = each.value.ip_cidr_range
139 | description = (
140 | each.value.description == null
141 | ? "Terraform-managed."
142 | : each.value.description
143 | )
144 | private_ip_google_access = each.value.enable_private_access
145 | secondary_ip_range = each.value.secondary_ip_ranges == null ? [] : [
146 | for name, range in each.value.secondary_ip_ranges :
147 | { range_name = name, ip_cidr_range = range }
148 | ]
149 | stack_type = (
150 | try(each.value.ipv6, null) != null ? "IPV4_IPV6" : null
151 | )
152 | ipv6_access_type = (
153 | try(each.value.ipv6, null) != null ? each.value.ipv6.access_type : null
154 | )
155 | # private_ipv6_google_access = try(each.value.ipv6.enable_private_access, null)
156 | dynamic "log_config" {
157 | for_each = each.value.flow_logs_config != null ? [""] : []
158 | content {
159 | aggregation_interval = each.value.flow_logs_config.aggregation_interval
160 | filter_expr = each.value.flow_logs_config.filter_expression
161 | flow_sampling = each.value.flow_logs_config.flow_sampling
162 | metadata = each.value.flow_logs_config.metadata
163 | metadata_fields = (
164 | each.value.flow_logs_config.metadata == "CUSTOM_METADATA"
165 | ? each.value.flow_logs_config.metadata_fields
166 | : null
167 | )
168 | }
169 | }
170 | }
Check: CKV_GCP_26: "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network"
FAILED for resource: module.cloud-dns.module.vpc.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/cloud-operations/dns-shared-vpc/main.tf:34-39
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/bc-gcp-logging-1.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.cloud-dns.module.vpc.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/cloud-operations/dns-shared-vpc/main.tf:34-39
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.cloud-dns.module.vpc.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/cloud-operations/dns-shared-vpc/main.tf:34-39
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_26: "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network"
FAILED for resource: module.cloud-dns.module.vpc.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/cloud-operations/dns-shared-vpc/main.tf:34-39
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/bc-gcp-logging-1.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.cloud-dns.module.vpc.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/cloud-operations/dns-shared-vpc/main.tf:34-39
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.cloud-dns.module.vpc.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/cloud-operations/dns-shared-vpc/main.tf:34-39
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.landing-vpc.google_compute_subnetwork.subnetwork
File: /modules/net-vpc/subnets.tf:132-170
Calling File: /fast/stages/2-networking-b-vpn/landing.tf:45-61
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
132 | resource "google_compute_subnetwork" "subnetwork" {
133 | for_each = local.subnets
134 | project = var.project_id
135 | network = local.network.name
136 | name = each.value.name
137 | region = each.value.region
138 | ip_cidr_range = each.value.ip_cidr_range
139 | description = (
140 | each.value.description == null
141 | ? "Terraform-managed."
142 | : each.value.description
143 | )
144 | private_ip_google_access = each.value.enable_private_access
145 | secondary_ip_range = each.value.secondary_ip_ranges == null ? [] : [
146 | for name, range in each.value.secondary_ip_ranges :
147 | { range_name = name, ip_cidr_range = range }
148 | ]
149 | stack_type = (
150 | try(each.value.ipv6, null) != null ? "IPV4_IPV6" : null
151 | )
152 | ipv6_access_type = (
153 | try(each.value.ipv6, null) != null ? each.value.ipv6.access_type : null
154 | )
155 | # private_ipv6_google_access = try(each.value.ipv6.enable_private_access, null)
156 | dynamic "log_config" {
157 | for_each = each.value.flow_logs_config != null ? [""] : []
158 | content {
159 | aggregation_interval = each.value.flow_logs_config.aggregation_interval
160 | filter_expr = each.value.flow_logs_config.filter_expression
161 | flow_sampling = each.value.flow_logs_config.flow_sampling
162 | metadata = each.value.flow_logs_config.metadata
163 | metadata_fields = (
164 | each.value.flow_logs_config.metadata == "CUSTOM_METADATA"
165 | ? each.value.flow_logs_config.metadata_fields
166 | : null
167 | )
168 | }
169 | }
170 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.landing-vpc.google_compute_subnetwork.subnetwork
File: /modules/net-vpc/subnets.tf:132-170
Calling File: /fast/stages/2-networking-b-vpn/landing.tf:45-61
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
132 | resource "google_compute_subnetwork" "subnetwork" {
133 | for_each = local.subnets
134 | project = var.project_id
135 | network = local.network.name
136 | name = each.value.name
137 | region = each.value.region
138 | ip_cidr_range = each.value.ip_cidr_range
139 | description = (
140 | each.value.description == null
141 | ? "Terraform-managed."
142 | : each.value.description
143 | )
144 | private_ip_google_access = each.value.enable_private_access
145 | secondary_ip_range = each.value.secondary_ip_ranges == null ? [] : [
146 | for name, range in each.value.secondary_ip_ranges :
147 | { range_name = name, ip_cidr_range = range }
148 | ]
149 | stack_type = (
150 | try(each.value.ipv6, null) != null ? "IPV4_IPV6" : null
151 | )
152 | ipv6_access_type = (
153 | try(each.value.ipv6, null) != null ? each.value.ipv6.access_type : null
154 | )
155 | # private_ipv6_google_access = try(each.value.ipv6.enable_private_access, null)
156 | dynamic "log_config" {
157 | for_each = each.value.flow_logs_config != null ? [""] : []
158 | content {
159 | aggregation_interval = each.value.flow_logs_config.aggregation_interval
160 | filter_expr = each.value.flow_logs_config.filter_expression
161 | flow_sampling = each.value.flow_logs_config.flow_sampling
162 | metadata = each.value.flow_logs_config.metadata
163 | metadata_fields = (
164 | each.value.flow_logs_config.metadata == "CUSTOM_METADATA"
165 | ? each.value.flow_logs_config.metadata_fields
166 | : null
167 | )
168 | }
169 | }
170 | }
Check: CKV_GCP_26: "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network"
FAILED for resource: module.landing-vpc.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /fast/stages/2-networking-b-vpn/landing.tf:45-61
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/bc-gcp-logging-1.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.landing-vpc.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /fast/stages/2-networking-b-vpn/landing.tf:45-61
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.landing-vpc.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /fast/stages/2-networking-b-vpn/landing.tf:45-61
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_26: "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network"
FAILED for resource: module.landing-vpc.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /fast/stages/2-networking-b-vpn/landing.tf:45-61
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/bc-gcp-logging-1.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.landing-vpc.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /fast/stages/2-networking-b-vpn/landing.tf:45-61
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.landing-vpc.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /fast/stages/2-networking-b-vpn/landing.tf:45-61
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.data-platform.module.load-vpc.google_compute_subnetwork.subnetwork
File: /modules/net-vpc/subnets.tf:132-170
Calling File: /blueprints/data-solutions/data-platform-foundations/02-load.tf:104-116
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
132 | resource "google_compute_subnetwork" "subnetwork" {
133 | for_each = local.subnets
134 | project = var.project_id
135 | network = local.network.name
136 | name = each.value.name
137 | region = each.value.region
138 | ip_cidr_range = each.value.ip_cidr_range
139 | description = (
140 | each.value.description == null
141 | ? "Terraform-managed."
142 | : each.value.description
143 | )
144 | private_ip_google_access = each.value.enable_private_access
145 | secondary_ip_range = each.value.secondary_ip_ranges == null ? [] : [
146 | for name, range in each.value.secondary_ip_ranges :
147 | { range_name = name, ip_cidr_range = range }
148 | ]
149 | stack_type = (
150 | try(each.value.ipv6, null) != null ? "IPV4_IPV6" : null
151 | )
152 | ipv6_access_type = (
153 | try(each.value.ipv6, null) != null ? each.value.ipv6.access_type : null
154 | )
155 | # private_ipv6_google_access = try(each.value.ipv6.enable_private_access, null)
156 | dynamic "log_config" {
157 | for_each = each.value.flow_logs_config != null ? [""] : []
158 | content {
159 | aggregation_interval = each.value.flow_logs_config.aggregation_interval
160 | filter_expr = each.value.flow_logs_config.filter_expression
161 | flow_sampling = each.value.flow_logs_config.flow_sampling
162 | metadata = each.value.flow_logs_config.metadata
163 | metadata_fields = (
164 | each.value.flow_logs_config.metadata == "CUSTOM_METADATA"
165 | ? each.value.flow_logs_config.metadata_fields
166 | : null
167 | )
168 | }
169 | }
170 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.data-platform.module.load-vpc.google_compute_subnetwork.subnetwork
File: /modules/net-vpc/subnets.tf:132-170
Calling File: /blueprints/data-solutions/data-platform-foundations/02-load.tf:104-116
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
132 | resource "google_compute_subnetwork" "subnetwork" {
133 | for_each = local.subnets
134 | project = var.project_id
135 | network = local.network.name
136 | name = each.value.name
137 | region = each.value.region
138 | ip_cidr_range = each.value.ip_cidr_range
139 | description = (
140 | each.value.description == null
141 | ? "Terraform-managed."
142 | : each.value.description
143 | )
144 | private_ip_google_access = each.value.enable_private_access
145 | secondary_ip_range = each.value.secondary_ip_ranges == null ? [] : [
146 | for name, range in each.value.secondary_ip_ranges :
147 | { range_name = name, ip_cidr_range = range }
148 | ]
149 | stack_type = (
150 | try(each.value.ipv6, null) != null ? "IPV4_IPV6" : null
151 | )
152 | ipv6_access_type = (
153 | try(each.value.ipv6, null) != null ? each.value.ipv6.access_type : null
154 | )
155 | # private_ipv6_google_access = try(each.value.ipv6.enable_private_access, null)
156 | dynamic "log_config" {
157 | for_each = each.value.flow_logs_config != null ? [""] : []
158 | content {
159 | aggregation_interval = each.value.flow_logs_config.aggregation_interval
160 | filter_expr = each.value.flow_logs_config.filter_expression
161 | flow_sampling = each.value.flow_logs_config.flow_sampling
162 | metadata = each.value.flow_logs_config.metadata
163 | metadata_fields = (
164 | each.value.flow_logs_config.metadata == "CUSTOM_METADATA"
165 | ? each.value.flow_logs_config.metadata_fields
166 | : null
167 | )
168 | }
169 | }
170 | }
Check: CKV_GCP_26: "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network"
FAILED for resource: module.data-platform.module.load-vpc.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/data-solutions/data-platform-foundations/02-load.tf:104-116
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/bc-gcp-logging-1.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.data-platform.module.load-vpc.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/data-solutions/data-platform-foundations/02-load.tf:104-116
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.data-platform.module.load-vpc.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/data-solutions/data-platform-foundations/02-load.tf:104-116
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_26: "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network"
FAILED for resource: module.data-platform.module.load-vpc.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/data-solutions/data-platform-foundations/02-load.tf:104-116
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/bc-gcp-logging-1.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.data-platform.module.load-vpc.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/data-solutions/data-platform-foundations/02-load.tf:104-116
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.data-platform.module.load-vpc.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/data-solutions/data-platform-foundations/02-load.tf:104-116
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.data-platform.module.orch-vpc.google_compute_subnetwork.subnetwork
File: /modules/net-vpc/subnets.tf:132-170
Calling File: /blueprints/data-solutions/data-platform-foundations/03-orchestration.tf:115-131
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
132 | resource "google_compute_subnetwork" "subnetwork" {
133 | for_each = local.subnets
134 | project = var.project_id
135 | network = local.network.name
136 | name = each.value.name
137 | region = each.value.region
138 | ip_cidr_range = each.value.ip_cidr_range
139 | description = (
140 | each.value.description == null
141 | ? "Terraform-managed."
142 | : each.value.description
143 | )
144 | private_ip_google_access = each.value.enable_private_access
145 | secondary_ip_range = each.value.secondary_ip_ranges == null ? [] : [
146 | for name, range in each.value.secondary_ip_ranges :
147 | { range_name = name, ip_cidr_range = range }
148 | ]
149 | stack_type = (
150 | try(each.value.ipv6, null) != null ? "IPV4_IPV6" : null
151 | )
152 | ipv6_access_type = (
153 | try(each.value.ipv6, null) != null ? each.value.ipv6.access_type : null
154 | )
155 | # private_ipv6_google_access = try(each.value.ipv6.enable_private_access, null)
156 | dynamic "log_config" {
157 | for_each = each.value.flow_logs_config != null ? [""] : []
158 | content {
159 | aggregation_interval = each.value.flow_logs_config.aggregation_interval
160 | filter_expr = each.value.flow_logs_config.filter_expression
161 | flow_sampling = each.value.flow_logs_config.flow_sampling
162 | metadata = each.value.flow_logs_config.metadata
163 | metadata_fields = (
164 | each.value.flow_logs_config.metadata == "CUSTOM_METADATA"
165 | ? each.value.flow_logs_config.metadata_fields
166 | : null
167 | )
168 | }
169 | }
170 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.data-platform.module.orch-vpc.google_compute_subnetwork.subnetwork
File: /modules/net-vpc/subnets.tf:132-170
Calling File: /blueprints/data-solutions/data-platform-foundations/03-orchestration.tf:115-131
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
132 | resource "google_compute_subnetwork" "subnetwork" {
133 | for_each = local.subnets
134 | project = var.project_id
135 | network = local.network.name
136 | name = each.value.name
137 | region = each.value.region
138 | ip_cidr_range = each.value.ip_cidr_range
139 | description = (
140 | each.value.description == null
141 | ? "Terraform-managed."
142 | : each.value.description
143 | )
144 | private_ip_google_access = each.value.enable_private_access
145 | secondary_ip_range = each.value.secondary_ip_ranges == null ? [] : [
146 | for name, range in each.value.secondary_ip_ranges :
147 | { range_name = name, ip_cidr_range = range }
148 | ]
149 | stack_type = (
150 | try(each.value.ipv6, null) != null ? "IPV4_IPV6" : null
151 | )
152 | ipv6_access_type = (
153 | try(each.value.ipv6, null) != null ? each.value.ipv6.access_type : null
154 | )
155 | # private_ipv6_google_access = try(each.value.ipv6.enable_private_access, null)
156 | dynamic "log_config" {
157 | for_each = each.value.flow_logs_config != null ? [""] : []
158 | content {
159 | aggregation_interval = each.value.flow_logs_config.aggregation_interval
160 | filter_expr = each.value.flow_logs_config.filter_expression
161 | flow_sampling = each.value.flow_logs_config.flow_sampling
162 | metadata = each.value.flow_logs_config.metadata
163 | metadata_fields = (
164 | each.value.flow_logs_config.metadata == "CUSTOM_METADATA"
165 | ? each.value.flow_logs_config.metadata_fields
166 | : null
167 | )
168 | }
169 | }
170 | }
Check: CKV_GCP_26: "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network"
FAILED for resource: module.data-platform.module.orch-vpc.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/data-solutions/data-platform-foundations/03-orchestration.tf:115-131
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/bc-gcp-logging-1.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.data-platform.module.orch-vpc.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/data-solutions/data-platform-foundations/03-orchestration.tf:115-131
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.data-platform.module.orch-vpc.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/data-solutions/data-platform-foundations/03-orchestration.tf:115-131
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_26: "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network"
FAILED for resource: module.data-platform.module.orch-vpc.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/data-solutions/data-platform-foundations/03-orchestration.tf:115-131
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/bc-gcp-logging-1.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.data-platform.module.orch-vpc.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/data-solutions/data-platform-foundations/03-orchestration.tf:115-131
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.data-platform.module.orch-vpc.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/data-solutions/data-platform-foundations/03-orchestration.tf:115-131
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.data-platform.module.transf-vpc.google_compute_subnetwork.subnetwork
File: /modules/net-vpc/subnets.tf:132-170
Calling File: /blueprints/data-solutions/data-platform-foundations/04-transformation.tf:120-132
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
132 | resource "google_compute_subnetwork" "subnetwork" {
133 | for_each = local.subnets
134 | project = var.project_id
135 | network = local.network.name
136 | name = each.value.name
137 | region = each.value.region
138 | ip_cidr_range = each.value.ip_cidr_range
139 | description = (
140 | each.value.description == null
141 | ? "Terraform-managed."
142 | : each.value.description
143 | )
144 | private_ip_google_access = each.value.enable_private_access
145 | secondary_ip_range = each.value.secondary_ip_ranges == null ? [] : [
146 | for name, range in each.value.secondary_ip_ranges :
147 | { range_name = name, ip_cidr_range = range }
148 | ]
149 | stack_type = (
150 | try(each.value.ipv6, null) != null ? "IPV4_IPV6" : null
151 | )
152 | ipv6_access_type = (
153 | try(each.value.ipv6, null) != null ? each.value.ipv6.access_type : null
154 | )
155 | # private_ipv6_google_access = try(each.value.ipv6.enable_private_access, null)
156 | dynamic "log_config" {
157 | for_each = each.value.flow_logs_config != null ? [""] : []
158 | content {
159 | aggregation_interval = each.value.flow_logs_config.aggregation_interval
160 | filter_expr = each.value.flow_logs_config.filter_expression
161 | flow_sampling = each.value.flow_logs_config.flow_sampling
162 | metadata = each.value.flow_logs_config.metadata
163 | metadata_fields = (
164 | each.value.flow_logs_config.metadata == "CUSTOM_METADATA"
165 | ? each.value.flow_logs_config.metadata_fields
166 | : null
167 | )
168 | }
169 | }
170 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.data-platform.module.transf-vpc.google_compute_subnetwork.subnetwork
File: /modules/net-vpc/subnets.tf:132-170
Calling File: /blueprints/data-solutions/data-platform-foundations/04-transformation.tf:120-132
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
132 | resource "google_compute_subnetwork" "subnetwork" {
133 | for_each = local.subnets
134 | project = var.project_id
135 | network = local.network.name
136 | name = each.value.name
137 | region = each.value.region
138 | ip_cidr_range = each.value.ip_cidr_range
139 | description = (
140 | each.value.description == null
141 | ? "Terraform-managed."
142 | : each.value.description
143 | )
144 | private_ip_google_access = each.value.enable_private_access
145 | secondary_ip_range = each.value.secondary_ip_ranges == null ? [] : [
146 | for name, range in each.value.secondary_ip_ranges :
147 | { range_name = name, ip_cidr_range = range }
148 | ]
149 | stack_type = (
150 | try(each.value.ipv6, null) != null ? "IPV4_IPV6" : null
151 | )
152 | ipv6_access_type = (
153 | try(each.value.ipv6, null) != null ? each.value.ipv6.access_type : null
154 | )
155 | # private_ipv6_google_access = try(each.value.ipv6.enable_private_access, null)
156 | dynamic "log_config" {
157 | for_each = each.value.flow_logs_config != null ? [""] : []
158 | content {
159 | aggregation_interval = each.value.flow_logs_config.aggregation_interval
160 | filter_expr = each.value.flow_logs_config.filter_expression
161 | flow_sampling = each.value.flow_logs_config.flow_sampling
162 | metadata = each.value.flow_logs_config.metadata
163 | metadata_fields = (
164 | each.value.flow_logs_config.metadata == "CUSTOM_METADATA"
165 | ? each.value.flow_logs_config.metadata_fields
166 | : null
167 | )
168 | }
169 | }
170 | }
Check: CKV_GCP_26: "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network"
FAILED for resource: module.data-platform.module.transf-vpc.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/data-solutions/data-platform-foundations/04-transformation.tf:120-132
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/bc-gcp-logging-1.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.data-platform.module.transf-vpc.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/data-solutions/data-platform-foundations/04-transformation.tf:120-132
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.data-platform.module.transf-vpc.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/data-solutions/data-platform-foundations/04-transformation.tf:120-132
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_26: "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network"
FAILED for resource: module.data-platform.module.transf-vpc.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/data-solutions/data-platform-foundations/04-transformation.tf:120-132
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/bc-gcp-logging-1.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.data-platform.module.transf-vpc.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/data-solutions/data-platform-foundations/04-transformation.tf:120-132
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.data-platform.module.transf-vpc.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/data-solutions/data-platform-foundations/04-transformation.tf:120-132
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.processing-vpc.google_compute_subnetwork.subnetwork
File: /modules/net-vpc/subnets.tf:132-170
Calling File: /blueprints/data-solutions/data-platform-minimal/02-processing.tf:165-181
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
132 | resource "google_compute_subnetwork" "subnetwork" {
133 | for_each = local.subnets
134 | project = var.project_id
135 | network = local.network.name
136 | name = each.value.name
137 | region = each.value.region
138 | ip_cidr_range = each.value.ip_cidr_range
139 | description = (
140 | each.value.description == null
141 | ? "Terraform-managed."
142 | : each.value.description
143 | )
144 | private_ip_google_access = each.value.enable_private_access
145 | secondary_ip_range = each.value.secondary_ip_ranges == null ? [] : [
146 | for name, range in each.value.secondary_ip_ranges :
147 | { range_name = name, ip_cidr_range = range }
148 | ]
149 | stack_type = (
150 | try(each.value.ipv6, null) != null ? "IPV4_IPV6" : null
151 | )
152 | ipv6_access_type = (
153 | try(each.value.ipv6, null) != null ? each.value.ipv6.access_type : null
154 | )
155 | # private_ipv6_google_access = try(each.value.ipv6.enable_private_access, null)
156 | dynamic "log_config" {
157 | for_each = each.value.flow_logs_config != null ? [""] : []
158 | content {
159 | aggregation_interval = each.value.flow_logs_config.aggregation_interval
160 | filter_expr = each.value.flow_logs_config.filter_expression
161 | flow_sampling = each.value.flow_logs_config.flow_sampling
162 | metadata = each.value.flow_logs_config.metadata
163 | metadata_fields = (
164 | each.value.flow_logs_config.metadata == "CUSTOM_METADATA"
165 | ? each.value.flow_logs_config.metadata_fields
166 | : null
167 | )
168 | }
169 | }
170 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.processing-vpc.google_compute_subnetwork.subnetwork
File: /modules/net-vpc/subnets.tf:132-170
Calling File: /blueprints/data-solutions/data-platform-minimal/02-processing.tf:165-181
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
132 | resource "google_compute_subnetwork" "subnetwork" {
133 | for_each = local.subnets
134 | project = var.project_id
135 | network = local.network.name
136 | name = each.value.name
137 | region = each.value.region
138 | ip_cidr_range = each.value.ip_cidr_range
139 | description = (
140 | each.value.description == null
141 | ? "Terraform-managed."
142 | : each.value.description
143 | )
144 | private_ip_google_access = each.value.enable_private_access
145 | secondary_ip_range = each.value.secondary_ip_ranges == null ? [] : [
146 | for name, range in each.value.secondary_ip_ranges :
147 | { range_name = name, ip_cidr_range = range }
148 | ]
149 | stack_type = (
150 | try(each.value.ipv6, null) != null ? "IPV4_IPV6" : null
151 | )
152 | ipv6_access_type = (
153 | try(each.value.ipv6, null) != null ? each.value.ipv6.access_type : null
154 | )
155 | # private_ipv6_google_access = try(each.value.ipv6.enable_private_access, null)
156 | dynamic "log_config" {
157 | for_each = each.value.flow_logs_config != null ? [""] : []
158 | content {
159 | aggregation_interval = each.value.flow_logs_config.aggregation_interval
160 | filter_expr = each.value.flow_logs_config.filter_expression
161 | flow_sampling = each.value.flow_logs_config.flow_sampling
162 | metadata = each.value.flow_logs_config.metadata
163 | metadata_fields = (
164 | each.value.flow_logs_config.metadata == "CUSTOM_METADATA"
165 | ? each.value.flow_logs_config.metadata_fields
166 | : null
167 | )
168 | }
169 | }
170 | }
Check: CKV_GCP_26: "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network"
FAILED for resource: module.processing-vpc.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/data-solutions/data-platform-minimal/02-processing.tf:165-181
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/bc-gcp-logging-1.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.processing-vpc.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/data-solutions/data-platform-minimal/02-processing.tf:165-181
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.processing-vpc.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/data-solutions/data-platform-minimal/02-processing.tf:165-181
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_26: "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network"
FAILED for resource: module.processing-vpc.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/data-solutions/data-platform-minimal/02-processing.tf:165-181
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/bc-gcp-logging-1.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.processing-vpc.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/data-solutions/data-platform-minimal/02-processing.tf:165-181
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.processing-vpc.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/data-solutions/data-platform-minimal/02-processing.tf:165-181
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.svpc.google_compute_subnetwork.subnetwork
File: /modules/net-vpc/subnets.tf:132-170
Calling File: /blueprints/gke/multi-cluster-mesh-gke-fleet-api/vpc.tf:19-37
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
132 | resource "google_compute_subnetwork" "subnetwork" {
133 | for_each = local.subnets
134 | project = var.project_id
135 | network = local.network.name
136 | name = each.value.name
137 | region = each.value.region
138 | ip_cidr_range = each.value.ip_cidr_range
139 | description = (
140 | each.value.description == null
141 | ? "Terraform-managed."
142 | : each.value.description
143 | )
144 | private_ip_google_access = each.value.enable_private_access
145 | secondary_ip_range = each.value.secondary_ip_ranges == null ? [] : [
146 | for name, range in each.value.secondary_ip_ranges :
147 | { range_name = name, ip_cidr_range = range }
148 | ]
149 | stack_type = (
150 | try(each.value.ipv6, null) != null ? "IPV4_IPV6" : null
151 | )
152 | ipv6_access_type = (
153 | try(each.value.ipv6, null) != null ? each.value.ipv6.access_type : null
154 | )
155 | # private_ipv6_google_access = try(each.value.ipv6.enable_private_access, null)
156 | dynamic "log_config" {
157 | for_each = each.value.flow_logs_config != null ? [""] : []
158 | content {
159 | aggregation_interval = each.value.flow_logs_config.aggregation_interval
160 | filter_expr = each.value.flow_logs_config.filter_expression
161 | flow_sampling = each.value.flow_logs_config.flow_sampling
162 | metadata = each.value.flow_logs_config.metadata
163 | metadata_fields = (
164 | each.value.flow_logs_config.metadata == "CUSTOM_METADATA"
165 | ? each.value.flow_logs_config.metadata_fields
166 | : null
167 | )
168 | }
169 | }
170 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.svpc.google_compute_subnetwork.subnetwork
File: /modules/net-vpc/subnets.tf:132-170
Calling File: /blueprints/gke/multi-cluster-mesh-gke-fleet-api/vpc.tf:19-37
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
132 | resource "google_compute_subnetwork" "subnetwork" {
133 | for_each = local.subnets
134 | project = var.project_id
135 | network = local.network.name
136 | name = each.value.name
137 | region = each.value.region
138 | ip_cidr_range = each.value.ip_cidr_range
139 | description = (
140 | each.value.description == null
141 | ? "Terraform-managed."
142 | : each.value.description
143 | )
144 | private_ip_google_access = each.value.enable_private_access
145 | secondary_ip_range = each.value.secondary_ip_ranges == null ? [] : [
146 | for name, range in each.value.secondary_ip_ranges :
147 | { range_name = name, ip_cidr_range = range }
148 | ]
149 | stack_type = (
150 | try(each.value.ipv6, null) != null ? "IPV4_IPV6" : null
151 | )
152 | ipv6_access_type = (
153 | try(each.value.ipv6, null) != null ? each.value.ipv6.access_type : null
154 | )
155 | # private_ipv6_google_access = try(each.value.ipv6.enable_private_access, null)
156 | dynamic "log_config" {
157 | for_each = each.value.flow_logs_config != null ? [""] : []
158 | content {
159 | aggregation_interval = each.value.flow_logs_config.aggregation_interval
160 | filter_expr = each.value.flow_logs_config.filter_expression
161 | flow_sampling = each.value.flow_logs_config.flow_sampling
162 | metadata = each.value.flow_logs_config.metadata
163 | metadata_fields = (
164 | each.value.flow_logs_config.metadata == "CUSTOM_METADATA"
165 | ? each.value.flow_logs_config.metadata_fields
166 | : null
167 | )
168 | }
169 | }
170 | }
Check: CKV_GCP_26: "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network"
FAILED for resource: module.svpc.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/gke/multi-cluster-mesh-gke-fleet-api/vpc.tf:19-37
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/bc-gcp-logging-1.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.svpc.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/gke/multi-cluster-mesh-gke-fleet-api/vpc.tf:19-37
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.svpc.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/gke/multi-cluster-mesh-gke-fleet-api/vpc.tf:19-37
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_26: "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network"
FAILED for resource: module.svpc.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/gke/multi-cluster-mesh-gke-fleet-api/vpc.tf:19-37
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/bc-gcp-logging-1.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.svpc.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/gke/multi-cluster-mesh-gke-fleet-api/vpc.tf:19-37
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.svpc.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/gke/multi-cluster-mesh-gke-fleet-api/vpc.tf:19-37
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.vpc-dev.google_compute_subnetwork.subnetwork
File: /modules/net-vpc/subnets.tf:132-170
Calling File: /blueprints/networking/decentralized-firewall/main.tf:62-73
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
132 | resource "google_compute_subnetwork" "subnetwork" {
133 | for_each = local.subnets
134 | project = var.project_id
135 | network = local.network.name
136 | name = each.value.name
137 | region = each.value.region
138 | ip_cidr_range = each.value.ip_cidr_range
139 | description = (
140 | each.value.description == null
141 | ? "Terraform-managed."
142 | : each.value.description
143 | )
144 | private_ip_google_access = each.value.enable_private_access
145 | secondary_ip_range = each.value.secondary_ip_ranges == null ? [] : [
146 | for name, range in each.value.secondary_ip_ranges :
147 | { range_name = name, ip_cidr_range = range }
148 | ]
149 | stack_type = (
150 | try(each.value.ipv6, null) != null ? "IPV4_IPV6" : null
151 | )
152 | ipv6_access_type = (
153 | try(each.value.ipv6, null) != null ? each.value.ipv6.access_type : null
154 | )
155 | # private_ipv6_google_access = try(each.value.ipv6.enable_private_access, null)
156 | dynamic "log_config" {
157 | for_each = each.value.flow_logs_config != null ? [""] : []
158 | content {
159 | aggregation_interval = each.value.flow_logs_config.aggregation_interval
160 | filter_expr = each.value.flow_logs_config.filter_expression
161 | flow_sampling = each.value.flow_logs_config.flow_sampling
162 | metadata = each.value.flow_logs_config.metadata
163 | metadata_fields = (
164 | each.value.flow_logs_config.metadata == "CUSTOM_METADATA"
165 | ? each.value.flow_logs_config.metadata_fields
166 | : null
167 | )
168 | }
169 | }
170 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.vpc-dev.google_compute_subnetwork.subnetwork
File: /modules/net-vpc/subnets.tf:132-170
Calling File: /blueprints/networking/decentralized-firewall/main.tf:62-73
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
132 | resource "google_compute_subnetwork" "subnetwork" {
133 | for_each = local.subnets
134 | project = var.project_id
135 | network = local.network.name
136 | name = each.value.name
137 | region = each.value.region
138 | ip_cidr_range = each.value.ip_cidr_range
139 | description = (
140 | each.value.description == null
141 | ? "Terraform-managed."
142 | : each.value.description
143 | )
144 | private_ip_google_access = each.value.enable_private_access
145 | secondary_ip_range = each.value.secondary_ip_ranges == null ? [] : [
146 | for name, range in each.value.secondary_ip_ranges :
147 | { range_name = name, ip_cidr_range = range }
148 | ]
149 | stack_type = (
150 | try(each.value.ipv6, null) != null ? "IPV4_IPV6" : null
151 | )
152 | ipv6_access_type = (
153 | try(each.value.ipv6, null) != null ? each.value.ipv6.access_type : null
154 | )
155 | # private_ipv6_google_access = try(each.value.ipv6.enable_private_access, null)
156 | dynamic "log_config" {
157 | for_each = each.value.flow_logs_config != null ? [""] : []
158 | content {
159 | aggregation_interval = each.value.flow_logs_config.aggregation_interval
160 | filter_expr = each.value.flow_logs_config.filter_expression
161 | flow_sampling = each.value.flow_logs_config.flow_sampling
162 | metadata = each.value.flow_logs_config.metadata
163 | metadata_fields = (
164 | each.value.flow_logs_config.metadata == "CUSTOM_METADATA"
165 | ? each.value.flow_logs_config.metadata_fields
166 | : null
167 | )
168 | }
169 | }
170 | }
Check: CKV_GCP_26: "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network"
FAILED for resource: module.vpc-dev.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/networking/decentralized-firewall/main.tf:62-73
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/bc-gcp-logging-1.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.vpc-dev.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/networking/decentralized-firewall/main.tf:62-73
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.vpc-dev.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/networking/decentralized-firewall/main.tf:62-73
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_26: "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network"
FAILED for resource: module.vpc-dev.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/networking/decentralized-firewall/main.tf:62-73
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/bc-gcp-logging-1.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.vpc-dev.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/networking/decentralized-firewall/main.tf:62-73
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.vpc-dev.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/networking/decentralized-firewall/main.tf:62-73
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.vpc-prod.google_compute_subnetwork.subnetwork
File: /modules/net-vpc/subnets.tf:132-170
Calling File: /blueprints/networking/decentralized-firewall/main.tf:49-60
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
132 | resource "google_compute_subnetwork" "subnetwork" {
133 | for_each = local.subnets
134 | project = var.project_id
135 | network = local.network.name
136 | name = each.value.name
137 | region = each.value.region
138 | ip_cidr_range = each.value.ip_cidr_range
139 | description = (
140 | each.value.description == null
141 | ? "Terraform-managed."
142 | : each.value.description
143 | )
144 | private_ip_google_access = each.value.enable_private_access
145 | secondary_ip_range = each.value.secondary_ip_ranges == null ? [] : [
146 | for name, range in each.value.secondary_ip_ranges :
147 | { range_name = name, ip_cidr_range = range }
148 | ]
149 | stack_type = (
150 | try(each.value.ipv6, null) != null ? "IPV4_IPV6" : null
151 | )
152 | ipv6_access_type = (
153 | try(each.value.ipv6, null) != null ? each.value.ipv6.access_type : null
154 | )
155 | # private_ipv6_google_access = try(each.value.ipv6.enable_private_access, null)
156 | dynamic "log_config" {
157 | for_each = each.value.flow_logs_config != null ? [""] : []
158 | content {
159 | aggregation_interval = each.value.flow_logs_config.aggregation_interval
160 | filter_expr = each.value.flow_logs_config.filter_expression
161 | flow_sampling = each.value.flow_logs_config.flow_sampling
162 | metadata = each.value.flow_logs_config.metadata
163 | metadata_fields = (
164 | each.value.flow_logs_config.metadata == "CUSTOM_METADATA"
165 | ? each.value.flow_logs_config.metadata_fields
166 | : null
167 | )
168 | }
169 | }
170 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.vpc-prod.google_compute_subnetwork.subnetwork
File: /modules/net-vpc/subnets.tf:132-170
Calling File: /blueprints/networking/decentralized-firewall/main.tf:49-60
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
132 | resource "google_compute_subnetwork" "subnetwork" {
133 | for_each = local.subnets
134 | project = var.project_id
135 | network = local.network.name
136 | name = each.value.name
137 | region = each.value.region
138 | ip_cidr_range = each.value.ip_cidr_range
139 | description = (
140 | each.value.description == null
141 | ? "Terraform-managed."
142 | : each.value.description
143 | )
144 | private_ip_google_access = each.value.enable_private_access
145 | secondary_ip_range = each.value.secondary_ip_ranges == null ? [] : [
146 | for name, range in each.value.secondary_ip_ranges :
147 | { range_name = name, ip_cidr_range = range }
148 | ]
149 | stack_type = (
150 | try(each.value.ipv6, null) != null ? "IPV4_IPV6" : null
151 | )
152 | ipv6_access_type = (
153 | try(each.value.ipv6, null) != null ? each.value.ipv6.access_type : null
154 | )
155 | # private_ipv6_google_access = try(each.value.ipv6.enable_private_access, null)
156 | dynamic "log_config" {
157 | for_each = each.value.flow_logs_config != null ? [""] : []
158 | content {
159 | aggregation_interval = each.value.flow_logs_config.aggregation_interval
160 | filter_expr = each.value.flow_logs_config.filter_expression
161 | flow_sampling = each.value.flow_logs_config.flow_sampling
162 | metadata = each.value.flow_logs_config.metadata
163 | metadata_fields = (
164 | each.value.flow_logs_config.metadata == "CUSTOM_METADATA"
165 | ? each.value.flow_logs_config.metadata_fields
166 | : null
167 | )
168 | }
169 | }
170 | }
Check: CKV_GCP_26: "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network"
FAILED for resource: module.vpc-prod.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/networking/decentralized-firewall/main.tf:49-60
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/bc-gcp-logging-1.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.vpc-prod.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/networking/decentralized-firewall/main.tf:49-60
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.vpc-prod.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/networking/decentralized-firewall/main.tf:49-60
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_26: "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network"
FAILED for resource: module.vpc-prod.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/networking/decentralized-firewall/main.tf:49-60
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/bc-gcp-logging-1.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.vpc-prod.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/networking/decentralized-firewall/main.tf:49-60
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.vpc-prod.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/networking/decentralized-firewall/main.tf:49-60
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.vpc-consumer.google_compute_subnetwork.subnetwork
File: /modules/net-vpc/subnets.tf:132-170
Calling File: /blueprints/networking/filtering-proxy-psc/consumer.tf:21-32
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
132 | resource "google_compute_subnetwork" "subnetwork" {
133 | for_each = local.subnets
134 | project = var.project_id
135 | network = local.network.name
136 | name = each.value.name
137 | region = each.value.region
138 | ip_cidr_range = each.value.ip_cidr_range
139 | description = (
140 | each.value.description == null
141 | ? "Terraform-managed."
142 | : each.value.description
143 | )
144 | private_ip_google_access = each.value.enable_private_access
145 | secondary_ip_range = each.value.secondary_ip_ranges == null ? [] : [
146 | for name, range in each.value.secondary_ip_ranges :
147 | { range_name = name, ip_cidr_range = range }
148 | ]
149 | stack_type = (
150 | try(each.value.ipv6, null) != null ? "IPV4_IPV6" : null
151 | )
152 | ipv6_access_type = (
153 | try(each.value.ipv6, null) != null ? each.value.ipv6.access_type : null
154 | )
155 | # private_ipv6_google_access = try(each.value.ipv6.enable_private_access, null)
156 | dynamic "log_config" {
157 | for_each = each.value.flow_logs_config != null ? [""] : []
158 | content {
159 | aggregation_interval = each.value.flow_logs_config.aggregation_interval
160 | filter_expr = each.value.flow_logs_config.filter_expression
161 | flow_sampling = each.value.flow_logs_config.flow_sampling
162 | metadata = each.value.flow_logs_config.metadata
163 | metadata_fields = (
164 | each.value.flow_logs_config.metadata == "CUSTOM_METADATA"
165 | ? each.value.flow_logs_config.metadata_fields
166 | : null
167 | )
168 | }
169 | }
170 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.vpc-consumer.google_compute_subnetwork.subnetwork
File: /modules/net-vpc/subnets.tf:132-170
Calling File: /blueprints/networking/filtering-proxy-psc/consumer.tf:21-32
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
132 | resource "google_compute_subnetwork" "subnetwork" {
133 | for_each = local.subnets
134 | project = var.project_id
135 | network = local.network.name
136 | name = each.value.name
137 | region = each.value.region
138 | ip_cidr_range = each.value.ip_cidr_range
139 | description = (
140 | each.value.description == null
141 | ? "Terraform-managed."
142 | : each.value.description
143 | )
144 | private_ip_google_access = each.value.enable_private_access
145 | secondary_ip_range = each.value.secondary_ip_ranges == null ? [] : [
146 | for name, range in each.value.secondary_ip_ranges :
147 | { range_name = name, ip_cidr_range = range }
148 | ]
149 | stack_type = (
150 | try(each.value.ipv6, null) != null ? "IPV4_IPV6" : null
151 | )
152 | ipv6_access_type = (
153 | try(each.value.ipv6, null) != null ? each.value.ipv6.access_type : null
154 | )
155 | # private_ipv6_google_access = try(each.value.ipv6.enable_private_access, null)
156 | dynamic "log_config" {
157 | for_each = each.value.flow_logs_config != null ? [""] : []
158 | content {
159 | aggregation_interval = each.value.flow_logs_config.aggregation_interval
160 | filter_expr = each.value.flow_logs_config.filter_expression
161 | flow_sampling = each.value.flow_logs_config.flow_sampling
162 | metadata = each.value.flow_logs_config.metadata
163 | metadata_fields = (
164 | each.value.flow_logs_config.metadata == "CUSTOM_METADATA"
165 | ? each.value.flow_logs_config.metadata_fields
166 | : null
167 | )
168 | }
169 | }
170 | }
Check: CKV_GCP_26: "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network"
FAILED for resource: module.vpc-consumer.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/networking/filtering-proxy-psc/consumer.tf:21-32
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/bc-gcp-logging-1.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.vpc-consumer.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/networking/filtering-proxy-psc/consumer.tf:21-32
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.vpc-consumer.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/networking/filtering-proxy-psc/consumer.tf:21-32
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_26: "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network"
FAILED for resource: module.vpc-consumer.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/networking/filtering-proxy-psc/consumer.tf:21-32
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/bc-gcp-logging-1.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.vpc-consumer.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/networking/filtering-proxy-psc/consumer.tf:21-32
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.vpc-consumer.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/networking/filtering-proxy-psc/consumer.tf:21-32
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.vpc_landing_trusted.google_compute_subnetwork.subnetwork
File: /modules/net-vpc/subnets.tf:132-170
Calling File: /blueprints/networking/glb-hybrid-neg-internal/main.tf:79-95
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
132 | resource "google_compute_subnetwork" "subnetwork" {
133 | for_each = local.subnets
134 | project = var.project_id
135 | network = local.network.name
136 | name = each.value.name
137 | region = each.value.region
138 | ip_cidr_range = each.value.ip_cidr_range
139 | description = (
140 | each.value.description == null
141 | ? "Terraform-managed."
142 | : each.value.description
143 | )
144 | private_ip_google_access = each.value.enable_private_access
145 | secondary_ip_range = each.value.secondary_ip_ranges == null ? [] : [
146 | for name, range in each.value.secondary_ip_ranges :
147 | { range_name = name, ip_cidr_range = range }
148 | ]
149 | stack_type = (
150 | try(each.value.ipv6, null) != null ? "IPV4_IPV6" : null
151 | )
152 | ipv6_access_type = (
153 | try(each.value.ipv6, null) != null ? each.value.ipv6.access_type : null
154 | )
155 | # private_ipv6_google_access = try(each.value.ipv6.enable_private_access, null)
156 | dynamic "log_config" {
157 | for_each = each.value.flow_logs_config != null ? [""] : []
158 | content {
159 | aggregation_interval = each.value.flow_logs_config.aggregation_interval
160 | filter_expr = each.value.flow_logs_config.filter_expression
161 | flow_sampling = each.value.flow_logs_config.flow_sampling
162 | metadata = each.value.flow_logs_config.metadata
163 | metadata_fields = (
164 | each.value.flow_logs_config.metadata == "CUSTOM_METADATA"
165 | ? each.value.flow_logs_config.metadata_fields
166 | : null
167 | )
168 | }
169 | }
170 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.vpc_landing_trusted.google_compute_subnetwork.subnetwork
File: /modules/net-vpc/subnets.tf:132-170
Calling File: /blueprints/networking/glb-hybrid-neg-internal/main.tf:79-95
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
132 | resource "google_compute_subnetwork" "subnetwork" {
133 | for_each = local.subnets
134 | project = var.project_id
135 | network = local.network.name
136 | name = each.value.name
137 | region = each.value.region
138 | ip_cidr_range = each.value.ip_cidr_range
139 | description = (
140 | each.value.description == null
141 | ? "Terraform-managed."
142 | : each.value.description
143 | )
144 | private_ip_google_access = each.value.enable_private_access
145 | secondary_ip_range = each.value.secondary_ip_ranges == null ? [] : [
146 | for name, range in each.value.secondary_ip_ranges :
147 | { range_name = name, ip_cidr_range = range }
148 | ]
149 | stack_type = (
150 | try(each.value.ipv6, null) != null ? "IPV4_IPV6" : null
151 | )
152 | ipv6_access_type = (
153 | try(each.value.ipv6, null) != null ? each.value.ipv6.access_type : null
154 | )
155 | # private_ipv6_google_access = try(each.value.ipv6.enable_private_access, null)
156 | dynamic "log_config" {
157 | for_each = each.value.flow_logs_config != null ? [""] : []
158 | content {
159 | aggregation_interval = each.value.flow_logs_config.aggregation_interval
160 | filter_expr = each.value.flow_logs_config.filter_expression
161 | flow_sampling = each.value.flow_logs_config.flow_sampling
162 | metadata = each.value.flow_logs_config.metadata
163 | metadata_fields = (
164 | each.value.flow_logs_config.metadata == "CUSTOM_METADATA"
165 | ? each.value.flow_logs_config.metadata_fields
166 | : null
167 | )
168 | }
169 | }
170 | }
Check: CKV_GCP_26: "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network"
FAILED for resource: module.vpc_landing_trusted.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/networking/glb-hybrid-neg-internal/main.tf:79-95
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/bc-gcp-logging-1.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.vpc_landing_trusted.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/networking/glb-hybrid-neg-internal/main.tf:79-95
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.vpc_landing_trusted.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/networking/glb-hybrid-neg-internal/main.tf:79-95
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_26: "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network"
FAILED for resource: module.vpc_landing_trusted.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/networking/glb-hybrid-neg-internal/main.tf:79-95
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/bc-gcp-logging-1.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.vpc_landing_trusted.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/networking/glb-hybrid-neg-internal/main.tf:79-95
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.vpc_landing_trusted.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/networking/glb-hybrid-neg-internal/main.tf:79-95
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.vpc_landing_untrusted.google_compute_subnetwork.subnetwork
File: /modules/net-vpc/subnets.tf:132-170
Calling File: /blueprints/networking/glb-hybrid-neg-internal/main.tf:47-77
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
132 | resource "google_compute_subnetwork" "subnetwork" {
133 | for_each = local.subnets
134 | project = var.project_id
135 | network = local.network.name
136 | name = each.value.name
137 | region = each.value.region
138 | ip_cidr_range = each.value.ip_cidr_range
139 | description = (
140 | each.value.description == null
141 | ? "Terraform-managed."
142 | : each.value.description
143 | )
144 | private_ip_google_access = each.value.enable_private_access
145 | secondary_ip_range = each.value.secondary_ip_ranges == null ? [] : [
146 | for name, range in each.value.secondary_ip_ranges :
147 | { range_name = name, ip_cidr_range = range }
148 | ]
149 | stack_type = (
150 | try(each.value.ipv6, null) != null ? "IPV4_IPV6" : null
151 | )
152 | ipv6_access_type = (
153 | try(each.value.ipv6, null) != null ? each.value.ipv6.access_type : null
154 | )
155 | # private_ipv6_google_access = try(each.value.ipv6.enable_private_access, null)
156 | dynamic "log_config" {
157 | for_each = each.value.flow_logs_config != null ? [""] : []
158 | content {
159 | aggregation_interval = each.value.flow_logs_config.aggregation_interval
160 | filter_expr = each.value.flow_logs_config.filter_expression
161 | flow_sampling = each.value.flow_logs_config.flow_sampling
162 | metadata = each.value.flow_logs_config.metadata
163 | metadata_fields = (
164 | each.value.flow_logs_config.metadata == "CUSTOM_METADATA"
165 | ? each.value.flow_logs_config.metadata_fields
166 | : null
167 | )
168 | }
169 | }
170 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.vpc_landing_untrusted.google_compute_subnetwork.subnetwork
File: /modules/net-vpc/subnets.tf:132-170
Calling File: /blueprints/networking/glb-hybrid-neg-internal/main.tf:47-77
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
132 | resource "google_compute_subnetwork" "subnetwork" {
133 | for_each = local.subnets
134 | project = var.project_id
135 | network = local.network.name
136 | name = each.value.name
137 | region = each.value.region
138 | ip_cidr_range = each.value.ip_cidr_range
139 | description = (
140 | each.value.description == null
141 | ? "Terraform-managed."
142 | : each.value.description
143 | )
144 | private_ip_google_access = each.value.enable_private_access
145 | secondary_ip_range = each.value.secondary_ip_ranges == null ? [] : [
146 | for name, range in each.value.secondary_ip_ranges :
147 | { range_name = name, ip_cidr_range = range }
148 | ]
149 | stack_type = (
150 | try(each.value.ipv6, null) != null ? "IPV4_IPV6" : null
151 | )
152 | ipv6_access_type = (
153 | try(each.value.ipv6, null) != null ? each.value.ipv6.access_type : null
154 | )
155 | # private_ipv6_google_access = try(each.value.ipv6.enable_private_access, null)
156 | dynamic "log_config" {
157 | for_each = each.value.flow_logs_config != null ? [""] : []
158 | content {
159 | aggregation_interval = each.value.flow_logs_config.aggregation_interval
160 | filter_expr = each.value.flow_logs_config.filter_expression
161 | flow_sampling = each.value.flow_logs_config.flow_sampling
162 | metadata = each.value.flow_logs_config.metadata
163 | metadata_fields = (
164 | each.value.flow_logs_config.metadata == "CUSTOM_METADATA"
165 | ? each.value.flow_logs_config.metadata_fields
166 | : null
167 | )
168 | }
169 | }
170 | }
Check: CKV_GCP_26: "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network"
FAILED for resource: module.vpc_landing_untrusted.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/networking/glb-hybrid-neg-internal/main.tf:47-77
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/bc-gcp-logging-1.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.vpc_landing_untrusted.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/networking/glb-hybrid-neg-internal/main.tf:47-77
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.vpc_landing_untrusted.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/networking/glb-hybrid-neg-internal/main.tf:47-77
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_26: "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network"
FAILED for resource: module.vpc_landing_untrusted.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/networking/glb-hybrid-neg-internal/main.tf:47-77
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/bc-gcp-logging-1.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.vpc_landing_untrusted.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/networking/glb-hybrid-neg-internal/main.tf:47-77
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.vpc_landing_untrusted.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/networking/glb-hybrid-neg-internal/main.tf:47-77
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.vpc_spoke_01.google_compute_subnetwork.subnetwork
File: /modules/net-vpc/subnets.tf:132-170
Calling File: /blueprints/networking/glb-hybrid-neg-internal/spoke.tf:41-61
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
132 | resource "google_compute_subnetwork" "subnetwork" {
133 | for_each = local.subnets
134 | project = var.project_id
135 | network = local.network.name
136 | name = each.value.name
137 | region = each.value.region
138 | ip_cidr_range = each.value.ip_cidr_range
139 | description = (
140 | each.value.description == null
141 | ? "Terraform-managed."
142 | : each.value.description
143 | )
144 | private_ip_google_access = each.value.enable_private_access
145 | secondary_ip_range = each.value.secondary_ip_ranges == null ? [] : [
146 | for name, range in each.value.secondary_ip_ranges :
147 | { range_name = name, ip_cidr_range = range }
148 | ]
149 | stack_type = (
150 | try(each.value.ipv6, null) != null ? "IPV4_IPV6" : null
151 | )
152 | ipv6_access_type = (
153 | try(each.value.ipv6, null) != null ? each.value.ipv6.access_type : null
154 | )
155 | # private_ipv6_google_access = try(each.value.ipv6.enable_private_access, null)
156 | dynamic "log_config" {
157 | for_each = each.value.flow_logs_config != null ? [""] : []
158 | content {
159 | aggregation_interval = each.value.flow_logs_config.aggregation_interval
160 | filter_expr = each.value.flow_logs_config.filter_expression
161 | flow_sampling = each.value.flow_logs_config.flow_sampling
162 | metadata = each.value.flow_logs_config.metadata
163 | metadata_fields = (
164 | each.value.flow_logs_config.metadata == "CUSTOM_METADATA"
165 | ? each.value.flow_logs_config.metadata_fields
166 | : null
167 | )
168 | }
169 | }
170 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.vpc_spoke_01.google_compute_subnetwork.subnetwork
File: /modules/net-vpc/subnets.tf:132-170
Calling File: /blueprints/networking/glb-hybrid-neg-internal/spoke.tf:41-61
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
132 | resource "google_compute_subnetwork" "subnetwork" {
133 | for_each = local.subnets
134 | project = var.project_id
135 | network = local.network.name
136 | name = each.value.name
137 | region = each.value.region
138 | ip_cidr_range = each.value.ip_cidr_range
139 | description = (
140 | each.value.description == null
141 | ? "Terraform-managed."
142 | : each.value.description
143 | )
144 | private_ip_google_access = each.value.enable_private_access
145 | secondary_ip_range = each.value.secondary_ip_ranges == null ? [] : [
146 | for name, range in each.value.secondary_ip_ranges :
147 | { range_name = name, ip_cidr_range = range }
148 | ]
149 | stack_type = (
150 | try(each.value.ipv6, null) != null ? "IPV4_IPV6" : null
151 | )
152 | ipv6_access_type = (
153 | try(each.value.ipv6, null) != null ? each.value.ipv6.access_type : null
154 | )
155 | # private_ipv6_google_access = try(each.value.ipv6.enable_private_access, null)
156 | dynamic "log_config" {
157 | for_each = each.value.flow_logs_config != null ? [""] : []
158 | content {
159 | aggregation_interval = each.value.flow_logs_config.aggregation_interval
160 | filter_expr = each.value.flow_logs_config.filter_expression
161 | flow_sampling = each.value.flow_logs_config.flow_sampling
162 | metadata = each.value.flow_logs_config.metadata
163 | metadata_fields = (
164 | each.value.flow_logs_config.metadata == "CUSTOM_METADATA"
165 | ? each.value.flow_logs_config.metadata_fields
166 | : null
167 | )
168 | }
169 | }
170 | }
Check: CKV_GCP_26: "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network"
FAILED for resource: module.vpc_spoke_01.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/networking/glb-hybrid-neg-internal/spoke.tf:41-61
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/bc-gcp-logging-1.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.vpc_spoke_01.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/networking/glb-hybrid-neg-internal/spoke.tf:41-61
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.vpc_spoke_01.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/networking/glb-hybrid-neg-internal/spoke.tf:41-61
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_26: "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network"
FAILED for resource: module.vpc_spoke_01.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/networking/glb-hybrid-neg-internal/spoke.tf:41-61
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/bc-gcp-logging-1.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.vpc_spoke_01.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/networking/glb-hybrid-neg-internal/spoke.tf:41-61
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.vpc_spoke_01.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/networking/glb-hybrid-neg-internal/spoke.tf:41-61
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.vpc-hub.google_compute_subnetwork.subnetwork
File: /modules/net-vpc/subnets.tf:132-170
Calling File: /blueprints/networking/private-cloud-function-from-onprem/main.tf:59-70
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
132 | resource "google_compute_subnetwork" "subnetwork" {
133 | for_each = local.subnets
134 | project = var.project_id
135 | network = local.network.name
136 | name = each.value.name
137 | region = each.value.region
138 | ip_cidr_range = each.value.ip_cidr_range
139 | description = (
140 | each.value.description == null
141 | ? "Terraform-managed."
142 | : each.value.description
143 | )
144 | private_ip_google_access = each.value.enable_private_access
145 | secondary_ip_range = each.value.secondary_ip_ranges == null ? [] : [
146 | for name, range in each.value.secondary_ip_ranges :
147 | { range_name = name, ip_cidr_range = range }
148 | ]
149 | stack_type = (
150 | try(each.value.ipv6, null) != null ? "IPV4_IPV6" : null
151 | )
152 | ipv6_access_type = (
153 | try(each.value.ipv6, null) != null ? each.value.ipv6.access_type : null
154 | )
155 | # private_ipv6_google_access = try(each.value.ipv6.enable_private_access, null)
156 | dynamic "log_config" {
157 | for_each = each.value.flow_logs_config != null ? [""] : []
158 | content {
159 | aggregation_interval = each.value.flow_logs_config.aggregation_interval
160 | filter_expr = each.value.flow_logs_config.filter_expression
161 | flow_sampling = each.value.flow_logs_config.flow_sampling
162 | metadata = each.value.flow_logs_config.metadata
163 | metadata_fields = (
164 | each.value.flow_logs_config.metadata == "CUSTOM_METADATA"
165 | ? each.value.flow_logs_config.metadata_fields
166 | : null
167 | )
168 | }
169 | }
170 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.vpc-hub.google_compute_subnetwork.subnetwork
File: /modules/net-vpc/subnets.tf:132-170
Calling File: /blueprints/networking/private-cloud-function-from-onprem/main.tf:59-70
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
132 | resource "google_compute_subnetwork" "subnetwork" {
133 | for_each = local.subnets
134 | project = var.project_id
135 | network = local.network.name
136 | name = each.value.name
137 | region = each.value.region
138 | ip_cidr_range = each.value.ip_cidr_range
139 | description = (
140 | each.value.description == null
141 | ? "Terraform-managed."
142 | : each.value.description
143 | )
144 | private_ip_google_access = each.value.enable_private_access
145 | secondary_ip_range = each.value.secondary_ip_ranges == null ? [] : [
146 | for name, range in each.value.secondary_ip_ranges :
147 | { range_name = name, ip_cidr_range = range }
148 | ]
149 | stack_type = (
150 | try(each.value.ipv6, null) != null ? "IPV4_IPV6" : null
151 | )
152 | ipv6_access_type = (
153 | try(each.value.ipv6, null) != null ? each.value.ipv6.access_type : null
154 | )
155 | # private_ipv6_google_access = try(each.value.ipv6.enable_private_access, null)
156 | dynamic "log_config" {
157 | for_each = each.value.flow_logs_config != null ? [""] : []
158 | content {
159 | aggregation_interval = each.value.flow_logs_config.aggregation_interval
160 | filter_expr = each.value.flow_logs_config.filter_expression
161 | flow_sampling = each.value.flow_logs_config.flow_sampling
162 | metadata = each.value.flow_logs_config.metadata
163 | metadata_fields = (
164 | each.value.flow_logs_config.metadata == "CUSTOM_METADATA"
165 | ? each.value.flow_logs_config.metadata_fields
166 | : null
167 | )
168 | }
169 | }
170 | }
Check: CKV_GCP_26: "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network"
FAILED for resource: module.vpc-hub.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/networking/private-cloud-function-from-onprem/main.tf:59-70
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/bc-gcp-logging-1.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.vpc-hub.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/networking/private-cloud-function-from-onprem/main.tf:59-70
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.vpc-hub.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/networking/private-cloud-function-from-onprem/main.tf:59-70
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_26: "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network"
FAILED for resource: module.vpc-hub.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/networking/private-cloud-function-from-onprem/main.tf:59-70
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/bc-gcp-logging-1.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.vpc-hub.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/networking/private-cloud-function-from-onprem/main.tf:59-70
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.vpc-hub.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/networking/private-cloud-function-from-onprem/main.tf:59-70
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.vpc-spoke-1.google_compute_subnetwork.subnetwork
File: /modules/net-vpc/subnets.tf:132-170
Calling File: /blueprints/networking/hub-and-spoke-peering/main.tf:85-96
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
132 | resource "google_compute_subnetwork" "subnetwork" {
133 | for_each = local.subnets
134 | project = var.project_id
135 | network = local.network.name
136 | name = each.value.name
137 | region = each.value.region
138 | ip_cidr_range = each.value.ip_cidr_range
139 | description = (
140 | each.value.description == null
141 | ? "Terraform-managed."
142 | : each.value.description
143 | )
144 | private_ip_google_access = each.value.enable_private_access
145 | secondary_ip_range = each.value.secondary_ip_ranges == null ? [] : [
146 | for name, range in each.value.secondary_ip_ranges :
147 | { range_name = name, ip_cidr_range = range }
148 | ]
149 | stack_type = (
150 | try(each.value.ipv6, null) != null ? "IPV4_IPV6" : null
151 | )
152 | ipv6_access_type = (
153 | try(each.value.ipv6, null) != null ? each.value.ipv6.access_type : null
154 | )
155 | # private_ipv6_google_access = try(each.value.ipv6.enable_private_access, null)
156 | dynamic "log_config" {
157 | for_each = each.value.flow_logs_config != null ? [""] : []
158 | content {
159 | aggregation_interval = each.value.flow_logs_config.aggregation_interval
160 | filter_expr = each.value.flow_logs_config.filter_expression
161 | flow_sampling = each.value.flow_logs_config.flow_sampling
162 | metadata = each.value.flow_logs_config.metadata
163 | metadata_fields = (
164 | each.value.flow_logs_config.metadata == "CUSTOM_METADATA"
165 | ? each.value.flow_logs_config.metadata_fields
166 | : null
167 | )
168 | }
169 | }
170 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.vpc-spoke-1.google_compute_subnetwork.subnetwork
File: /modules/net-vpc/subnets.tf:132-170
Calling File: /blueprints/networking/hub-and-spoke-peering/main.tf:85-96
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
132 | resource "google_compute_subnetwork" "subnetwork" {
133 | for_each = local.subnets
134 | project = var.project_id
135 | network = local.network.name
136 | name = each.value.name
137 | region = each.value.region
138 | ip_cidr_range = each.value.ip_cidr_range
139 | description = (
140 | each.value.description == null
141 | ? "Terraform-managed."
142 | : each.value.description
143 | )
144 | private_ip_google_access = each.value.enable_private_access
145 | secondary_ip_range = each.value.secondary_ip_ranges == null ? [] : [
146 | for name, range in each.value.secondary_ip_ranges :
147 | { range_name = name, ip_cidr_range = range }
148 | ]
149 | stack_type = (
150 | try(each.value.ipv6, null) != null ? "IPV4_IPV6" : null
151 | )
152 | ipv6_access_type = (
153 | try(each.value.ipv6, null) != null ? each.value.ipv6.access_type : null
154 | )
155 | # private_ipv6_google_access = try(each.value.ipv6.enable_private_access, null)
156 | dynamic "log_config" {
157 | for_each = each.value.flow_logs_config != null ? [""] : []
158 | content {
159 | aggregation_interval = each.value.flow_logs_config.aggregation_interval
160 | filter_expr = each.value.flow_logs_config.filter_expression
161 | flow_sampling = each.value.flow_logs_config.flow_sampling
162 | metadata = each.value.flow_logs_config.metadata
163 | metadata_fields = (
164 | each.value.flow_logs_config.metadata == "CUSTOM_METADATA"
165 | ? each.value.flow_logs_config.metadata_fields
166 | : null
167 | )
168 | }
169 | }
170 | }
Check: CKV_GCP_26: "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network"
FAILED for resource: module.vpc-spoke-1.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/networking/hub-and-spoke-peering/main.tf:85-96
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/bc-gcp-logging-1.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.vpc-spoke-1.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/networking/hub-and-spoke-peering/main.tf:85-96
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.vpc-spoke-1.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/networking/hub-and-spoke-peering/main.tf:85-96
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_26: "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network"
FAILED for resource: module.vpc-spoke-1.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/networking/hub-and-spoke-peering/main.tf:85-96
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/bc-gcp-logging-1.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.vpc-spoke-1.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/networking/hub-and-spoke-peering/main.tf:85-96
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.vpc-spoke-1.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/networking/hub-and-spoke-peering/main.tf:85-96
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.vpc-spoke-2.google_compute_subnetwork.subnetwork
File: /modules/net-vpc/subnets.tf:132-170
Calling File: /blueprints/networking/hub-and-spoke-peering/main.tf:130-145
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
132 | resource "google_compute_subnetwork" "subnetwork" {
133 | for_each = local.subnets
134 | project = var.project_id
135 | network = local.network.name
136 | name = each.value.name
137 | region = each.value.region
138 | ip_cidr_range = each.value.ip_cidr_range
139 | description = (
140 | each.value.description == null
141 | ? "Terraform-managed."
142 | : each.value.description
143 | )
144 | private_ip_google_access = each.value.enable_private_access
145 | secondary_ip_range = each.value.secondary_ip_ranges == null ? [] : [
146 | for name, range in each.value.secondary_ip_ranges :
147 | { range_name = name, ip_cidr_range = range }
148 | ]
149 | stack_type = (
150 | try(each.value.ipv6, null) != null ? "IPV4_IPV6" : null
151 | )
152 | ipv6_access_type = (
153 | try(each.value.ipv6, null) != null ? each.value.ipv6.access_type : null
154 | )
155 | # private_ipv6_google_access = try(each.value.ipv6.enable_private_access, null)
156 | dynamic "log_config" {
157 | for_each = each.value.flow_logs_config != null ? [""] : []
158 | content {
159 | aggregation_interval = each.value.flow_logs_config.aggregation_interval
160 | filter_expr = each.value.flow_logs_config.filter_expression
161 | flow_sampling = each.value.flow_logs_config.flow_sampling
162 | metadata = each.value.flow_logs_config.metadata
163 | metadata_fields = (
164 | each.value.flow_logs_config.metadata == "CUSTOM_METADATA"
165 | ? each.value.flow_logs_config.metadata_fields
166 | : null
167 | )
168 | }
169 | }
170 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.vpc-spoke-2.google_compute_subnetwork.subnetwork
File: /modules/net-vpc/subnets.tf:132-170
Calling File: /blueprints/networking/hub-and-spoke-peering/main.tf:130-145
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
132 | resource "google_compute_subnetwork" "subnetwork" {
133 | for_each = local.subnets
134 | project = var.project_id
135 | network = local.network.name
136 | name = each.value.name
137 | region = each.value.region
138 | ip_cidr_range = each.value.ip_cidr_range
139 | description = (
140 | each.value.description == null
141 | ? "Terraform-managed."
142 | : each.value.description
143 | )
144 | private_ip_google_access = each.value.enable_private_access
145 | secondary_ip_range = each.value.secondary_ip_ranges == null ? [] : [
146 | for name, range in each.value.secondary_ip_ranges :
147 | { range_name = name, ip_cidr_range = range }
148 | ]
149 | stack_type = (
150 | try(each.value.ipv6, null) != null ? "IPV4_IPV6" : null
151 | )
152 | ipv6_access_type = (
153 | try(each.value.ipv6, null) != null ? each.value.ipv6.access_type : null
154 | )
155 | # private_ipv6_google_access = try(each.value.ipv6.enable_private_access, null)
156 | dynamic "log_config" {
157 | for_each = each.value.flow_logs_config != null ? [""] : []
158 | content {
159 | aggregation_interval = each.value.flow_logs_config.aggregation_interval
160 | filter_expr = each.value.flow_logs_config.filter_expression
161 | flow_sampling = each.value.flow_logs_config.flow_sampling
162 | metadata = each.value.flow_logs_config.metadata
163 | metadata_fields = (
164 | each.value.flow_logs_config.metadata == "CUSTOM_METADATA"
165 | ? each.value.flow_logs_config.metadata_fields
166 | : null
167 | )
168 | }
169 | }
170 | }
Check: CKV_GCP_26: "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network"
FAILED for resource: module.vpc-spoke-2.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/networking/hub-and-spoke-peering/main.tf:130-145
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/bc-gcp-logging-1.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.vpc-spoke-2.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/networking/hub-and-spoke-peering/main.tf:130-145
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.vpc-spoke-2.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/networking/hub-and-spoke-peering/main.tf:130-145
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_26: "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network"
FAILED for resource: module.vpc-spoke-2.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/networking/hub-and-spoke-peering/main.tf:130-145
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/bc-gcp-logging-1.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.vpc-spoke-2.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/networking/hub-and-spoke-peering/main.tf:130-145
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.vpc-spoke-2.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/networking/hub-and-spoke-peering/main.tf:130-145
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.dev-vpc.google_compute_subnetwork.subnetwork
File: /modules/net-vpc/subnets.tf:132-170
Calling File: /blueprints/networking/hub-and-spoke-vpn/net-dev.tf:17-39
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
132 | resource "google_compute_subnetwork" "subnetwork" {
133 | for_each = local.subnets
134 | project = var.project_id
135 | network = local.network.name
136 | name = each.value.name
137 | region = each.value.region
138 | ip_cidr_range = each.value.ip_cidr_range
139 | description = (
140 | each.value.description == null
141 | ? "Terraform-managed."
142 | : each.value.description
143 | )
144 | private_ip_google_access = each.value.enable_private_access
145 | secondary_ip_range = each.value.secondary_ip_ranges == null ? [] : [
146 | for name, range in each.value.secondary_ip_ranges :
147 | { range_name = name, ip_cidr_range = range }
148 | ]
149 | stack_type = (
150 | try(each.value.ipv6, null) != null ? "IPV4_IPV6" : null
151 | )
152 | ipv6_access_type = (
153 | try(each.value.ipv6, null) != null ? each.value.ipv6.access_type : null
154 | )
155 | # private_ipv6_google_access = try(each.value.ipv6.enable_private_access, null)
156 | dynamic "log_config" {
157 | for_each = each.value.flow_logs_config != null ? [""] : []
158 | content {
159 | aggregation_interval = each.value.flow_logs_config.aggregation_interval
160 | filter_expr = each.value.flow_logs_config.filter_expression
161 | flow_sampling = each.value.flow_logs_config.flow_sampling
162 | metadata = each.value.flow_logs_config.metadata
163 | metadata_fields = (
164 | each.value.flow_logs_config.metadata == "CUSTOM_METADATA"
165 | ? each.value.flow_logs_config.metadata_fields
166 | : null
167 | )
168 | }
169 | }
170 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.dev-vpc.google_compute_subnetwork.subnetwork
File: /modules/net-vpc/subnets.tf:132-170
Calling File: /blueprints/networking/hub-and-spoke-vpn/net-dev.tf:17-39
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
132 | resource "google_compute_subnetwork" "subnetwork" {
133 | for_each = local.subnets
134 | project = var.project_id
135 | network = local.network.name
136 | name = each.value.name
137 | region = each.value.region
138 | ip_cidr_range = each.value.ip_cidr_range
139 | description = (
140 | each.value.description == null
141 | ? "Terraform-managed."
142 | : each.value.description
143 | )
144 | private_ip_google_access = each.value.enable_private_access
145 | secondary_ip_range = each.value.secondary_ip_ranges == null ? [] : [
146 | for name, range in each.value.secondary_ip_ranges :
147 | { range_name = name, ip_cidr_range = range }
148 | ]
149 | stack_type = (
150 | try(each.value.ipv6, null) != null ? "IPV4_IPV6" : null
151 | )
152 | ipv6_access_type = (
153 | try(each.value.ipv6, null) != null ? each.value.ipv6.access_type : null
154 | )
155 | # private_ipv6_google_access = try(each.value.ipv6.enable_private_access, null)
156 | dynamic "log_config" {
157 | for_each = each.value.flow_logs_config != null ? [""] : []
158 | content {
159 | aggregation_interval = each.value.flow_logs_config.aggregation_interval
160 | filter_expr = each.value.flow_logs_config.filter_expression
161 | flow_sampling = each.value.flow_logs_config.flow_sampling
162 | metadata = each.value.flow_logs_config.metadata
163 | metadata_fields = (
164 | each.value.flow_logs_config.metadata == "CUSTOM_METADATA"
165 | ? each.value.flow_logs_config.metadata_fields
166 | : null
167 | )
168 | }
169 | }
170 | }
Check: CKV_GCP_26: "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network"
FAILED for resource: module.dev-vpc.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/networking/hub-and-spoke-vpn/net-dev.tf:17-39
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/bc-gcp-logging-1.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.dev-vpc.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/networking/hub-and-spoke-vpn/net-dev.tf:17-39
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.dev-vpc.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/networking/hub-and-spoke-vpn/net-dev.tf:17-39
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_26: "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network"
FAILED for resource: module.dev-vpc.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/networking/hub-and-spoke-vpn/net-dev.tf:17-39
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/bc-gcp-logging-1.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.dev-vpc.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/networking/hub-and-spoke-vpn/net-dev.tf:17-39
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.dev-vpc.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/networking/hub-and-spoke-vpn/net-dev.tf:17-39
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.prod-vpc.google_compute_subnetwork.subnetwork
File: /modules/net-vpc/subnets.tf:132-170
Calling File: /blueprints/networking/hub-and-spoke-vpn/net-prod.tf:17-39
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
132 | resource "google_compute_subnetwork" "subnetwork" {
133 | for_each = local.subnets
134 | project = var.project_id
135 | network = local.network.name
136 | name = each.value.name
137 | region = each.value.region
138 | ip_cidr_range = each.value.ip_cidr_range
139 | description = (
140 | each.value.description == null
141 | ? "Terraform-managed."
142 | : each.value.description
143 | )
144 | private_ip_google_access = each.value.enable_private_access
145 | secondary_ip_range = each.value.secondary_ip_ranges == null ? [] : [
146 | for name, range in each.value.secondary_ip_ranges :
147 | { range_name = name, ip_cidr_range = range }
148 | ]
149 | stack_type = (
150 | try(each.value.ipv6, null) != null ? "IPV4_IPV6" : null
151 | )
152 | ipv6_access_type = (
153 | try(each.value.ipv6, null) != null ? each.value.ipv6.access_type : null
154 | )
155 | # private_ipv6_google_access = try(each.value.ipv6.enable_private_access, null)
156 | dynamic "log_config" {
157 | for_each = each.value.flow_logs_config != null ? [""] : []
158 | content {
159 | aggregation_interval = each.value.flow_logs_config.aggregation_interval
160 | filter_expr = each.value.flow_logs_config.filter_expression
161 | flow_sampling = each.value.flow_logs_config.flow_sampling
162 | metadata = each.value.flow_logs_config.metadata
163 | metadata_fields = (
164 | each.value.flow_logs_config.metadata == "CUSTOM_METADATA"
165 | ? each.value.flow_logs_config.metadata_fields
166 | : null
167 | )
168 | }
169 | }
170 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.prod-vpc.google_compute_subnetwork.subnetwork
File: /modules/net-vpc/subnets.tf:132-170
Calling File: /blueprints/networking/hub-and-spoke-vpn/net-prod.tf:17-39
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
132 | resource "google_compute_subnetwork" "subnetwork" {
133 | for_each = local.subnets
134 | project = var.project_id
135 | network = local.network.name
136 | name = each.value.name
137 | region = each.value.region
138 | ip_cidr_range = each.value.ip_cidr_range
139 | description = (
140 | each.value.description == null
141 | ? "Terraform-managed."
142 | : each.value.description
143 | )
144 | private_ip_google_access = each.value.enable_private_access
145 | secondary_ip_range = each.value.secondary_ip_ranges == null ? [] : [
146 | for name, range in each.value.secondary_ip_ranges :
147 | { range_name = name, ip_cidr_range = range }
148 | ]
149 | stack_type = (
150 | try(each.value.ipv6, null) != null ? "IPV4_IPV6" : null
151 | )
152 | ipv6_access_type = (
153 | try(each.value.ipv6, null) != null ? each.value.ipv6.access_type : null
154 | )
155 | # private_ipv6_google_access = try(each.value.ipv6.enable_private_access, null)
156 | dynamic "log_config" {
157 | for_each = each.value.flow_logs_config != null ? [""] : []
158 | content {
159 | aggregation_interval = each.value.flow_logs_config.aggregation_interval
160 | filter_expr = each.value.flow_logs_config.filter_expression
161 | flow_sampling = each.value.flow_logs_config.flow_sampling
162 | metadata = each.value.flow_logs_config.metadata
163 | metadata_fields = (
164 | each.value.flow_logs_config.metadata == "CUSTOM_METADATA"
165 | ? each.value.flow_logs_config.metadata_fields
166 | : null
167 | )
168 | }
169 | }
170 | }
Check: CKV_GCP_26: "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network"
FAILED for resource: module.prod-vpc.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/networking/hub-and-spoke-vpn/net-prod.tf:17-39
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/bc-gcp-logging-1.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.prod-vpc.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/networking/hub-and-spoke-vpn/net-prod.tf:17-39
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.prod-vpc.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/networking/hub-and-spoke-vpn/net-prod.tf:17-39
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_26: "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network"
FAILED for resource: module.prod-vpc.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/networking/hub-and-spoke-vpn/net-prod.tf:17-39
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/bc-gcp-logging-1.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.prod-vpc.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/networking/hub-and-spoke-vpn/net-prod.tf:17-39
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.prod-vpc.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/networking/hub-and-spoke-vpn/net-prod.tf:17-39
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.vpc-left.google_compute_subnetwork.subnetwork
File: /modules/net-vpc/subnets.tf:132-170
Calling File: /blueprints/networking/ilb-next-hop/vpc-left.tf:17-35
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
132 | resource "google_compute_subnetwork" "subnetwork" {
133 | for_each = local.subnets
134 | project = var.project_id
135 | network = local.network.name
136 | name = each.value.name
137 | region = each.value.region
138 | ip_cidr_range = each.value.ip_cidr_range
139 | description = (
140 | each.value.description == null
141 | ? "Terraform-managed."
142 | : each.value.description
143 | )
144 | private_ip_google_access = each.value.enable_private_access
145 | secondary_ip_range = each.value.secondary_ip_ranges == null ? [] : [
146 | for name, range in each.value.secondary_ip_ranges :
147 | { range_name = name, ip_cidr_range = range }
148 | ]
149 | stack_type = (
150 | try(each.value.ipv6, null) != null ? "IPV4_IPV6" : null
151 | )
152 | ipv6_access_type = (
153 | try(each.value.ipv6, null) != null ? each.value.ipv6.access_type : null
154 | )
155 | # private_ipv6_google_access = try(each.value.ipv6.enable_private_access, null)
156 | dynamic "log_config" {
157 | for_each = each.value.flow_logs_config != null ? [""] : []
158 | content {
159 | aggregation_interval = each.value.flow_logs_config.aggregation_interval
160 | filter_expr = each.value.flow_logs_config.filter_expression
161 | flow_sampling = each.value.flow_logs_config.flow_sampling
162 | metadata = each.value.flow_logs_config.metadata
163 | metadata_fields = (
164 | each.value.flow_logs_config.metadata == "CUSTOM_METADATA"
165 | ? each.value.flow_logs_config.metadata_fields
166 | : null
167 | )
168 | }
169 | }
170 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.vpc-left.google_compute_subnetwork.subnetwork
File: /modules/net-vpc/subnets.tf:132-170
Calling File: /blueprints/networking/ilb-next-hop/vpc-left.tf:17-35
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
132 | resource "google_compute_subnetwork" "subnetwork" {
133 | for_each = local.subnets
134 | project = var.project_id
135 | network = local.network.name
136 | name = each.value.name
137 | region = each.value.region
138 | ip_cidr_range = each.value.ip_cidr_range
139 | description = (
140 | each.value.description == null
141 | ? "Terraform-managed."
142 | : each.value.description
143 | )
144 | private_ip_google_access = each.value.enable_private_access
145 | secondary_ip_range = each.value.secondary_ip_ranges == null ? [] : [
146 | for name, range in each.value.secondary_ip_ranges :
147 | { range_name = name, ip_cidr_range = range }
148 | ]
149 | stack_type = (
150 | try(each.value.ipv6, null) != null ? "IPV4_IPV6" : null
151 | )
152 | ipv6_access_type = (
153 | try(each.value.ipv6, null) != null ? each.value.ipv6.access_type : null
154 | )
155 | # private_ipv6_google_access = try(each.value.ipv6.enable_private_access, null)
156 | dynamic "log_config" {
157 | for_each = each.value.flow_logs_config != null ? [""] : []
158 | content {
159 | aggregation_interval = each.value.flow_logs_config.aggregation_interval
160 | filter_expr = each.value.flow_logs_config.filter_expression
161 | flow_sampling = each.value.flow_logs_config.flow_sampling
162 | metadata = each.value.flow_logs_config.metadata
163 | metadata_fields = (
164 | each.value.flow_logs_config.metadata == "CUSTOM_METADATA"
165 | ? each.value.flow_logs_config.metadata_fields
166 | : null
167 | )
168 | }
169 | }
170 | }
Check: CKV_GCP_26: "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network"
FAILED for resource: module.vpc-left.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/networking/ilb-next-hop/vpc-left.tf:17-35
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/bc-gcp-logging-1.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.vpc-left.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/networking/ilb-next-hop/vpc-left.tf:17-35
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.vpc-left.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/networking/ilb-next-hop/vpc-left.tf:17-35
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_26: "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network"
FAILED for resource: module.vpc-left.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/networking/ilb-next-hop/vpc-left.tf:17-35
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/bc-gcp-logging-1.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.vpc-left.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/networking/ilb-next-hop/vpc-left.tf:17-35
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.vpc-left.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/networking/ilb-next-hop/vpc-left.tf:17-35
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.vpc-right.google_compute_subnetwork.subnetwork
File: /modules/net-vpc/subnets.tf:132-170
Calling File: /blueprints/networking/ilb-next-hop/vpc-right.tf:17-46
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
132 | resource "google_compute_subnetwork" "subnetwork" {
133 | for_each = local.subnets
134 | project = var.project_id
135 | network = local.network.name
136 | name = each.value.name
137 | region = each.value.region
138 | ip_cidr_range = each.value.ip_cidr_range
139 | description = (
140 | each.value.description == null
141 | ? "Terraform-managed."
142 | : each.value.description
143 | )
144 | private_ip_google_access = each.value.enable_private_access
145 | secondary_ip_range = each.value.secondary_ip_ranges == null ? [] : [
146 | for name, range in each.value.secondary_ip_ranges :
147 | { range_name = name, ip_cidr_range = range }
148 | ]
149 | stack_type = (
150 | try(each.value.ipv6, null) != null ? "IPV4_IPV6" : null
151 | )
152 | ipv6_access_type = (
153 | try(each.value.ipv6, null) != null ? each.value.ipv6.access_type : null
154 | )
155 | # private_ipv6_google_access = try(each.value.ipv6.enable_private_access, null)
156 | dynamic "log_config" {
157 | for_each = each.value.flow_logs_config != null ? [""] : []
158 | content {
159 | aggregation_interval = each.value.flow_logs_config.aggregation_interval
160 | filter_expr = each.value.flow_logs_config.filter_expression
161 | flow_sampling = each.value.flow_logs_config.flow_sampling
162 | metadata = each.value.flow_logs_config.metadata
163 | metadata_fields = (
164 | each.value.flow_logs_config.metadata == "CUSTOM_METADATA"
165 | ? each.value.flow_logs_config.metadata_fields
166 | : null
167 | )
168 | }
169 | }
170 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.vpc-right.google_compute_subnetwork.subnetwork
File: /modules/net-vpc/subnets.tf:132-170
Calling File: /blueprints/networking/ilb-next-hop/vpc-right.tf:17-46
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
132 | resource "google_compute_subnetwork" "subnetwork" {
133 | for_each = local.subnets
134 | project = var.project_id
135 | network = local.network.name
136 | name = each.value.name
137 | region = each.value.region
138 | ip_cidr_range = each.value.ip_cidr_range
139 | description = (
140 | each.value.description == null
141 | ? "Terraform-managed."
142 | : each.value.description
143 | )
144 | private_ip_google_access = each.value.enable_private_access
145 | secondary_ip_range = each.value.secondary_ip_ranges == null ? [] : [
146 | for name, range in each.value.secondary_ip_ranges :
147 | { range_name = name, ip_cidr_range = range }
148 | ]
149 | stack_type = (
150 | try(each.value.ipv6, null) != null ? "IPV4_IPV6" : null
151 | )
152 | ipv6_access_type = (
153 | try(each.value.ipv6, null) != null ? each.value.ipv6.access_type : null
154 | )
155 | # private_ipv6_google_access = try(each.value.ipv6.enable_private_access, null)
156 | dynamic "log_config" {
157 | for_each = each.value.flow_logs_config != null ? [""] : []
158 | content {
159 | aggregation_interval = each.value.flow_logs_config.aggregation_interval
160 | filter_expr = each.value.flow_logs_config.filter_expression
161 | flow_sampling = each.value.flow_logs_config.flow_sampling
162 | metadata = each.value.flow_logs_config.metadata
163 | metadata_fields = (
164 | each.value.flow_logs_config.metadata == "CUSTOM_METADATA"
165 | ? each.value.flow_logs_config.metadata_fields
166 | : null
167 | )
168 | }
169 | }
170 | }
Check: CKV_GCP_26: "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network"
FAILED for resource: module.vpc-right.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/networking/ilb-next-hop/vpc-right.tf:17-46
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/bc-gcp-logging-1.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.vpc-right.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/networking/ilb-next-hop/vpc-right.tf:17-46
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.vpc-right.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/networking/ilb-next-hop/vpc-right.tf:17-46
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_26: "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network"
FAILED for resource: module.vpc-right.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/networking/ilb-next-hop/vpc-right.tf:17-46
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/bc-gcp-logging-1.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.vpc-right.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/networking/ilb-next-hop/vpc-right.tf:17-46
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.vpc-right.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/networking/ilb-next-hop/vpc-right.tf:17-46
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.vpc-onprem.google_compute_subnetwork.subnetwork
File: /modules/net-vpc/subnets.tf:132-170
Calling File: /blueprints/networking/private-cloud-function-from-onprem/main.tf:39-51
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
132 | resource "google_compute_subnetwork" "subnetwork" {
133 | for_each = local.subnets
134 | project = var.project_id
135 | network = local.network.name
136 | name = each.value.name
137 | region = each.value.region
138 | ip_cidr_range = each.value.ip_cidr_range
139 | description = (
140 | each.value.description == null
141 | ? "Terraform-managed."
142 | : each.value.description
143 | )
144 | private_ip_google_access = each.value.enable_private_access
145 | secondary_ip_range = each.value.secondary_ip_ranges == null ? [] : [
146 | for name, range in each.value.secondary_ip_ranges :
147 | { range_name = name, ip_cidr_range = range }
148 | ]
149 | stack_type = (
150 | try(each.value.ipv6, null) != null ? "IPV4_IPV6" : null
151 | )
152 | ipv6_access_type = (
153 | try(each.value.ipv6, null) != null ? each.value.ipv6.access_type : null
154 | )
155 | # private_ipv6_google_access = try(each.value.ipv6.enable_private_access, null)
156 | dynamic "log_config" {
157 | for_each = each.value.flow_logs_config != null ? [""] : []
158 | content {
159 | aggregation_interval = each.value.flow_logs_config.aggregation_interval
160 | filter_expr = each.value.flow_logs_config.filter_expression
161 | flow_sampling = each.value.flow_logs_config.flow_sampling
162 | metadata = each.value.flow_logs_config.metadata
163 | metadata_fields = (
164 | each.value.flow_logs_config.metadata == "CUSTOM_METADATA"
165 | ? each.value.flow_logs_config.metadata_fields
166 | : null
167 | )
168 | }
169 | }
170 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.vpc-onprem.google_compute_subnetwork.subnetwork
File: /modules/net-vpc/subnets.tf:132-170
Calling File: /blueprints/networking/private-cloud-function-from-onprem/main.tf:39-51
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
132 | resource "google_compute_subnetwork" "subnetwork" {
133 | for_each = local.subnets
134 | project = var.project_id
135 | network = local.network.name
136 | name = each.value.name
137 | region = each.value.region
138 | ip_cidr_range = each.value.ip_cidr_range
139 | description = (
140 | each.value.description == null
141 | ? "Terraform-managed."
142 | : each.value.description
143 | )
144 | private_ip_google_access = each.value.enable_private_access
145 | secondary_ip_range = each.value.secondary_ip_ranges == null ? [] : [
146 | for name, range in each.value.secondary_ip_ranges :
147 | { range_name = name, ip_cidr_range = range }
148 | ]
149 | stack_type = (
150 | try(each.value.ipv6, null) != null ? "IPV4_IPV6" : null
151 | )
152 | ipv6_access_type = (
153 | try(each.value.ipv6, null) != null ? each.value.ipv6.access_type : null
154 | )
155 | # private_ipv6_google_access = try(each.value.ipv6.enable_private_access, null)
156 | dynamic "log_config" {
157 | for_each = each.value.flow_logs_config != null ? [""] : []
158 | content {
159 | aggregation_interval = each.value.flow_logs_config.aggregation_interval
160 | filter_expr = each.value.flow_logs_config.filter_expression
161 | flow_sampling = each.value.flow_logs_config.flow_sampling
162 | metadata = each.value.flow_logs_config.metadata
163 | metadata_fields = (
164 | each.value.flow_logs_config.metadata == "CUSTOM_METADATA"
165 | ? each.value.flow_logs_config.metadata_fields
166 | : null
167 | )
168 | }
169 | }
170 | }
Check: CKV_GCP_26: "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network"
FAILED for resource: module.vpc-onprem.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/networking/private-cloud-function-from-onprem/main.tf:39-51
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/bc-gcp-logging-1.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.vpc-onprem.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/networking/private-cloud-function-from-onprem/main.tf:39-51
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.vpc-onprem.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/networking/private-cloud-function-from-onprem/main.tf:39-51
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_26: "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network"
FAILED for resource: module.vpc-onprem.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/networking/private-cloud-function-from-onprem/main.tf:39-51
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/bc-gcp-logging-1.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.vpc-onprem.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/networking/private-cloud-function-from-onprem/main.tf:39-51
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.vpc-onprem.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/networking/private-cloud-function-from-onprem/main.tf:39-51
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.vpc_consumer.google_compute_subnetwork.subnetwork
File: /modules/net-vpc/subnets.tf:132-170
Calling File: /blueprints/networking/psc-hybrid/main.tf:113-125
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
132 | resource "google_compute_subnetwork" "subnetwork" {
133 | for_each = local.subnets
134 | project = var.project_id
135 | network = local.network.name
136 | name = each.value.name
137 | region = each.value.region
138 | ip_cidr_range = each.value.ip_cidr_range
139 | description = (
140 | each.value.description == null
141 | ? "Terraform-managed."
142 | : each.value.description
143 | )
144 | private_ip_google_access = each.value.enable_private_access
145 | secondary_ip_range = each.value.secondary_ip_ranges == null ? [] : [
146 | for name, range in each.value.secondary_ip_ranges :
147 | { range_name = name, ip_cidr_range = range }
148 | ]
149 | stack_type = (
150 | try(each.value.ipv6, null) != null ? "IPV4_IPV6" : null
151 | )
152 | ipv6_access_type = (
153 | try(each.value.ipv6, null) != null ? each.value.ipv6.access_type : null
154 | )
155 | # private_ipv6_google_access = try(each.value.ipv6.enable_private_access, null)
156 | dynamic "log_config" {
157 | for_each = each.value.flow_logs_config != null ? [""] : []
158 | content {
159 | aggregation_interval = each.value.flow_logs_config.aggregation_interval
160 | filter_expr = each.value.flow_logs_config.filter_expression
161 | flow_sampling = each.value.flow_logs_config.flow_sampling
162 | metadata = each.value.flow_logs_config.metadata
163 | metadata_fields = (
164 | each.value.flow_logs_config.metadata == "CUSTOM_METADATA"
165 | ? each.value.flow_logs_config.metadata_fields
166 | : null
167 | )
168 | }
169 | }
170 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.vpc_consumer.google_compute_subnetwork.subnetwork
File: /modules/net-vpc/subnets.tf:132-170
Calling File: /blueprints/networking/psc-hybrid/main.tf:113-125
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
132 | resource "google_compute_subnetwork" "subnetwork" {
133 | for_each = local.subnets
134 | project = var.project_id
135 | network = local.network.name
136 | name = each.value.name
137 | region = each.value.region
138 | ip_cidr_range = each.value.ip_cidr_range
139 | description = (
140 | each.value.description == null
141 | ? "Terraform-managed."
142 | : each.value.description
143 | )
144 | private_ip_google_access = each.value.enable_private_access
145 | secondary_ip_range = each.value.secondary_ip_ranges == null ? [] : [
146 | for name, range in each.value.secondary_ip_ranges :
147 | { range_name = name, ip_cidr_range = range }
148 | ]
149 | stack_type = (
150 | try(each.value.ipv6, null) != null ? "IPV4_IPV6" : null
151 | )
152 | ipv6_access_type = (
153 | try(each.value.ipv6, null) != null ? each.value.ipv6.access_type : null
154 | )
155 | # private_ipv6_google_access = try(each.value.ipv6.enable_private_access, null)
156 | dynamic "log_config" {
157 | for_each = each.value.flow_logs_config != null ? [""] : []
158 | content {
159 | aggregation_interval = each.value.flow_logs_config.aggregation_interval
160 | filter_expr = each.value.flow_logs_config.filter_expression
161 | flow_sampling = each.value.flow_logs_config.flow_sampling
162 | metadata = each.value.flow_logs_config.metadata
163 | metadata_fields = (
164 | each.value.flow_logs_config.metadata == "CUSTOM_METADATA"
165 | ? each.value.flow_logs_config.metadata_fields
166 | : null
167 | )
168 | }
169 | }
170 | }
Check: CKV_GCP_26: "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network"
FAILED for resource: module.vpc_consumer.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/networking/psc-hybrid/main.tf:113-125
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/bc-gcp-logging-1.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.vpc_consumer.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/networking/psc-hybrid/main.tf:113-125
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.vpc_consumer.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/networking/psc-hybrid/main.tf:113-125
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_26: "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network"
FAILED for resource: module.vpc_consumer.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/networking/psc-hybrid/main.tf:113-125
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/bc-gcp-logging-1.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.vpc_consumer.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/networking/psc-hybrid/main.tf:113-125
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.vpc_consumer.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/networking/psc-hybrid/main.tf:113-125
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.vpc_producer.google_compute_subnetwork.subnetwork
File: /modules/net-vpc/subnets.tf:132-170
Calling File: /blueprints/networking/psc-hybrid/main.tf:65-92
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
132 | resource "google_compute_subnetwork" "subnetwork" {
133 | for_each = local.subnets
134 | project = var.project_id
135 | network = local.network.name
136 | name = each.value.name
137 | region = each.value.region
138 | ip_cidr_range = each.value.ip_cidr_range
139 | description = (
140 | each.value.description == null
141 | ? "Terraform-managed."
142 | : each.value.description
143 | )
144 | private_ip_google_access = each.value.enable_private_access
145 | secondary_ip_range = each.value.secondary_ip_ranges == null ? [] : [
146 | for name, range in each.value.secondary_ip_ranges :
147 | { range_name = name, ip_cidr_range = range }
148 | ]
149 | stack_type = (
150 | try(each.value.ipv6, null) != null ? "IPV4_IPV6" : null
151 | )
152 | ipv6_access_type = (
153 | try(each.value.ipv6, null) != null ? each.value.ipv6.access_type : null
154 | )
155 | # private_ipv6_google_access = try(each.value.ipv6.enable_private_access, null)
156 | dynamic "log_config" {
157 | for_each = each.value.flow_logs_config != null ? [""] : []
158 | content {
159 | aggregation_interval = each.value.flow_logs_config.aggregation_interval
160 | filter_expr = each.value.flow_logs_config.filter_expression
161 | flow_sampling = each.value.flow_logs_config.flow_sampling
162 | metadata = each.value.flow_logs_config.metadata
163 | metadata_fields = (
164 | each.value.flow_logs_config.metadata == "CUSTOM_METADATA"
165 | ? each.value.flow_logs_config.metadata_fields
166 | : null
167 | )
168 | }
169 | }
170 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.vpc_producer.google_compute_subnetwork.subnetwork
File: /modules/net-vpc/subnets.tf:132-170
Calling File: /blueprints/networking/psc-hybrid/main.tf:65-92
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
132 | resource "google_compute_subnetwork" "subnetwork" {
133 | for_each = local.subnets
134 | project = var.project_id
135 | network = local.network.name
136 | name = each.value.name
137 | region = each.value.region
138 | ip_cidr_range = each.value.ip_cidr_range
139 | description = (
140 | each.value.description == null
141 | ? "Terraform-managed."
142 | : each.value.description
143 | )
144 | private_ip_google_access = each.value.enable_private_access
145 | secondary_ip_range = each.value.secondary_ip_ranges == null ? [] : [
146 | for name, range in each.value.secondary_ip_ranges :
147 | { range_name = name, ip_cidr_range = range }
148 | ]
149 | stack_type = (
150 | try(each.value.ipv6, null) != null ? "IPV4_IPV6" : null
151 | )
152 | ipv6_access_type = (
153 | try(each.value.ipv6, null) != null ? each.value.ipv6.access_type : null
154 | )
155 | # private_ipv6_google_access = try(each.value.ipv6.enable_private_access, null)
156 | dynamic "log_config" {
157 | for_each = each.value.flow_logs_config != null ? [""] : []
158 | content {
159 | aggregation_interval = each.value.flow_logs_config.aggregation_interval
160 | filter_expr = each.value.flow_logs_config.filter_expression
161 | flow_sampling = each.value.flow_logs_config.flow_sampling
162 | metadata = each.value.flow_logs_config.metadata
163 | metadata_fields = (
164 | each.value.flow_logs_config.metadata == "CUSTOM_METADATA"
165 | ? each.value.flow_logs_config.metadata_fields
166 | : null
167 | )
168 | }
169 | }
170 | }
Check: CKV_GCP_26: "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network"
FAILED for resource: module.vpc_producer.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/networking/psc-hybrid/main.tf:65-92
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/bc-gcp-logging-1.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.vpc_producer.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/networking/psc-hybrid/main.tf:65-92
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.vpc_producer.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/networking/psc-hybrid/main.tf:65-92
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_26: "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network"
FAILED for resource: module.vpc_producer.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/networking/psc-hybrid/main.tf:65-92
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/bc-gcp-logging-1.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.vpc_producer.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/networking/psc-hybrid/main.tf:65-92
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.vpc_producer.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/networking/psc-hybrid/main.tf:65-92
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.vpc-shared.google_compute_subnetwork.subnetwork
File: /modules/net-vpc/subnets.tf:132-170
Calling File: /blueprints/networking/shared-vpc-gke/main.tf:96-130
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
132 | resource "google_compute_subnetwork" "subnetwork" {
133 | for_each = local.subnets
134 | project = var.project_id
135 | network = local.network.name
136 | name = each.value.name
137 | region = each.value.region
138 | ip_cidr_range = each.value.ip_cidr_range
139 | description = (
140 | each.value.description == null
141 | ? "Terraform-managed."
142 | : each.value.description
143 | )
144 | private_ip_google_access = each.value.enable_private_access
145 | secondary_ip_range = each.value.secondary_ip_ranges == null ? [] : [
146 | for name, range in each.value.secondary_ip_ranges :
147 | { range_name = name, ip_cidr_range = range }
148 | ]
149 | stack_type = (
150 | try(each.value.ipv6, null) != null ? "IPV4_IPV6" : null
151 | )
152 | ipv6_access_type = (
153 | try(each.value.ipv6, null) != null ? each.value.ipv6.access_type : null
154 | )
155 | # private_ipv6_google_access = try(each.value.ipv6.enable_private_access, null)
156 | dynamic "log_config" {
157 | for_each = each.value.flow_logs_config != null ? [""] : []
158 | content {
159 | aggregation_interval = each.value.flow_logs_config.aggregation_interval
160 | filter_expr = each.value.flow_logs_config.filter_expression
161 | flow_sampling = each.value.flow_logs_config.flow_sampling
162 | metadata = each.value.flow_logs_config.metadata
163 | metadata_fields = (
164 | each.value.flow_logs_config.metadata == "CUSTOM_METADATA"
165 | ? each.value.flow_logs_config.metadata_fields
166 | : null
167 | )
168 | }
169 | }
170 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.vpc-shared.google_compute_subnetwork.subnetwork
File: /modules/net-vpc/subnets.tf:132-170
Calling File: /blueprints/networking/shared-vpc-gke/main.tf:96-130
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
132 | resource "google_compute_subnetwork" "subnetwork" {
133 | for_each = local.subnets
134 | project = var.project_id
135 | network = local.network.name
136 | name = each.value.name
137 | region = each.value.region
138 | ip_cidr_range = each.value.ip_cidr_range
139 | description = (
140 | each.value.description == null
141 | ? "Terraform-managed."
142 | : each.value.description
143 | )
144 | private_ip_google_access = each.value.enable_private_access
145 | secondary_ip_range = each.value.secondary_ip_ranges == null ? [] : [
146 | for name, range in each.value.secondary_ip_ranges :
147 | { range_name = name, ip_cidr_range = range }
148 | ]
149 | stack_type = (
150 | try(each.value.ipv6, null) != null ? "IPV4_IPV6" : null
151 | )
152 | ipv6_access_type = (
153 | try(each.value.ipv6, null) != null ? each.value.ipv6.access_type : null
154 | )
155 | # private_ipv6_google_access = try(each.value.ipv6.enable_private_access, null)
156 | dynamic "log_config" {
157 | for_each = each.value.flow_logs_config != null ? [""] : []
158 | content {
159 | aggregation_interval = each.value.flow_logs_config.aggregation_interval
160 | filter_expr = each.value.flow_logs_config.filter_expression
161 | flow_sampling = each.value.flow_logs_config.flow_sampling
162 | metadata = each.value.flow_logs_config.metadata
163 | metadata_fields = (
164 | each.value.flow_logs_config.metadata == "CUSTOM_METADATA"
165 | ? each.value.flow_logs_config.metadata_fields
166 | : null
167 | )
168 | }
169 | }
170 | }
Check: CKV_GCP_26: "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network"
FAILED for resource: module.vpc-shared.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/networking/shared-vpc-gke/main.tf:96-130
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/bc-gcp-logging-1.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.vpc-shared.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/networking/shared-vpc-gke/main.tf:96-130
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.vpc-shared.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/networking/shared-vpc-gke/main.tf:96-130
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_26: "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network"
FAILED for resource: module.vpc-shared.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/networking/shared-vpc-gke/main.tf:96-130
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/bc-gcp-logging-1.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.vpc-shared.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/networking/shared-vpc-gke/main.tf:96-130
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.vpc-shared.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/networking/shared-vpc-gke/main.tf:96-130
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.vpc_main.google_compute_subnetwork.subnetwork
File: /modules/net-vpc/subnets.tf:132-170
Calling File: /blueprints/serverless/cloud-run-corporate/main.tf:206-230
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
132 | resource "google_compute_subnetwork" "subnetwork" {
133 | for_each = local.subnets
134 | project = var.project_id
135 | network = local.network.name
136 | name = each.value.name
137 | region = each.value.region
138 | ip_cidr_range = each.value.ip_cidr_range
139 | description = (
140 | each.value.description == null
141 | ? "Terraform-managed."
142 | : each.value.description
143 | )
144 | private_ip_google_access = each.value.enable_private_access
145 | secondary_ip_range = each.value.secondary_ip_ranges == null ? [] : [
146 | for name, range in each.value.secondary_ip_ranges :
147 | { range_name = name, ip_cidr_range = range }
148 | ]
149 | stack_type = (
150 | try(each.value.ipv6, null) != null ? "IPV4_IPV6" : null
151 | )
152 | ipv6_access_type = (
153 | try(each.value.ipv6, null) != null ? each.value.ipv6.access_type : null
154 | )
155 | # private_ipv6_google_access = try(each.value.ipv6.enable_private_access, null)
156 | dynamic "log_config" {
157 | for_each = each.value.flow_logs_config != null ? [""] : []
158 | content {
159 | aggregation_interval = each.value.flow_logs_config.aggregation_interval
160 | filter_expr = each.value.flow_logs_config.filter_expression
161 | flow_sampling = each.value.flow_logs_config.flow_sampling
162 | metadata = each.value.flow_logs_config.metadata
163 | metadata_fields = (
164 | each.value.flow_logs_config.metadata == "CUSTOM_METADATA"
165 | ? each.value.flow_logs_config.metadata_fields
166 | : null
167 | )
168 | }
169 | }
170 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.vpc_main.google_compute_subnetwork.subnetwork
File: /modules/net-vpc/subnets.tf:132-170
Calling File: /blueprints/serverless/cloud-run-corporate/main.tf:206-230
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
132 | resource "google_compute_subnetwork" "subnetwork" {
133 | for_each = local.subnets
134 | project = var.project_id
135 | network = local.network.name
136 | name = each.value.name
137 | region = each.value.region
138 | ip_cidr_range = each.value.ip_cidr_range
139 | description = (
140 | each.value.description == null
141 | ? "Terraform-managed."
142 | : each.value.description
143 | )
144 | private_ip_google_access = each.value.enable_private_access
145 | secondary_ip_range = each.value.secondary_ip_ranges == null ? [] : [
146 | for name, range in each.value.secondary_ip_ranges :
147 | { range_name = name, ip_cidr_range = range }
148 | ]
149 | stack_type = (
150 | try(each.value.ipv6, null) != null ? "IPV4_IPV6" : null
151 | )
152 | ipv6_access_type = (
153 | try(each.value.ipv6, null) != null ? each.value.ipv6.access_type : null
154 | )
155 | # private_ipv6_google_access = try(each.value.ipv6.enable_private_access, null)
156 | dynamic "log_config" {
157 | for_each = each.value.flow_logs_config != null ? [""] : []
158 | content {
159 | aggregation_interval = each.value.flow_logs_config.aggregation_interval
160 | filter_expr = each.value.flow_logs_config.filter_expression
161 | flow_sampling = each.value.flow_logs_config.flow_sampling
162 | metadata = each.value.flow_logs_config.metadata
163 | metadata_fields = (
164 | each.value.flow_logs_config.metadata == "CUSTOM_METADATA"
165 | ? each.value.flow_logs_config.metadata_fields
166 | : null
167 | )
168 | }
169 | }
170 | }
Check: CKV_GCP_26: "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network"
FAILED for resource: module.vpc_main.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/serverless/cloud-run-corporate/main.tf:206-230
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/bc-gcp-logging-1.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.vpc_main.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/serverless/cloud-run-corporate/main.tf:206-230
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.vpc_main.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/serverless/cloud-run-corporate/main.tf:206-230
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_26: "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network"
FAILED for resource: module.vpc_main.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/serverless/cloud-run-corporate/main.tf:206-230
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/bc-gcp-logging-1.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.vpc_main.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/serverless/cloud-run-corporate/main.tf:206-230
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.vpc_main.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/serverless/cloud-run-corporate/main.tf:206-230
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.vpc_onprem.google_compute_subnetwork.subnetwork
File: /modules/net-vpc/subnets.tf:132-170
Calling File: /blueprints/serverless/cloud-run-corporate/main.tf:244-256
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
132 | resource "google_compute_subnetwork" "subnetwork" {
133 | for_each = local.subnets
134 | project = var.project_id
135 | network = local.network.name
136 | name = each.value.name
137 | region = each.value.region
138 | ip_cidr_range = each.value.ip_cidr_range
139 | description = (
140 | each.value.description == null
141 | ? "Terraform-managed."
142 | : each.value.description
143 | )
144 | private_ip_google_access = each.value.enable_private_access
145 | secondary_ip_range = each.value.secondary_ip_ranges == null ? [] : [
146 | for name, range in each.value.secondary_ip_ranges :
147 | { range_name = name, ip_cidr_range = range }
148 | ]
149 | stack_type = (
150 | try(each.value.ipv6, null) != null ? "IPV4_IPV6" : null
151 | )
152 | ipv6_access_type = (
153 | try(each.value.ipv6, null) != null ? each.value.ipv6.access_type : null
154 | )
155 | # private_ipv6_google_access = try(each.value.ipv6.enable_private_access, null)
156 | dynamic "log_config" {
157 | for_each = each.value.flow_logs_config != null ? [""] : []
158 | content {
159 | aggregation_interval = each.value.flow_logs_config.aggregation_interval
160 | filter_expr = each.value.flow_logs_config.filter_expression
161 | flow_sampling = each.value.flow_logs_config.flow_sampling
162 | metadata = each.value.flow_logs_config.metadata
163 | metadata_fields = (
164 | each.value.flow_logs_config.metadata == "CUSTOM_METADATA"
165 | ? each.value.flow_logs_config.metadata_fields
166 | : null
167 | )
168 | }
169 | }
170 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.vpc_onprem.google_compute_subnetwork.subnetwork
File: /modules/net-vpc/subnets.tf:132-170
Calling File: /blueprints/serverless/cloud-run-corporate/main.tf:244-256
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
132 | resource "google_compute_subnetwork" "subnetwork" {
133 | for_each = local.subnets
134 | project = var.project_id
135 | network = local.network.name
136 | name = each.value.name
137 | region = each.value.region
138 | ip_cidr_range = each.value.ip_cidr_range
139 | description = (
140 | each.value.description == null
141 | ? "Terraform-managed."
142 | : each.value.description
143 | )
144 | private_ip_google_access = each.value.enable_private_access
145 | secondary_ip_range = each.value.secondary_ip_ranges == null ? [] : [
146 | for name, range in each.value.secondary_ip_ranges :
147 | { range_name = name, ip_cidr_range = range }
148 | ]
149 | stack_type = (
150 | try(each.value.ipv6, null) != null ? "IPV4_IPV6" : null
151 | )
152 | ipv6_access_type = (
153 | try(each.value.ipv6, null) != null ? each.value.ipv6.access_type : null
154 | )
155 | # private_ipv6_google_access = try(each.value.ipv6.enable_private_access, null)
156 | dynamic "log_config" {
157 | for_each = each.value.flow_logs_config != null ? [""] : []
158 | content {
159 | aggregation_interval = each.value.flow_logs_config.aggregation_interval
160 | filter_expr = each.value.flow_logs_config.filter_expression
161 | flow_sampling = each.value.flow_logs_config.flow_sampling
162 | metadata = each.value.flow_logs_config.metadata
163 | metadata_fields = (
164 | each.value.flow_logs_config.metadata == "CUSTOM_METADATA"
165 | ? each.value.flow_logs_config.metadata_fields
166 | : null
167 | )
168 | }
169 | }
170 | }
Check: CKV_GCP_26: "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network"
FAILED for resource: module.vpc_onprem.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/serverless/cloud-run-corporate/main.tf:244-256
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/bc-gcp-logging-1.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.vpc_onprem.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/serverless/cloud-run-corporate/main.tf:244-256
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.vpc_onprem.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/serverless/cloud-run-corporate/main.tf:244-256
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_26: "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network"
FAILED for resource: module.vpc_onprem.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/serverless/cloud-run-corporate/main.tf:244-256
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/bc-gcp-logging-1.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.vpc_onprem.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/serverless/cloud-run-corporate/main.tf:244-256
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.vpc_onprem.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/serverless/cloud-run-corporate/main.tf:244-256
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.vpc_prj1.google_compute_subnetwork.subnetwork
File: /modules/net-vpc/subnets.tf:132-170
Calling File: /blueprints/serverless/cloud-run-corporate/main.tf:271-283
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
132 | resource "google_compute_subnetwork" "subnetwork" {
133 | for_each = local.subnets
134 | project = var.project_id
135 | network = local.network.name
136 | name = each.value.name
137 | region = each.value.region
138 | ip_cidr_range = each.value.ip_cidr_range
139 | description = (
140 | each.value.description == null
141 | ? "Terraform-managed."
142 | : each.value.description
143 | )
144 | private_ip_google_access = each.value.enable_private_access
145 | secondary_ip_range = each.value.secondary_ip_ranges == null ? [] : [
146 | for name, range in each.value.secondary_ip_ranges :
147 | { range_name = name, ip_cidr_range = range }
148 | ]
149 | stack_type = (
150 | try(each.value.ipv6, null) != null ? "IPV4_IPV6" : null
151 | )
152 | ipv6_access_type = (
153 | try(each.value.ipv6, null) != null ? each.value.ipv6.access_type : null
154 | )
155 | # private_ipv6_google_access = try(each.value.ipv6.enable_private_access, null)
156 | dynamic "log_config" {
157 | for_each = each.value.flow_logs_config != null ? [""] : []
158 | content {
159 | aggregation_interval = each.value.flow_logs_config.aggregation_interval
160 | filter_expr = each.value.flow_logs_config.filter_expression
161 | flow_sampling = each.value.flow_logs_config.flow_sampling
162 | metadata = each.value.flow_logs_config.metadata
163 | metadata_fields = (
164 | each.value.flow_logs_config.metadata == "CUSTOM_METADATA"
165 | ? each.value.flow_logs_config.metadata_fields
166 | : null
167 | )
168 | }
169 | }
170 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.vpc_prj1.google_compute_subnetwork.subnetwork
File: /modules/net-vpc/subnets.tf:132-170
Calling File: /blueprints/serverless/cloud-run-corporate/main.tf:271-283
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
132 | resource "google_compute_subnetwork" "subnetwork" {
133 | for_each = local.subnets
134 | project = var.project_id
135 | network = local.network.name
136 | name = each.value.name
137 | region = each.value.region
138 | ip_cidr_range = each.value.ip_cidr_range
139 | description = (
140 | each.value.description == null
141 | ? "Terraform-managed."
142 | : each.value.description
143 | )
144 | private_ip_google_access = each.value.enable_private_access
145 | secondary_ip_range = each.value.secondary_ip_ranges == null ? [] : [
146 | for name, range in each.value.secondary_ip_ranges :
147 | { range_name = name, ip_cidr_range = range }
148 | ]
149 | stack_type = (
150 | try(each.value.ipv6, null) != null ? "IPV4_IPV6" : null
151 | )
152 | ipv6_access_type = (
153 | try(each.value.ipv6, null) != null ? each.value.ipv6.access_type : null
154 | )
155 | # private_ipv6_google_access = try(each.value.ipv6.enable_private_access, null)
156 | dynamic "log_config" {
157 | for_each = each.value.flow_logs_config != null ? [""] : []
158 | content {
159 | aggregation_interval = each.value.flow_logs_config.aggregation_interval
160 | filter_expr = each.value.flow_logs_config.filter_expression
161 | flow_sampling = each.value.flow_logs_config.flow_sampling
162 | metadata = each.value.flow_logs_config.metadata
163 | metadata_fields = (
164 | each.value.flow_logs_config.metadata == "CUSTOM_METADATA"
165 | ? each.value.flow_logs_config.metadata_fields
166 | : null
167 | )
168 | }
169 | }
170 | }
Check: CKV_GCP_26: "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network"
FAILED for resource: module.vpc_prj1.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/serverless/cloud-run-corporate/main.tf:271-283
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/bc-gcp-logging-1.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.vpc_prj1.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/serverless/cloud-run-corporate/main.tf:271-283
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.vpc_prj1.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /blueprints/serverless/cloud-run-corporate/main.tf:271-283
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_26: "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network"
FAILED for resource: module.vpc_prj1.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/serverless/cloud-run-corporate/main.tf:271-283
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/bc-gcp-logging-1.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.vpc_prj1.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/serverless/cloud-run-corporate/main.tf:271-283
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.vpc_prj1.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /blueprints/serverless/cloud-run-corporate/main.tf:271-283
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.dev-spoke-vpc-serverless.google_compute_subnetwork.subnetwork
File: /modules/net-vpc/subnets.tf:132-170
Calling File: /fast/plugins/2-networking-serverless-connector/local-serverless-connector.tf:30-43
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
132 | resource "google_compute_subnetwork" "subnetwork" {
133 | for_each = local.subnets
134 | project = var.project_id
135 | network = local.network.name
136 | name = each.value.name
137 | region = each.value.region
138 | ip_cidr_range = each.value.ip_cidr_range
139 | description = (
140 | each.value.description == null
141 | ? "Terraform-managed."
142 | : each.value.description
143 | )
144 | private_ip_google_access = each.value.enable_private_access
145 | secondary_ip_range = each.value.secondary_ip_ranges == null ? [] : [
146 | for name, range in each.value.secondary_ip_ranges :
147 | { range_name = name, ip_cidr_range = range }
148 | ]
149 | stack_type = (
150 | try(each.value.ipv6, null) != null ? "IPV4_IPV6" : null
151 | )
152 | ipv6_access_type = (
153 | try(each.value.ipv6, null) != null ? each.value.ipv6.access_type : null
154 | )
155 | # private_ipv6_google_access = try(each.value.ipv6.enable_private_access, null)
156 | dynamic "log_config" {
157 | for_each = each.value.flow_logs_config != null ? [""] : []
158 | content {
159 | aggregation_interval = each.value.flow_logs_config.aggregation_interval
160 | filter_expr = each.value.flow_logs_config.filter_expression
161 | flow_sampling = each.value.flow_logs_config.flow_sampling
162 | metadata = each.value.flow_logs_config.metadata
163 | metadata_fields = (
164 | each.value.flow_logs_config.metadata == "CUSTOM_METADATA"
165 | ? each.value.flow_logs_config.metadata_fields
166 | : null
167 | )
168 | }
169 | }
170 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.dev-spoke-vpc-serverless.google_compute_subnetwork.subnetwork
File: /modules/net-vpc/subnets.tf:132-170
Calling File: /fast/plugins/2-networking-serverless-connector/local-serverless-connector.tf:30-43
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
132 | resource "google_compute_subnetwork" "subnetwork" {
133 | for_each = local.subnets
134 | project = var.project_id
135 | network = local.network.name
136 | name = each.value.name
137 | region = each.value.region
138 | ip_cidr_range = each.value.ip_cidr_range
139 | description = (
140 | each.value.description == null
141 | ? "Terraform-managed."
142 | : each.value.description
143 | )
144 | private_ip_google_access = each.value.enable_private_access
145 | secondary_ip_range = each.value.secondary_ip_ranges == null ? [] : [
146 | for name, range in each.value.secondary_ip_ranges :
147 | { range_name = name, ip_cidr_range = range }
148 | ]
149 | stack_type = (
150 | try(each.value.ipv6, null) != null ? "IPV4_IPV6" : null
151 | )
152 | ipv6_access_type = (
153 | try(each.value.ipv6, null) != null ? each.value.ipv6.access_type : null
154 | )
155 | # private_ipv6_google_access = try(each.value.ipv6.enable_private_access, null)
156 | dynamic "log_config" {
157 | for_each = each.value.flow_logs_config != null ? [""] : []
158 | content {
159 | aggregation_interval = each.value.flow_logs_config.aggregation_interval
160 | filter_expr = each.value.flow_logs_config.filter_expression
161 | flow_sampling = each.value.flow_logs_config.flow_sampling
162 | metadata = each.value.flow_logs_config.metadata
163 | metadata_fields = (
164 | each.value.flow_logs_config.metadata == "CUSTOM_METADATA"
165 | ? each.value.flow_logs_config.metadata_fields
166 | : null
167 | )
168 | }
169 | }
170 | }
Check: CKV_GCP_26: "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network"
FAILED for resource: module.dev-spoke-vpc-serverless.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /fast/plugins/2-networking-serverless-connector/local-serverless-connector.tf:30-43
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/bc-gcp-logging-1.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.dev-spoke-vpc-serverless.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /fast/plugins/2-networking-serverless-connector/local-serverless-connector.tf:30-43
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.dev-spoke-vpc-serverless.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /fast/plugins/2-networking-serverless-connector/local-serverless-connector.tf:30-43
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_26: "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network"
FAILED for resource: module.dev-spoke-vpc-serverless.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /fast/plugins/2-networking-serverless-connector/local-serverless-connector.tf:30-43
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/bc-gcp-logging-1.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.dev-spoke-vpc-serverless.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /fast/plugins/2-networking-serverless-connector/local-serverless-connector.tf:30-43
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.dev-spoke-vpc-serverless.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /fast/plugins/2-networking-serverless-connector/local-serverless-connector.tf:30-43
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.prod-spoke-vpc-serverless.google_compute_subnetwork.subnetwork
File: /modules/net-vpc/subnets.tf:132-170
Calling File: /fast/plugins/2-networking-serverless-connector/local-serverless-connector.tf:45-58
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
132 | resource "google_compute_subnetwork" "subnetwork" {
133 | for_each = local.subnets
134 | project = var.project_id
135 | network = local.network.name
136 | name = each.value.name
137 | region = each.value.region
138 | ip_cidr_range = each.value.ip_cidr_range
139 | description = (
140 | each.value.description == null
141 | ? "Terraform-managed."
142 | : each.value.description
143 | )
144 | private_ip_google_access = each.value.enable_private_access
145 | secondary_ip_range = each.value.secondary_ip_ranges == null ? [] : [
146 | for name, range in each.value.secondary_ip_ranges :
147 | { range_name = name, ip_cidr_range = range }
148 | ]
149 | stack_type = (
150 | try(each.value.ipv6, null) != null ? "IPV4_IPV6" : null
151 | )
152 | ipv6_access_type = (
153 | try(each.value.ipv6, null) != null ? each.value.ipv6.access_type : null
154 | )
155 | # private_ipv6_google_access = try(each.value.ipv6.enable_private_access, null)
156 | dynamic "log_config" {
157 | for_each = each.value.flow_logs_config != null ? [""] : []
158 | content {
159 | aggregation_interval = each.value.flow_logs_config.aggregation_interval
160 | filter_expr = each.value.flow_logs_config.filter_expression
161 | flow_sampling = each.value.flow_logs_config.flow_sampling
162 | metadata = each.value.flow_logs_config.metadata
163 | metadata_fields = (
164 | each.value.flow_logs_config.metadata == "CUSTOM_METADATA"
165 | ? each.value.flow_logs_config.metadata_fields
166 | : null
167 | )
168 | }
169 | }
170 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.prod-spoke-vpc-serverless.google_compute_subnetwork.subnetwork
File: /modules/net-vpc/subnets.tf:132-170
Calling File: /fast/plugins/2-networking-serverless-connector/local-serverless-connector.tf:45-58
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
132 | resource "google_compute_subnetwork" "subnetwork" {
133 | for_each = local.subnets
134 | project = var.project_id
135 | network = local.network.name
136 | name = each.value.name
137 | region = each.value.region
138 | ip_cidr_range = each.value.ip_cidr_range
139 | description = (
140 | each.value.description == null
141 | ? "Terraform-managed."
142 | : each.value.description
143 | )
144 | private_ip_google_access = each.value.enable_private_access
145 | secondary_ip_range = each.value.secondary_ip_ranges == null ? [] : [
146 | for name, range in each.value.secondary_ip_ranges :
147 | { range_name = name, ip_cidr_range = range }
148 | ]
149 | stack_type = (
150 | try(each.value.ipv6, null) != null ? "IPV4_IPV6" : null
151 | )
152 | ipv6_access_type = (
153 | try(each.value.ipv6, null) != null ? each.value.ipv6.access_type : null
154 | )
155 | # private_ipv6_google_access = try(each.value.ipv6.enable_private_access, null)
156 | dynamic "log_config" {
157 | for_each = each.value.flow_logs_config != null ? [""] : []
158 | content {
159 | aggregation_interval = each.value.flow_logs_config.aggregation_interval
160 | filter_expr = each.value.flow_logs_config.filter_expression
161 | flow_sampling = each.value.flow_logs_config.flow_sampling
162 | metadata = each.value.flow_logs_config.metadata
163 | metadata_fields = (
164 | each.value.flow_logs_config.metadata == "CUSTOM_METADATA"
165 | ? each.value.flow_logs_config.metadata_fields
166 | : null
167 | )
168 | }
169 | }
170 | }
Check: CKV_GCP_26: "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network"
FAILED for resource: module.prod-spoke-vpc-serverless.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /fast/plugins/2-networking-serverless-connector/local-serverless-connector.tf:45-58
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/bc-gcp-logging-1.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.prod-spoke-vpc-serverless.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /fast/plugins/2-networking-serverless-connector/local-serverless-connector.tf:45-58
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.prod-spoke-vpc-serverless.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /fast/plugins/2-networking-serverless-connector/local-serverless-connector.tf:45-58
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_26: "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network"
FAILED for resource: module.prod-spoke-vpc-serverless.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /fast/plugins/2-networking-serverless-connector/local-serverless-connector.tf:45-58
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/bc-gcp-logging-1.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.prod-spoke-vpc-serverless.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /fast/plugins/2-networking-serverless-connector/local-serverless-connector.tf:45-58
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.prod-spoke-vpc-serverless.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /fast/plugins/2-networking-serverless-connector/local-serverless-connector.tf:45-58
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.dev-spoke-vpc.google_compute_subnetwork.subnetwork
File: /modules/net-vpc/subnets.tf:132-170
Calling File: /fast/stages/2-networking-e-nva-bgp/spoke-dev.tf:47-62
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
132 | resource "google_compute_subnetwork" "subnetwork" {
133 | for_each = local.subnets
134 | project = var.project_id
135 | network = local.network.name
136 | name = each.value.name
137 | region = each.value.region
138 | ip_cidr_range = each.value.ip_cidr_range
139 | description = (
140 | each.value.description == null
141 | ? "Terraform-managed."
142 | : each.value.description
143 | )
144 | private_ip_google_access = each.value.enable_private_access
145 | secondary_ip_range = each.value.secondary_ip_ranges == null ? [] : [
146 | for name, range in each.value.secondary_ip_ranges :
147 | { range_name = name, ip_cidr_range = range }
148 | ]
149 | stack_type = (
150 | try(each.value.ipv6, null) != null ? "IPV4_IPV6" : null
151 | )
152 | ipv6_access_type = (
153 | try(each.value.ipv6, null) != null ? each.value.ipv6.access_type : null
154 | )
155 | # private_ipv6_google_access = try(each.value.ipv6.enable_private_access, null)
156 | dynamic "log_config" {
157 | for_each = each.value.flow_logs_config != null ? [""] : []
158 | content {
159 | aggregation_interval = each.value.flow_logs_config.aggregation_interval
160 | filter_expr = each.value.flow_logs_config.filter_expression
161 | flow_sampling = each.value.flow_logs_config.flow_sampling
162 | metadata = each.value.flow_logs_config.metadata
163 | metadata_fields = (
164 | each.value.flow_logs_config.metadata == "CUSTOM_METADATA"
165 | ? each.value.flow_logs_config.metadata_fields
166 | : null
167 | )
168 | }
169 | }
170 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.dev-spoke-vpc.google_compute_subnetwork.subnetwork
File: /modules/net-vpc/subnets.tf:132-170
Calling File: /fast/stages/2-networking-e-nva-bgp/spoke-dev.tf:47-62
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
132 | resource "google_compute_subnetwork" "subnetwork" {
133 | for_each = local.subnets
134 | project = var.project_id
135 | network = local.network.name
136 | name = each.value.name
137 | region = each.value.region
138 | ip_cidr_range = each.value.ip_cidr_range
139 | description = (
140 | each.value.description == null
141 | ? "Terraform-managed."
142 | : each.value.description
143 | )
144 | private_ip_google_access = each.value.enable_private_access
145 | secondary_ip_range = each.value.secondary_ip_ranges == null ? [] : [
146 | for name, range in each.value.secondary_ip_ranges :
147 | { range_name = name, ip_cidr_range = range }
148 | ]
149 | stack_type = (
150 | try(each.value.ipv6, null) != null ? "IPV4_IPV6" : null
151 | )
152 | ipv6_access_type = (
153 | try(each.value.ipv6, null) != null ? each.value.ipv6.access_type : null
154 | )
155 | # private_ipv6_google_access = try(each.value.ipv6.enable_private_access, null)
156 | dynamic "log_config" {
157 | for_each = each.value.flow_logs_config != null ? [""] : []
158 | content {
159 | aggregation_interval = each.value.flow_logs_config.aggregation_interval
160 | filter_expr = each.value.flow_logs_config.filter_expression
161 | flow_sampling = each.value.flow_logs_config.flow_sampling
162 | metadata = each.value.flow_logs_config.metadata
163 | metadata_fields = (
164 | each.value.flow_logs_config.metadata == "CUSTOM_METADATA"
165 | ? each.value.flow_logs_config.metadata_fields
166 | : null
167 | )
168 | }
169 | }
170 | }
Check: CKV_GCP_26: "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network"
FAILED for resource: module.dev-spoke-vpc.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /fast/stages/2-networking-e-nva-bgp/spoke-dev.tf:47-62
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/bc-gcp-logging-1.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.dev-spoke-vpc.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /fast/stages/2-networking-e-nva-bgp/spoke-dev.tf:47-62
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.dev-spoke-vpc.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /fast/stages/2-networking-e-nva-bgp/spoke-dev.tf:47-62
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_26: "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network"
FAILED for resource: module.dev-spoke-vpc.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /fast/stages/2-networking-e-nva-bgp/spoke-dev.tf:47-62
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/bc-gcp-logging-1.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.dev-spoke-vpc.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /fast/stages/2-networking-e-nva-bgp/spoke-dev.tf:47-62
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.dev-spoke-vpc.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /fast/stages/2-networking-e-nva-bgp/spoke-dev.tf:47-62
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.prod-spoke-vpc.google_compute_subnetwork.subnetwork
File: /modules/net-vpc/subnets.tf:132-170
Calling File: /fast/stages/2-networking-e-nva-bgp/spoke-prod.tf:46-61
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
132 | resource "google_compute_subnetwork" "subnetwork" {
133 | for_each = local.subnets
134 | project = var.project_id
135 | network = local.network.name
136 | name = each.value.name
137 | region = each.value.region
138 | ip_cidr_range = each.value.ip_cidr_range
139 | description = (
140 | each.value.description == null
141 | ? "Terraform-managed."
142 | : each.value.description
143 | )
144 | private_ip_google_access = each.value.enable_private_access
145 | secondary_ip_range = each.value.secondary_ip_ranges == null ? [] : [
146 | for name, range in each.value.secondary_ip_ranges :
147 | { range_name = name, ip_cidr_range = range }
148 | ]
149 | stack_type = (
150 | try(each.value.ipv6, null) != null ? "IPV4_IPV6" : null
151 | )
152 | ipv6_access_type = (
153 | try(each.value.ipv6, null) != null ? each.value.ipv6.access_type : null
154 | )
155 | # private_ipv6_google_access = try(each.value.ipv6.enable_private_access, null)
156 | dynamic "log_config" {
157 | for_each = each.value.flow_logs_config != null ? [""] : []
158 | content {
159 | aggregation_interval = each.value.flow_logs_config.aggregation_interval
160 | filter_expr = each.value.flow_logs_config.filter_expression
161 | flow_sampling = each.value.flow_logs_config.flow_sampling
162 | metadata = each.value.flow_logs_config.metadata
163 | metadata_fields = (
164 | each.value.flow_logs_config.metadata == "CUSTOM_METADATA"
165 | ? each.value.flow_logs_config.metadata_fields
166 | : null
167 | )
168 | }
169 | }
170 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.prod-spoke-vpc.google_compute_subnetwork.subnetwork
File: /modules/net-vpc/subnets.tf:132-170
Calling File: /fast/stages/2-networking-e-nva-bgp/spoke-prod.tf:46-61
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
132 | resource "google_compute_subnetwork" "subnetwork" {
133 | for_each = local.subnets
134 | project = var.project_id
135 | network = local.network.name
136 | name = each.value.name
137 | region = each.value.region
138 | ip_cidr_range = each.value.ip_cidr_range
139 | description = (
140 | each.value.description == null
141 | ? "Terraform-managed."
142 | : each.value.description
143 | )
144 | private_ip_google_access = each.value.enable_private_access
145 | secondary_ip_range = each.value.secondary_ip_ranges == null ? [] : [
146 | for name, range in each.value.secondary_ip_ranges :
147 | { range_name = name, ip_cidr_range = range }
148 | ]
149 | stack_type = (
150 | try(each.value.ipv6, null) != null ? "IPV4_IPV6" : null
151 | )
152 | ipv6_access_type = (
153 | try(each.value.ipv6, null) != null ? each.value.ipv6.access_type : null
154 | )
155 | # private_ipv6_google_access = try(each.value.ipv6.enable_private_access, null)
156 | dynamic "log_config" {
157 | for_each = each.value.flow_logs_config != null ? [""] : []
158 | content {
159 | aggregation_interval = each.value.flow_logs_config.aggregation_interval
160 | filter_expr = each.value.flow_logs_config.filter_expression
161 | flow_sampling = each.value.flow_logs_config.flow_sampling
162 | metadata = each.value.flow_logs_config.metadata
163 | metadata_fields = (
164 | each.value.flow_logs_config.metadata == "CUSTOM_METADATA"
165 | ? each.value.flow_logs_config.metadata_fields
166 | : null
167 | )
168 | }
169 | }
170 | }
Check: CKV_GCP_26: "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network"
FAILED for resource: module.prod-spoke-vpc.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /fast/stages/2-networking-e-nva-bgp/spoke-prod.tf:46-61
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/bc-gcp-logging-1.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.prod-spoke-vpc.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /fast/stages/2-networking-e-nva-bgp/spoke-prod.tf:46-61
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.prod-spoke-vpc.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /fast/stages/2-networking-e-nva-bgp/spoke-prod.tf:46-61
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_26: "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network"
FAILED for resource: module.prod-spoke-vpc.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /fast/stages/2-networking-e-nva-bgp/spoke-prod.tf:46-61
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/bc-gcp-logging-1.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.prod-spoke-vpc.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /fast/stages/2-networking-e-nva-bgp/spoke-prod.tf:46-61
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.prod-spoke-vpc.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /fast/stages/2-networking-e-nva-bgp/spoke-prod.tf:46-61
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.landing-trusted-vpc.google_compute_subnetwork.subnetwork
File: /modules/net-vpc/subnets.tf:132-170
Calling File: /fast/stages/2-networking-e-nva-bgp/landing.tf:110-127
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
132 | resource "google_compute_subnetwork" "subnetwork" {
133 | for_each = local.subnets
134 | project = var.project_id
135 | network = local.network.name
136 | name = each.value.name
137 | region = each.value.region
138 | ip_cidr_range = each.value.ip_cidr_range
139 | description = (
140 | each.value.description == null
141 | ? "Terraform-managed."
142 | : each.value.description
143 | )
144 | private_ip_google_access = each.value.enable_private_access
145 | secondary_ip_range = each.value.secondary_ip_ranges == null ? [] : [
146 | for name, range in each.value.secondary_ip_ranges :
147 | { range_name = name, ip_cidr_range = range }
148 | ]
149 | stack_type = (
150 | try(each.value.ipv6, null) != null ? "IPV4_IPV6" : null
151 | )
152 | ipv6_access_type = (
153 | try(each.value.ipv6, null) != null ? each.value.ipv6.access_type : null
154 | )
155 | # private_ipv6_google_access = try(each.value.ipv6.enable_private_access, null)
156 | dynamic "log_config" {
157 | for_each = each.value.flow_logs_config != null ? [""] : []
158 | content {
159 | aggregation_interval = each.value.flow_logs_config.aggregation_interval
160 | filter_expr = each.value.flow_logs_config.filter_expression
161 | flow_sampling = each.value.flow_logs_config.flow_sampling
162 | metadata = each.value.flow_logs_config.metadata
163 | metadata_fields = (
164 | each.value.flow_logs_config.metadata == "CUSTOM_METADATA"
165 | ? each.value.flow_logs_config.metadata_fields
166 | : null
167 | )
168 | }
169 | }
170 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.landing-trusted-vpc.google_compute_subnetwork.subnetwork
File: /modules/net-vpc/subnets.tf:132-170
Calling File: /fast/stages/2-networking-e-nva-bgp/landing.tf:110-127
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
132 | resource "google_compute_subnetwork" "subnetwork" {
133 | for_each = local.subnets
134 | project = var.project_id
135 | network = local.network.name
136 | name = each.value.name
137 | region = each.value.region
138 | ip_cidr_range = each.value.ip_cidr_range
139 | description = (
140 | each.value.description == null
141 | ? "Terraform-managed."
142 | : each.value.description
143 | )
144 | private_ip_google_access = each.value.enable_private_access
145 | secondary_ip_range = each.value.secondary_ip_ranges == null ? [] : [
146 | for name, range in each.value.secondary_ip_ranges :
147 | { range_name = name, ip_cidr_range = range }
148 | ]
149 | stack_type = (
150 | try(each.value.ipv6, null) != null ? "IPV4_IPV6" : null
151 | )
152 | ipv6_access_type = (
153 | try(each.value.ipv6, null) != null ? each.value.ipv6.access_type : null
154 | )
155 | # private_ipv6_google_access = try(each.value.ipv6.enable_private_access, null)
156 | dynamic "log_config" {
157 | for_each = each.value.flow_logs_config != null ? [""] : []
158 | content {
159 | aggregation_interval = each.value.flow_logs_config.aggregation_interval
160 | filter_expr = each.value.flow_logs_config.filter_expression
161 | flow_sampling = each.value.flow_logs_config.flow_sampling
162 | metadata = each.value.flow_logs_config.metadata
163 | metadata_fields = (
164 | each.value.flow_logs_config.metadata == "CUSTOM_METADATA"
165 | ? each.value.flow_logs_config.metadata_fields
166 | : null
167 | )
168 | }
169 | }
170 | }
Check: CKV_GCP_26: "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network"
FAILED for resource: module.landing-trusted-vpc.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /fast/stages/2-networking-e-nva-bgp/landing.tf:110-127
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/bc-gcp-logging-1.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.landing-trusted-vpc.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /fast/stages/2-networking-e-nva-bgp/landing.tf:110-127
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.landing-trusted-vpc.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /fast/stages/2-networking-e-nva-bgp/landing.tf:110-127
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_26: "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network"
FAILED for resource: module.landing-trusted-vpc.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /fast/stages/2-networking-e-nva-bgp/landing.tf:110-127
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/bc-gcp-logging-1.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.landing-trusted-vpc.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /fast/stages/2-networking-e-nva-bgp/landing.tf:110-127
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.landing-trusted-vpc.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /fast/stages/2-networking-e-nva-bgp/landing.tf:110-127
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.landing-untrusted-vpc.google_compute_subnetwork.subnetwork
File: /modules/net-vpc/subnets.tf:132-170
Calling File: /fast/stages/2-networking-e-nva-bgp/landing.tf:48-61
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
132 | resource "google_compute_subnetwork" "subnetwork" {
133 | for_each = local.subnets
134 | project = var.project_id
135 | network = local.network.name
136 | name = each.value.name
137 | region = each.value.region
138 | ip_cidr_range = each.value.ip_cidr_range
139 | description = (
140 | each.value.description == null
141 | ? "Terraform-managed."
142 | : each.value.description
143 | )
144 | private_ip_google_access = each.value.enable_private_access
145 | secondary_ip_range = each.value.secondary_ip_ranges == null ? [] : [
146 | for name, range in each.value.secondary_ip_ranges :
147 | { range_name = name, ip_cidr_range = range }
148 | ]
149 | stack_type = (
150 | try(each.value.ipv6, null) != null ? "IPV4_IPV6" : null
151 | )
152 | ipv6_access_type = (
153 | try(each.value.ipv6, null) != null ? each.value.ipv6.access_type : null
154 | )
155 | # private_ipv6_google_access = try(each.value.ipv6.enable_private_access, null)
156 | dynamic "log_config" {
157 | for_each = each.value.flow_logs_config != null ? [""] : []
158 | content {
159 | aggregation_interval = each.value.flow_logs_config.aggregation_interval
160 | filter_expr = each.value.flow_logs_config.filter_expression
161 | flow_sampling = each.value.flow_logs_config.flow_sampling
162 | metadata = each.value.flow_logs_config.metadata
163 | metadata_fields = (
164 | each.value.flow_logs_config.metadata == "CUSTOM_METADATA"
165 | ? each.value.flow_logs_config.metadata_fields
166 | : null
167 | )
168 | }
169 | }
170 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.landing-untrusted-vpc.google_compute_subnetwork.subnetwork
File: /modules/net-vpc/subnets.tf:132-170
Calling File: /fast/stages/2-networking-e-nva-bgp/landing.tf:48-61
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
132 | resource "google_compute_subnetwork" "subnetwork" {
133 | for_each = local.subnets
134 | project = var.project_id
135 | network = local.network.name
136 | name = each.value.name
137 | region = each.value.region
138 | ip_cidr_range = each.value.ip_cidr_range
139 | description = (
140 | each.value.description == null
141 | ? "Terraform-managed."
142 | : each.value.description
143 | )
144 | private_ip_google_access = each.value.enable_private_access
145 | secondary_ip_range = each.value.secondary_ip_ranges == null ? [] : [
146 | for name, range in each.value.secondary_ip_ranges :
147 | { range_name = name, ip_cidr_range = range }
148 | ]
149 | stack_type = (
150 | try(each.value.ipv6, null) != null ? "IPV4_IPV6" : null
151 | )
152 | ipv6_access_type = (
153 | try(each.value.ipv6, null) != null ? each.value.ipv6.access_type : null
154 | )
155 | # private_ipv6_google_access = try(each.value.ipv6.enable_private_access, null)
156 | dynamic "log_config" {
157 | for_each = each.value.flow_logs_config != null ? [""] : []
158 | content {
159 | aggregation_interval = each.value.flow_logs_config.aggregation_interval
160 | filter_expr = each.value.flow_logs_config.filter_expression
161 | flow_sampling = each.value.flow_logs_config.flow_sampling
162 | metadata = each.value.flow_logs_config.metadata
163 | metadata_fields = (
164 | each.value.flow_logs_config.metadata == "CUSTOM_METADATA"
165 | ? each.value.flow_logs_config.metadata_fields
166 | : null
167 | )
168 | }
169 | }
170 | }
Check: CKV_GCP_26: "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network"
FAILED for resource: module.landing-untrusted-vpc.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /fast/stages/2-networking-e-nva-bgp/landing.tf:48-61
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/bc-gcp-logging-1.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.landing-untrusted-vpc.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /fast/stages/2-networking-e-nva-bgp/landing.tf:48-61
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.landing-untrusted-vpc.google_compute_subnetwork.proxy_only
File: /modules/net-vpc/subnets.tf:172-185
Calling File: /fast/stages/2-networking-e-nva-bgp/landing.tf:48-61
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
172 | resource "google_compute_subnetwork" "proxy_only" {
173 | for_each = local.subnets_proxy_only
174 | project = var.project_id
175 | network = local.network.name
176 | name = each.value.name
177 | region = each.value.region
178 | ip_cidr_range = each.value.ip_cidr_range
179 | description = coalesce(
180 | each.value.description,
181 | "Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
182 | )
183 | purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
184 | role = each.value.active ? "ACTIVE" : "BACKUP"
185 | }
Check: CKV_GCP_26: "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network"
FAILED for resource: module.landing-untrusted-vpc.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /fast/stages/2-networking-e-nva-bgp/landing.tf:48-61
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/bc-gcp-logging-1.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
FAILED for resource: module.landing-untrusted-vpc.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /fast/stages/2-networking-e-nva-bgp/landing.tf:48-61
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
FAILED for resource: module.landing-untrusted-vpc.google_compute_subnetwork.psc
File: /modules/net-vpc/subnets.tf:187-199
Calling File: /fast/stages/2-networking-e-nva-bgp/landing.tf:48-61
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
187 | resource "google_compute_subnetwork" "psc" {
188 | for_each = local.subnets_psc
189 | project = var.project_id
190 | network = local.network.name
191 | name = each.value.name
192 | region = each.value.region
193 | ip_cidr_range = each.value.ip_cidr_range
194 | description = coalesce(
195 | each.value.description,
196 | "Terraform-managed subnet for Private Service Connect (PSC NAT)."
197 | )
198 | purpose = "PRIVATE_SERVICE_CONNECT"
199 | }
Check: CKV_GCP_27: "Ensure that the default network does not exist in a project"
FAILED for resource: module.projects.module.projects.google_project.project[0]
File: /modules/project/main.tf:44-54
Calling File: /blueprints/factories/project-factory/main.tf:17-65
Guide: https://docs.bridgecrew.io/docs/bc_gcp_networking_7
44 | resource "google_project" "project" {
45 | count = var.project_create ? 1 : 0
46 | org_id = local.parent_type == "organizations" ? local.parent_id : null
47 | folder_id = local.parent_type == "folders" ? local.parent_id : null
48 | project_id = "${local.prefix}${var.name}"
49 | name = local.descriptive_name
50 | billing_account = var.billing_account
51 | auto_create_network = var.auto_create_network
52 | labels = var.labels
53 | skip_delete = var.skip_delete
54 | }
Check: CKV_AZURE_119: "Ensure that Network Interfaces don't use public IPs"
FAILED for resource: azurerm_network_interface.nic
File: /blueprints/cloud-operations/workload-identity-federation/azure.tf:77-89
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/azure-policies/azure-networking-policies/ensure-that-network-interfaces-dont-use-public-ips.html
77 | resource "azurerm_network_interface" "nic" {
78 | count = var.vm_test ? 1 : 0
79 | name = "nic"
80 | resource_group_name = azurerm_resource_group.resource_group[0].name
81 | location = azurerm_resource_group.resource_group[0].location
82 |
83 | ip_configuration {
84 | name = "ipconfig"
85 | subnet_id = azurerm_subnet.subnet[0].id
86 | private_ip_address_allocation = "Dynamic"
87 | public_ip_address_id = azurerm_public_ip.public_ip[0].id
88 | }
89 | }
Check: CKV2_GCP_12: "Ensure GCP compute firewall ingress does not allow unrestricted access to all ports"
FAILED for resource: module.firewall.google_compute_firewall.allow-admins[0]
File: /modules/net-vpc-firewall/default-rules.tf:27-35
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-google-compute-firewall-ingress-does-not-allow-unrestricted-access-to-all-ports.html
27 | resource "google_compute_firewall" "allow-admins" {
28 | count = length(local.default_rules.admin_ranges) > 0 ? 1 : 0
29 | name = "${var.network}-ingress-admins"
30 | description = "Access from the admin subnet to all subnets."
31 | network = var.network
32 | project = var.project_id
33 | source_ranges = local.default_rules.admin_ranges
34 | allow { protocol = "all" }
35 | }
Check: CKV2_GCP_12: "Ensure GCP compute firewall ingress does not allow unrestricted access to all ports"
FAILED for resource: module.firewall-a.google_compute_firewall.allow-admins[0]
File: /modules/net-vpc-firewall/default-rules.tf:27-35
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-google-compute-firewall-ingress-does-not-allow-unrestricted-access-to-all-ports.html
27 | resource "google_compute_firewall" "allow-admins" {
28 | count = length(local.default_rules.admin_ranges) > 0 ? 1 : 0
29 | name = "${var.network}-ingress-admins"
30 | description = "Access from the admin subnet to all subnets."
31 | network = var.network
32 | project = var.project_id
33 | source_ranges = local.default_rules.admin_ranges
34 | allow { protocol = "all" }
35 | }
Check: CKV2_GCP_12: "Ensure GCP compute firewall ingress does not allow unrestricted access to all ports"
FAILED for resource: module.landing-vpc-firewall.google_compute_firewall.allow-admins[0]
File: /modules/net-vpc-firewall/default-rules.tf:27-35
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-google-compute-firewall-ingress-does-not-allow-unrestricted-access-to-all-ports.html
27 | resource "google_compute_firewall" "allow-admins" {
28 | count = length(local.default_rules.admin_ranges) > 0 ? 1 : 0
29 | name = "${var.network}-ingress-admins"
30 | description = "Access from the admin subnet to all subnets."
31 | network = var.network
32 | project = var.project_id
33 | source_ranges = local.default_rules.admin_ranges
34 | allow { protocol = "all" }
35 | }
Check: CKV2_GCP_12: "Ensure GCP compute firewall ingress does not allow unrestricted access to all ports"
FAILED for resource: module.vpc-firewall[0].google_compute_firewall.allow-admins[0]
File: /modules/net-vpc-firewall/default-rules.tf:27-35
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-google-compute-firewall-ingress-does-not-allow-unrestricted-access-to-all-ports.html
27 | resource "google_compute_firewall" "allow-admins" {
28 | count = length(local.default_rules.admin_ranges) > 0 ? 1 : 0
29 | name = "${var.network}-ingress-admins"
30 | description = "Access from the admin subnet to all subnets."
31 | network = var.network
32 | project = var.project_id
33 | source_ranges = local.default_rules.admin_ranges
34 | allow { protocol = "all" }
35 | }
Check: CKV2_GCP_12: "Ensure GCP compute firewall ingress does not allow unrestricted access to all ports"
FAILED for resource: module.firewall[0].google_compute_firewall.allow-admins[0]
File: /modules/net-vpc-firewall/default-rules.tf:27-35
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-google-compute-firewall-ingress-does-not-allow-unrestricted-access-to-all-ports.html
27 | resource "google_compute_firewall" "allow-admins" {
28 | count = length(local.default_rules.admin_ranges) > 0 ? 1 : 0
29 | name = "${var.network}-ingress-admins"
30 | description = "Access from the admin subnet to all subnets."
31 | network = var.network
32 | project = var.project_id
33 | source_ranges = local.default_rules.admin_ranges
34 | allow { protocol = "all" }
35 | }
Check: CKV2_GCP_12: "Ensure GCP compute firewall ingress does not allow unrestricted access to all ports"
FAILED for resource: module.vpc-firewall.google_compute_firewall.allow-admins[0]
File: /modules/net-vpc-firewall/default-rules.tf:27-35
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-google-compute-firewall-ingress-does-not-allow-unrestricted-access-to-all-ports.html
27 | resource "google_compute_firewall" "allow-admins" {
28 | count = length(local.default_rules.admin_ranges) > 0 ? 1 : 0
29 | name = "${var.network}-ingress-admins"
30 | description = "Access from the admin subnet to all subnets."
31 | network = var.network
32 | project = var.project_id
33 | source_ranges = local.default_rules.admin_ranges
34 | allow { protocol = "all" }
35 | }
Check: CKV2_GCP_12: "Ensure GCP compute firewall ingress does not allow unrestricted access to all ports"
FAILED for resource: module.firewall-consumer.google_compute_firewall.allow-admins[0]
File: /modules/net-vpc-firewall/default-rules.tf:27-35
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-google-compute-firewall-ingress-does-not-allow-unrestricted-access-to-all-ports.html
27 | resource "google_compute_firewall" "allow-admins" {
28 | count = length(local.default_rules.admin_ranges) > 0 ? 1 : 0
29 | name = "${var.network}-ingress-admins"
30 | description = "Access from the admin subnet to all subnets."
31 | network = var.network
32 | project = var.project_id
33 | source_ranges = local.default_rules.admin_ranges
34 | allow { protocol = "all" }
35 | }
Check: CKV2_GCP_12: "Ensure GCP compute firewall ingress does not allow unrestricted access to all ports"
FAILED for resource: module.firewall_landing_untrusted.google_compute_firewall.allow-admins[0]
File: /modules/net-vpc-firewall/default-rules.tf:27-35
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-google-compute-firewall-ingress-does-not-allow-unrestricted-access-to-all-ports.html
27 | resource "google_compute_firewall" "allow-admins" {
28 | count = length(local.default_rules.admin_ranges) > 0 ? 1 : 0
29 | name = "${var.network}-ingress-admins"
30 | description = "Access from the admin subnet to all subnets."
31 | network = var.network
32 | project = var.project_id
33 | source_ranges = local.default_rules.admin_ranges
34 | allow { protocol = "all" }
35 | }
Check: CKV2_GCP_12: "Ensure GCP compute firewall ingress does not allow unrestricted access to all ports"
FAILED for resource: module.firewall_spoke_01.google_compute_firewall.allow-admins[0]
File: /modules/net-vpc-firewall/default-rules.tf:27-35
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-google-compute-firewall-ingress-does-not-allow-unrestricted-access-to-all-ports.html
27 | resource "google_compute_firewall" "allow-admins" {
28 | count = length(local.default_rules.admin_ranges) > 0 ? 1 : 0
29 | name = "${var.network}-ingress-admins"
30 | description = "Access from the admin subnet to all subnets."
31 | network = var.network
32 | project = var.project_id
33 | source_ranges = local.default_rules.admin_ranges
34 | allow { protocol = "all" }
35 | }
Check: CKV2_GCP_12: "Ensure GCP compute firewall ingress does not allow unrestricted access to all ports"
FAILED for resource: module.vpc-hub-firewall.google_compute_firewall.allow-admins[0]
File: /modules/net-vpc-firewall/default-rules.tf:27-35
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-google-compute-firewall-ingress-does-not-allow-unrestricted-access-to-all-ports.html
27 | resource "google_compute_firewall" "allow-admins" {
28 | count = length(local.default_rules.admin_ranges) > 0 ? 1 : 0
29 | name = "${var.network}-ingress-admins"
30 | description = "Access from the admin subnet to all subnets."
31 | network = var.network
32 | project = var.project_id
33 | source_ranges = local.default_rules.admin_ranges
34 | allow { protocol = "all" }
35 | }
Check: CKV2_GCP_12: "Ensure GCP compute firewall ingress does not allow unrestricted access to all ports"
FAILED for resource: module.vpc-spoke-1-firewall.google_compute_firewall.allow-admins[0]
File: /modules/net-vpc-firewall/default-rules.tf:27-35
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-google-compute-firewall-ingress-does-not-allow-unrestricted-access-to-all-ports.html
27 | resource "google_compute_firewall" "allow-admins" {
28 | count = length(local.default_rules.admin_ranges) > 0 ? 1 : 0
29 | name = "${var.network}-ingress-admins"
30 | description = "Access from the admin subnet to all subnets."
31 | network = var.network
32 | project = var.project_id
33 | source_ranges = local.default_rules.admin_ranges
34 | allow { protocol = "all" }
35 | }
Check: CKV2_GCP_12: "Ensure GCP compute firewall ingress does not allow unrestricted access to all ports"
FAILED for resource: module.vpc-spoke-2-firewall.google_compute_firewall.allow-admins[0]
File: /modules/net-vpc-firewall/default-rules.tf:27-35
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-google-compute-firewall-ingress-does-not-allow-unrestricted-access-to-all-ports.html
27 | resource "google_compute_firewall" "allow-admins" {
28 | count = length(local.default_rules.admin_ranges) > 0 ? 1 : 0
29 | name = "${var.network}-ingress-admins"
30 | description = "Access from the admin subnet to all subnets."
31 | network = var.network
32 | project = var.project_id
33 | source_ranges = local.default_rules.admin_ranges
34 | allow { protocol = "all" }
35 | }
Check: CKV2_GCP_12: "Ensure GCP compute firewall ingress does not allow unrestricted access to all ports"
FAILED for resource: module.dev-firewall.google_compute_firewall.allow-admins[0]
File: /modules/net-vpc-firewall/default-rules.tf:27-35
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-google-compute-firewall-ingress-does-not-allow-unrestricted-access-to-all-ports.html
27 | resource "google_compute_firewall" "allow-admins" {
28 | count = length(local.default_rules.admin_ranges) > 0 ? 1 : 0
29 | name = "${var.network}-ingress-admins"
30 | description = "Access from the admin subnet to all subnets."
31 | network = var.network
32 | project = var.project_id
33 | source_ranges = local.default_rules.admin_ranges
34 | allow { protocol = "all" }
35 | }
Check: CKV2_GCP_12: "Ensure GCP compute firewall ingress does not allow unrestricted access to all ports"
FAILED for resource: module.landing-firewall.google_compute_firewall.allow-admins[0]
File: /modules/net-vpc-firewall/default-rules.tf:27-35
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-google-compute-firewall-ingress-does-not-allow-unrestricted-access-to-all-ports.html
27 | resource "google_compute_firewall" "allow-admins" {
28 | count = length(local.default_rules.admin_ranges) > 0 ? 1 : 0
29 | name = "${var.network}-ingress-admins"
30 | description = "Access from the admin subnet to all subnets."
31 | network = var.network
32 | project = var.project_id
33 | source_ranges = local.default_rules.admin_ranges
34 | allow { protocol = "all" }
35 | }
Check: CKV2_GCP_12: "Ensure GCP compute firewall ingress does not allow unrestricted access to all ports"
FAILED for resource: module.prod-firewall.google_compute_firewall.allow-admins[0]
File: /modules/net-vpc-firewall/default-rules.tf:27-35
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-google-compute-firewall-ingress-does-not-allow-unrestricted-access-to-all-ports.html
27 | resource "google_compute_firewall" "allow-admins" {
28 | count = length(local.default_rules.admin_ranges) > 0 ? 1 : 0
29 | name = "${var.network}-ingress-admins"
30 | description = "Access from the admin subnet to all subnets."
31 | network = var.network
32 | project = var.project_id
33 | source_ranges = local.default_rules.admin_ranges
34 | allow { protocol = "all" }
35 | }
Check: CKV2_GCP_12: "Ensure GCP compute firewall ingress does not allow unrestricted access to all ports"
FAILED for resource: module.firewall-onprem.google_compute_firewall.allow-admins[0]
File: /modules/net-vpc-firewall/default-rules.tf:27-35
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-google-compute-firewall-ingress-does-not-allow-unrestricted-access-to-all-ports.html
27 | resource "google_compute_firewall" "allow-admins" {
28 | count = length(local.default_rules.admin_ranges) > 0 ? 1 : 0
29 | name = "${var.network}-ingress-admins"
30 | description = "Access from the admin subnet to all subnets."
31 | network = var.network
32 | project = var.project_id
33 | source_ranges = local.default_rules.admin_ranges
34 | allow { protocol = "all" }
35 | }
Check: CKV2_GCP_12: "Ensure GCP compute firewall ingress does not allow unrestricted access to all ports"
FAILED for resource: module.vpc-shared-firewall.google_compute_firewall.allow-admins[0]
File: /modules/net-vpc-firewall/default-rules.tf:27-35
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-google-compute-firewall-ingress-does-not-allow-unrestricted-access-to-all-ports.html
27 | resource "google_compute_firewall" "allow-admins" {
28 | count = length(local.default_rules.admin_ranges) > 0 ? 1 : 0
29 | name = "${var.network}-ingress-admins"
30 | description = "Access from the admin subnet to all subnets."
31 | network = var.network
32 | project = var.project_id
33 | source_ranges = local.default_rules.admin_ranges
34 | allow { protocol = "all" }
35 | }
Check: CKV2_GCP_12: "Ensure GCP compute firewall ingress does not allow unrestricted access to all ports"
FAILED for resource: module.firewall_main.google_compute_firewall.allow-admins[0]
File: /modules/net-vpc-firewall/default-rules.tf:27-35
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-google-compute-firewall-ingress-does-not-allow-unrestricted-access-to-all-ports.html
27 | resource "google_compute_firewall" "allow-admins" {
28 | count = length(local.default_rules.admin_ranges) > 0 ? 1 : 0
29 | name = "${var.network}-ingress-admins"
30 | description = "Access from the admin subnet to all subnets."
31 | network = var.network
32 | project = var.project_id
33 | source_ranges = local.default_rules.admin_ranges
34 | allow { protocol = "all" }
35 | }
Check: CKV2_GCP_12: "Ensure GCP compute firewall ingress does not allow unrestricted access to all ports"
FAILED for resource: module.firewall_onprem.google_compute_firewall.allow-admins[0]
File: /modules/net-vpc-firewall/default-rules.tf:27-35
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-google-compute-firewall-ingress-does-not-allow-unrestricted-access-to-all-ports.html
27 | resource "google_compute_firewall" "allow-admins" {
28 | count = length(local.default_rules.admin_ranges) > 0 ? 1 : 0
29 | name = "${var.network}-ingress-admins"
30 | description = "Access from the admin subnet to all subnets."
31 | network = var.network
32 | project = var.project_id
33 | source_ranges = local.default_rules.admin_ranges
34 | allow { protocol = "all" }
35 | }
Check: CKV2_GCP_12: "Ensure GCP compute firewall ingress does not allow unrestricted access to all ports"
FAILED for resource: module.firewall_prj1.google_compute_firewall.allow-admins[0]
File: /modules/net-vpc-firewall/default-rules.tf:27-35
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-google-compute-firewall-ingress-does-not-allow-unrestricted-access-to-all-ports.html
27 | resource "google_compute_firewall" "allow-admins" {
28 | count = length(local.default_rules.admin_ranges) > 0 ? 1 : 0
29 | name = "${var.network}-ingress-admins"
30 | description = "Access from the admin subnet to all subnets."
31 | network = var.network
32 | project = var.project_id
33 | source_ranges = local.default_rules.admin_ranges
34 | allow { protocol = "all" }
35 | }
Check: CKV2_GCP_12: "Ensure GCP compute firewall ingress does not allow unrestricted access to all ports"
FAILED for resource: module.landing-trusted-firewall.google_compute_firewall.allow-admins[0]
File: /modules/net-vpc-firewall/default-rules.tf:27-35
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-google-compute-firewall-ingress-does-not-allow-unrestricted-access-to-all-ports.html
27 | resource "google_compute_firewall" "allow-admins" {
28 | count = length(local.default_rules.admin_ranges) > 0 ? 1 : 0
29 | name = "${var.network}-ingress-admins"
30 | description = "Access from the admin subnet to all subnets."
31 | network = var.network
32 | project = var.project_id
33 | source_ranges = local.default_rules.admin_ranges
34 | allow { protocol = "all" }
35 | }
Check: CKV2_GCP_12: "Ensure GCP compute firewall ingress does not allow unrestricted access to all ports"
FAILED for resource: module.landing-untrusted-firewall.google_compute_firewall.allow-admins[0]
File: /modules/net-vpc-firewall/default-rules.tf:27-35
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-google-compute-firewall-ingress-does-not-allow-unrestricted-access-to-all-ports.html
27 | resource "google_compute_firewall" "allow-admins" {
28 | count = length(local.default_rules.admin_ranges) > 0 ? 1 : 0
29 | name = "${var.network}-ingress-admins"
30 | description = "Access from the admin subnet to all subnets."
31 | network = var.network
32 | project = var.project_id
33 | source_ranges = local.default_rules.admin_ranges
34 | allow { protocol = "all" }
35 | }
Check: CKV2_GCP_12: "Ensure GCP compute firewall ingress does not allow unrestricted access to all ports"
FAILED for resource: module.dev-spoke-firewall.google_compute_firewall.allow-admins[0]
File: /modules/net-vpc-firewall/default-rules.tf:27-35
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-google-compute-firewall-ingress-does-not-allow-unrestricted-access-to-all-ports.html
27 | resource "google_compute_firewall" "allow-admins" {
28 | count = length(local.default_rules.admin_ranges) > 0 ? 1 : 0
29 | name = "${var.network}-ingress-admins"
30 | description = "Access from the admin subnet to all subnets."
31 | network = var.network
32 | project = var.project_id
33 | source_ranges = local.default_rules.admin_ranges
34 | allow { protocol = "all" }
35 | }
Check: CKV2_GCP_12: "Ensure GCP compute firewall ingress does not allow unrestricted access to all ports"
FAILED for resource: module.prod-spoke-firewall.google_compute_firewall.allow-admins[0]
File: /modules/net-vpc-firewall/default-rules.tf:27-35
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-google-compute-firewall-ingress-does-not-allow-unrestricted-access-to-all-ports.html
27 | resource "google_compute_firewall" "allow-admins" {
28 | count = length(local.default_rules.admin_ranges) > 0 ? 1 : 0
29 | name = "${var.network}-ingress-admins"
30 | description = "Access from the admin subnet to all subnets."
31 | network = var.network
32 | project = var.project_id
33 | source_ranges = local.default_rules.admin_ranges
34 | allow { protocol = "all" }
35 | }
Check: CKV2_GCP_20: "Ensure MySQL DB instance has point-in-time recovery backup configured"
FAILED for resource: module.cloudsql.google_sql_database_instance.replicas
File: /modules/cloudsql-instance/main.tf:126-170
126 | resource "google_sql_database_instance" "replicas" {
127 | provider = google-beta
128 | for_each = local.has_replicas ? var.replicas : {}
129 | project = var.project_id
130 | name = "${local.prefix}${each.key}"
131 | region = each.value.region
132 | database_version = var.database_version
133 | encryption_key_name = each.value.encryption_key_name
134 | master_instance_name = google_sql_database_instance.primary.name
135 |
136 | settings {
137 | tier = var.tier
138 | deletion_protection_enabled = var.deletion_protection_enabled
139 | disk_autoresize = var.disk_size == null
140 | disk_size = var.disk_size
141 | disk_type = var.disk_type
142 | # availability_type = var.availability_type
143 | user_labels = var.labels
144 | activation_policy = var.activation_policy
145 |
146 | ip_configuration {
147 | ipv4_enabled = var.ipv4_enabled
148 | private_network = var.network
149 | allocated_ip_range = var.allocated_ip_ranges.replica
150 | dynamic "authorized_networks" {
151 | for_each = var.authorized_networks != null ? var.authorized_networks : {}
152 | iterator = network
153 | content {
154 | name = network.key
155 | value = network.value
156 | }
157 | }
158 | }
159 |
160 | dynamic "database_flags" {
161 | for_each = var.flags != null ? var.flags : {}
162 | iterator = flag
163 | content {
164 | name = flag.key
165 | value = flag.value
166 | }
167 | }
168 | }
169 | deletion_protection = var.deletion_protection
170 | }
Check: CKV2_GCP_3: "Ensure that there are only GCP-managed service account keys for each service account"
FAILED for resource: module.sas.google_service_account_key.upload_key
File: /modules/iam-service-account/main.tf:83-87
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-that-there-are-only-gcp-managed-service-account-keys-for-each-service-account.html
83 | resource "google_service_account_key" "upload_key" {
84 | for_each = local.public_keys_data
85 | service_account_id = local.service_account.email
86 | public_key_data = each.value
87 | }
Check: CKV2_GCP_3: "Ensure that there are only GCP-managed service account keys for each service account"
FAILED for resource: module.service-account.google_service_account_key.upload_key
File: /modules/iam-service-account/main.tf:83-87
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-that-there-are-only-gcp-managed-service-account-keys-for-each-service-account.html
83 | resource "google_service_account_key" "upload_key" {
84 | for_each = local.public_keys_data
85 | service_account_id = local.service_account.email
86 | public_key_data = each.value
87 | }
Check: CKV2_GCP_3: "Ensure that there are only GCP-managed service account keys for each service account"
FAILED for resource: module.integration-sa["data-uploader"].google_service_account_key.upload_key
File: /modules/iam-service-account/main.tf:83-87
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-that-there-are-only-gcp-managed-service-account-keys-for-each-service-account.html
83 | resource "google_service_account_key" "upload_key" {
84 | for_each = local.public_keys_data
85 | service_account_id = local.service_account.email
86 | public_key_data = each.value
87 | }
Check: CKV2_GCP_3: "Ensure that there are only GCP-managed service account keys for each service account"
FAILED for resource: module.service-account-image-builder.google_service_account_key.upload_key
File: /modules/iam-service-account/main.tf:83-87
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-that-there-are-only-gcp-managed-service-account-keys-for-each-service-account.html
83 | resource "google_service_account_key" "upload_key" {
84 | for_each = local.public_keys_data
85 | service_account_id = local.service_account.email
86 | public_key_data = each.value
87 | }
Check: CKV2_GCP_3: "Ensure that there are only GCP-managed service account keys for each service account"
FAILED for resource: module.service-account-image-builder-vm.google_service_account_key.upload_key
File: /modules/iam-service-account/main.tf:83-87
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-that-there-are-only-gcp-managed-service-account-keys-for-each-service-account.html
83 | resource "google_service_account_key" "upload_key" {
84 | for_each = local.public_keys_data
85 | service_account_id = local.service_account.email
86 | public_key_data = each.value
87 | }
Check: CKV2_GCP_3: "Ensure that there are only GCP-managed service account keys for each service account"
FAILED for resource: module.sa-tfc.google_service_account_key.upload_key
File: /modules/iam-service-account/main.tf:83-87
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-that-there-are-only-gcp-managed-service-account-keys-for-each-service-account.html
83 | resource "google_service_account_key" "upload_key" {
84 | for_each = local.public_keys_data
85 | service_account_id = local.service_account.email
86 | public_key_data = each.value
87 | }
Check: CKV2_GCP_3: "Ensure that there are only GCP-managed service account keys for each service account"
FAILED for resource: module.service-account-healthchecker.google_service_account_key.upload_key
File: /modules/iam-service-account/main.tf:83-87
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-that-there-are-only-gcp-managed-service-account-keys-for-each-service-account.html
83 | resource "google_service_account_key" "upload_key" {
84 | for_each = local.public_keys_data
85 | service_account_id = local.service_account.email
86 | public_key_data = each.value
87 | }
Check: CKV2_GCP_3: "Ensure that there are only GCP-managed service account keys for each service account"
FAILED for resource: module.service-account-restarter.google_service_account_key.upload_key
File: /modules/iam-service-account/main.tf:83-87
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-that-there-are-only-gcp-managed-service-account-keys-for-each-service-account.html
83 | resource "google_service_account_key" "upload_key" {
84 | for_each = local.public_keys_data
85 | service_account_id = local.service_account.email
86 | public_key_data = each.value
87 | }
Check: CKV2_GCP_3: "Ensure that there are only GCP-managed service account keys for each service account"
FAILED for resource: module.service-account-scheduler.google_service_account_key.upload_key
File: /modules/iam-service-account/main.tf:83-87
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-that-there-are-only-gcp-managed-service-account-keys-for-each-service-account.html
83 | resource "google_service_account_key" "upload_key" {
84 | for_each = local.public_keys_data
85 | service_account_id = local.service_account.email
86 | public_key_data = each.value
87 | }
Check: CKV2_GCP_3: "Ensure that there are only GCP-managed service account keys for each service account"
FAILED for resource: module.m4ce-service-account.google_service_account_key.upload_key
File: /modules/iam-service-account/main.tf:83-87
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-that-there-are-only-gcp-managed-service-account-keys-for-each-service-account.html
83 | resource "google_service_account_key" "upload_key" {
84 | for_each = local.public_keys_data
85 | service_account_id = local.service_account.email
86 | public_key_data = each.value
87 | }
Check: CKV2_GCP_3: "Ensure that there are only GCP-managed service account keys for each service account"
FAILED for resource: module.sa.google_service_account_key.upload_key
File: /modules/iam-service-account/main.tf:83-87
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-that-there-are-only-gcp-managed-service-account-keys-for-each-service-account.html
83 | resource "google_service_account_key" "upload_key" {
84 | for_each = local.public_keys_data
85 | service_account_id = local.service_account.email
86 | public_key_data = each.value
87 | }
Check: CKV2_GCP_3: "Ensure that there are only GCP-managed service account keys for each service account"
FAILED for resource: module.service-account-notebook.google_service_account_key.upload_key
File: /modules/iam-service-account/main.tf:83-87
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-that-there-are-only-gcp-managed-service-account-keys-for-each-service-account.html
83 | resource "google_service_account_key" "upload_key" {
84 | for_each = local.public_keys_data
85 | service_account_id = local.service_account.email
86 | public_key_data = each.value
87 | }
Check: CKV2_GCP_3: "Ensure that there are only GCP-managed service account keys for each service account"
FAILED for resource: module.service-account-vertex.google_service_account_key.upload_key
File: /modules/iam-service-account/main.tf:83-87
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-that-there-are-only-gcp-managed-service-account-keys-for-each-service-account.html
83 | resource "google_service_account_key" "upload_key" {
84 | for_each = local.public_keys_data
85 | service_account_id = local.service_account.email
86 | public_key_data = each.value
87 | }
Check: CKV2_GCP_3: "Ensure that there are only GCP-managed service account keys for each service account"
FAILED for resource: module.service-account-sql.google_service_account_key.upload_key
File: /modules/iam-service-account/main.tf:83-87
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-that-there-are-only-gcp-managed-service-account-keys-for-each-service-account.html
83 | resource "google_service_account_key" "upload_key" {
84 | for_each = local.public_keys_data
85 | service_account_id = local.service_account.email
86 | public_key_data = each.value
87 | }
Check: CKV2_GCP_3: "Ensure that there are only GCP-managed service account keys for each service account"
FAILED for resource: module.comp-sa.google_service_account_key.upload_key
File: /modules/iam-service-account/main.tf:83-87
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-that-there-are-only-gcp-managed-service-account-keys-for-each-service-account.html
83 | resource "google_service_account_key" "upload_key" {
84 | for_each = local.public_keys_data
85 | service_account_id = local.service_account.email
86 | public_key_data = each.value
87 | }
Check: CKV2_GCP_3: "Ensure that there are only GCP-managed service account keys for each service account"
FAILED for resource: module.data-platform.module.drop-sa-bq-0.google_service_account_key.upload_key
File: /modules/iam-service-account/main.tf:83-87
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-that-there-are-only-gcp-managed-service-account-keys-for-each-service-account.html
83 | resource "google_service_account_key" "upload_key" {
84 | for_each = local.public_keys_data
85 | service_account_id = local.service_account.email
86 | public_key_data = each.value
87 | }
Check: CKV2_GCP_3: "Ensure that there are only GCP-managed service account keys for each service account"
FAILED for resource: module.data-platform.module.drop-sa-cs-0.google_service_account_key.upload_key
File: /modules/iam-service-account/main.tf:83-87
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-that-there-are-only-gcp-managed-service-account-keys-for-each-service-account.html
83 | resource "google_service_account_key" "upload_key" {
84 | for_each = local.public_keys_data
85 | service_account_id = local.service_account.email
86 | public_key_data = each.value
87 | }
Check: CKV2_GCP_3: "Ensure that there are only GCP-managed service account keys for each service account"
FAILED for resource: module.data-platform.module.drop-sa-ps-0.google_service_account_key.upload_key
File: /modules/iam-service-account/main.tf:83-87
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-that-there-are-only-gcp-managed-service-account-keys-for-each-service-account.html
83 | resource "google_service_account_key" "upload_key" {
84 | for_each = local.public_keys_data
85 | service_account_id = local.service_account.email
86 | public_key_data = each.value
87 | }
Check: CKV2_GCP_3: "Ensure that there are only GCP-managed service account keys for each service account"
FAILED for resource: module.data-platform.module.load-sa-df-0.google_service_account_key.upload_key
File: /modules/iam-service-account/main.tf:83-87
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-that-there-are-only-gcp-managed-service-account-keys-for-each-service-account.html
83 | resource "google_service_account_key" "upload_key" {
84 | for_each = local.public_keys_data
85 | service_account_id = local.service_account.email
86 | public_key_data = each.value
87 | }
Check: CKV2_GCP_3: "Ensure that there are only GCP-managed service account keys for each service account"
FAILED for resource: module.data-platform.module.orch-sa-cmp-0.google_service_account_key.upload_key
File: /modules/iam-service-account/main.tf:83-87
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-that-there-are-only-gcp-managed-service-account-keys-for-each-service-account.html
83 | resource "google_service_account_key" "upload_key" {
84 | for_each = local.public_keys_data
85 | service_account_id = local.service_account.email
86 | public_key_data = each.value
87 | }
Check: CKV2_GCP_3: "Ensure that there are only GCP-managed service account keys for each service account"
FAILED for resource: module.data-platform.module.orch-sa-df-build.google_service_account_key.upload_key
File: /modules/iam-service-account/main.tf:83-87
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-that-there-are-only-gcp-managed-service-account-keys-for-each-service-account.html
83 | resource "google_service_account_key" "upload_key" {
84 | for_each = local.public_keys_data
85 | service_account_id = local.service_account.email
86 | public_key_data = each.value
87 | }
Check: CKV2_GCP_3: "Ensure that there are only GCP-managed service account keys for each service account"
FAILED for resource: module.data-platform.module.transf-sa-bq-0.google_service_account_key.upload_key
File: /modules/iam-service-account/main.tf:83-87
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-that-there-are-only-gcp-managed-service-account-keys-for-each-service-account.html
83 | resource "google_service_account_key" "upload_key" {
84 | for_each = local.public_keys_data
85 | service_account_id = local.service_account.email
86 | public_key_data = each.value
87 | }
Check: CKV2_GCP_3: "Ensure that there are only GCP-managed service account keys for each service account"
FAILED for resource: module.data-platform.module.transf-sa-df-0.google_service_account_key.upload_key
File: /modules/iam-service-account/main.tf:83-87
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-that-there-are-only-gcp-managed-service-account-keys-for-each-service-account.html
83 | resource "google_service_account_key" "upload_key" {
84 | for_each = local.public_keys_data
85 | service_account_id = local.service_account.email
86 | public_key_data = each.value
87 | }
Check: CKV2_GCP_3: "Ensure that there are only GCP-managed service account keys for each service account"
FAILED for resource: module.land-sa-0.google_service_account_key.upload_key
File: /modules/iam-service-account/main.tf:83-87
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-that-there-are-only-gcp-managed-service-account-keys-for-each-service-account.html
83 | resource "google_service_account_key" "upload_key" {
84 | for_each = local.public_keys_data
85 | service_account_id = local.service_account.email
86 | public_key_data = each.value
87 | }
Check: CKV2_GCP_3: "Ensure that there are only GCP-managed service account keys for each service account"
FAILED for resource: module.processing-sa-cmp-0.google_service_account_key.upload_key
File: /modules/iam-service-account/main.tf:83-87
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-that-there-are-only-gcp-managed-service-account-keys-for-each-service-account.html
83 | resource "google_service_account_key" "upload_key" {
84 | for_each = local.public_keys_data
85 | service_account_id = local.service_account.email
86 | public_key_data = each.value
87 | }
Check: CKV2_GCP_3: "Ensure that there are only GCP-managed service account keys for each service account"
FAILED for resource: module.processing-sa-0.google_service_account_key.upload_key
File: /modules/iam-service-account/main.tf:83-87
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-that-there-are-only-gcp-managed-service-account-keys-for-each-service-account.html
83 | resource "google_service_account_key" "upload_key" {
84 | for_each = local.public_keys_data
85 | service_account_id = local.service_account.email
86 | public_key_data = each.value
87 | }
Check: CKV2_GCP_3: "Ensure that there are only GCP-managed service account keys for each service account"
FAILED for resource: module.cur-sa-0.google_service_account_key.upload_key
File: /modules/iam-service-account/main.tf:83-87
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-that-there-are-only-gcp-managed-service-account-keys-for-each-service-account.html
83 | resource "google_service_account_key" "upload_key" {
84 | for_each = local.public_keys_data
85 | service_account_id = local.service_account.email
86 | public_key_data = each.value
87 | }
Check: CKV2_GCP_3: "Ensure that there are only GCP-managed service account keys for each service account"
FAILED for resource: module.service-account-bq.google_service_account_key.upload_key
File: /modules/iam-service-account/main.tf:83-87
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-that-there-are-only-gcp-managed-service-account-keys-for-each-service-account.html
83 | resource "google_service_account_key" "upload_key" {
84 | for_each = local.public_keys_data
85 | service_account_id = local.service_account.email
86 | public_key_data = each.value
87 | }
Check: CKV2_GCP_3: "Ensure that there are only GCP-managed service account keys for each service account"
FAILED for resource: module.service-account-df.google_service_account_key.upload_key
File: /modules/iam-service-account/main.tf:83-87
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-that-there-are-only-gcp-managed-service-account-keys-for-each-service-account.html
83 | resource "google_service_account_key" "upload_key" {
84 | for_each = local.public_keys_data
85 | service_account_id = local.service_account.email
86 | public_key_data = each.value
87 | }
Check: CKV2_GCP_3: "Ensure that there are only GCP-managed service account keys for each service account"
FAILED for resource: module.service-account-landing.google_service_account_key.upload_key
File: /modules/iam-service-account/main.tf:83-87
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-that-there-are-only-gcp-managed-service-account-keys-for-each-service-account.html
83 | resource "google_service_account_key" "upload_key" {
84 | for_each = local.public_keys_data
85 | service_account_id = local.service_account.email
86 | public_key_data = each.value
87 | }
Check: CKV2_GCP_3: "Ensure that there are only GCP-managed service account keys for each service account"
FAILED for resource: module.service-account-orch.google_service_account_key.upload_key
File: /modules/iam-service-account/main.tf:83-87
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-that-there-are-only-gcp-managed-service-account-keys-for-each-service-account.html
83 | resource "google_service_account_key" "upload_key" {
84 | for_each = local.public_keys_data
85 | service_account_id = local.service_account.email
86 | public_key_data = each.value
87 | }
Check: CKV2_GCP_3: "Ensure that there are only GCP-managed service account keys for each service account"
FAILED for resource: module.compute-service-account.google_service_account_key.upload_key
File: /modules/iam-service-account/main.tf:83-87
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-that-there-are-only-gcp-managed-service-account-keys-for-each-service-account.html
83 | resource "google_service_account_key" "upload_key" {
84 | for_each = local.public_keys_data
85 | service_account_id = local.service_account.email
86 | public_key_data = each.value
87 | }
Check: CKV2_GCP_3: "Ensure that there are only GCP-managed service account keys for each service account"
FAILED for resource: module.witness-service-account.google_service_account_key.upload_key
File: /modules/iam-service-account/main.tf:83-87
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-that-there-are-only-gcp-managed-service-account-keys-for-each-service-account.html
83 | resource "google_service_account_key" "upload_key" {
84 | for_each = local.public_keys_data
85 | service_account_id = local.service_account.email
86 | public_key_data = each.value
87 | }
Check: CKV2_GCP_3: "Ensure that there are only GCP-managed service account keys for each service account"
FAILED for resource: module.service-account-github.google_service_account_key.upload_key
File: /modules/iam-service-account/main.tf:83-87
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-that-there-are-only-gcp-managed-service-account-keys-for-each-service-account.html
83 | resource "google_service_account_key" "upload_key" {
84 | for_each = local.public_keys_data
85 | service_account_id = local.service_account.email
86 | public_key_data = each.value
87 | }
Check: CKV2_GCP_3: "Ensure that there are only GCP-managed service account keys for each service account"
FAILED for resource: module.service-account-mlops.google_service_account_key.upload_key
File: /modules/iam-service-account/main.tf:83-87
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-that-there-are-only-gcp-managed-service-account-keys-for-each-service-account.html
83 | resource "google_service_account_key" "upload_key" {
84 | for_each = local.public_keys_data
85 | service_account_id = local.service_account.email
86 | public_key_data = each.value
87 | }
Check: CKV2_GCP_3: "Ensure that there are only GCP-managed service account keys for each service account"
FAILED for resource: module.projects.module.service-accounts.google_service_account_key.upload_key
File: /modules/iam-service-account/main.tf:83-87
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-that-there-are-only-gcp-managed-service-account-keys-for-each-service-account.html
83 | resource "google_service_account_key" "upload_key" {
84 | for_each = local.public_keys_data
85 | service_account_id = local.service_account.email
86 | public_key_data = each.value
87 | }
Check: CKV2_GCP_3: "Ensure that there are only GCP-managed service account keys for each service account"
FAILED for resource: module.node_sa.google_service_account_key.upload_key
File: /modules/iam-service-account/main.tf:83-87
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-that-there-are-only-gcp-managed-service-account-keys-for-each-service-account.html
83 | resource "google_service_account_key" "upload_key" {
84 | for_each = local.public_keys_data
85 | service_account_id = local.service_account.email
86 | public_key_data = each.value
87 | }
Check: CKV2_GCP_3: "Ensure that there are only GCP-managed service account keys for each service account"
FAILED for resource: module.monitoring_sa.google_service_account_key.upload_key
File: /modules/iam-service-account/main.tf:83-87
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-that-there-are-only-gcp-managed-service-account-keys-for-each-service-account.html
83 | resource "google_service_account_key" "upload_key" {
84 | for_each = local.public_keys_data
85 | service_account_id = local.service_account.email
86 | public_key_data = each.value
87 | }
Check: CKV2_GCP_3: "Ensure that there are only GCP-managed service account keys for each service account"
FAILED for resource: module.app_cb_sa.google_service_account_key.upload_key
File: /modules/iam-service-account/main.tf:83-87
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-that-there-are-only-gcp-managed-service-account-keys-for-each-service-account.html
83 | resource "google_service_account_key" "upload_key" {
84 | for_each = local.public_keys_data
85 | service_account_id = local.service_account.email
86 | public_key_data = each.value
87 | }
Check: CKV2_GCP_3: "Ensure that there are only GCP-managed service account keys for each service account"
FAILED for resource: module.image_cb_sa.google_service_account_key.upload_key
File: /modules/iam-service-account/main.tf:83-87
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-that-there-are-only-gcp-managed-service-account-keys-for-each-service-account.html
83 | resource "google_service_account_key" "upload_key" {
84 | for_each = local.public_keys_data
85 | service_account_id = local.service_account.email
86 | public_key_data = each.value
87 | }
Check: CKV2_GCP_3: "Ensure that there are only GCP-managed service account keys for each service account"
FAILED for resource: module.service-account-squid.google_service_account_key.upload_key
File: /modules/iam-service-account/main.tf:83-87
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-that-there-are-only-gcp-managed-service-account-keys-for-each-service-account.html
83 | resource "google_service_account_key" "upload_key" {
84 | for_each = local.public_keys_data
85 | service_account_id = local.service_account.email
86 | public_key_data = each.value
87 | }
Check: CKV2_GCP_3: "Ensure that there are only GCP-managed service account keys for each service account"
FAILED for resource: module.service-account-gce.google_service_account_key.upload_key
File: /modules/iam-service-account/main.tf:83-87
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-that-there-are-only-gcp-managed-service-account-keys-for-each-service-account.html
83 | resource "google_service_account_key" "upload_key" {
84 | for_each = local.public_keys_data
85 | service_account_id = local.service_account.email
86 | public_key_data = each.value
87 | }
Check: CKV2_GCP_3: "Ensure that there are only GCP-managed service account keys for each service account"
FAILED for resource: module.service-account-gke-node.google_service_account_key.upload_key
File: /modules/iam-service-account/main.tf:83-87
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-that-there-are-only-gcp-managed-service-account-keys-for-each-service-account.html
83 | resource "google_service_account_key" "upload_key" {
84 | for_each = local.public_keys_data
85 | service_account_id = local.service_account.email
86 | public_key_data = each.value
87 | }
Check: CKV2_GCP_3: "Ensure that there are only GCP-managed service account keys for each service account"
FAILED for resource: module.service-accounts.google_service_account_key.upload_key
File: /modules/iam-service-account/main.tf:83-87
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-that-there-are-only-gcp-managed-service-account-keys-for-each-service-account.html
83 | resource "google_service_account_key" "upload_key" {
84 | for_each = local.public_keys_data
85 | service_account_id = local.service_account.email
86 | public_key_data = each.value
87 | }
Check: CKV2_GCP_3: "Ensure that there are only GCP-managed service account keys for each service account"
FAILED for resource: module.automation-tf-resman-sa-stage2-3.google_service_account_key.upload_key
File: /modules/iam-service-account/main.tf:83-87
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-that-there-are-only-gcp-managed-service-account-keys-for-each-service-account.html
83 | resource "google_service_account_key" "upload_key" {
84 | for_each = local.public_keys_data
85 | service_account_id = local.service_account.email
86 | public_key_data = each.value
87 | }
Check: CKV2_GCP_3: "Ensure that there are only GCP-managed service account keys for each service account"
FAILED for resource: module.automation-tf-resman-sa.google_service_account_key.upload_key
File: /modules/iam-service-account/main.tf:83-87
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-that-there-are-only-gcp-managed-service-account-keys-for-each-service-account.html
83 | resource "google_service_account_key" "upload_key" {
84 | for_each = local.public_keys_data
85 | service_account_id = local.service_account.email
86 | public_key_data = each.value
87 | }
Check: CKV2_GCP_3: "Ensure that there are only GCP-managed service account keys for each service account"
FAILED for resource: module.automation-tf-cicd-sa-bootstrap.google_service_account_key.upload_key
File: /modules/iam-service-account/main.tf:83-87
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-that-there-are-only-gcp-managed-service-account-keys-for-each-service-account.html
83 | resource "google_service_account_key" "upload_key" {
84 | for_each = local.public_keys_data
85 | service_account_id = local.service_account.email
86 | public_key_data = each.value
87 | }
Check: CKV2_GCP_3: "Ensure that there are only GCP-managed service account keys for each service account"
FAILED for resource: module.automation-tf-cicd-sa-resman.google_service_account_key.upload_key
File: /modules/iam-service-account/main.tf:83-87
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-that-there-are-only-gcp-managed-service-account-keys-for-each-service-account.html
83 | resource "google_service_account_key" "upload_key" {
84 | for_each = local.public_keys_data
85 | service_account_id = local.service_account.email
86 | public_key_data = each.value
87 | }
Check: CKV2_GCP_3: "Ensure that there are only GCP-managed service account keys for each service account"
FAILED for resource: module.automation-tf-org-resman-sa.google_service_account_key.upload_key
File: /modules/iam-service-account/main.tf:83-87
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-that-there-are-only-gcp-managed-service-account-keys-for-each-service-account.html
83 | resource "google_service_account_key" "upload_key" {
84 | for_each = local.public_keys_data
85 | service_account_id = local.service_account.email
86 | public_key_data = each.value
87 | }
Check: CKV2_GCP_3: "Ensure that there are only GCP-managed service account keys for each service account"
FAILED for resource: module.branch-dp-dev-sa.google_service_account_key.upload_key
File: /modules/iam-service-account/main.tf:83-87
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-that-there-are-only-gcp-managed-service-account-keys-for-each-service-account.html
83 | resource "google_service_account_key" "upload_key" {
84 | for_each = local.public_keys_data
85 | service_account_id = local.service_account.email
86 | public_key_data = each.value
87 | }
Check: CKV2_GCP_3: "Ensure that there are only GCP-managed service account keys for each service account"
FAILED for resource: module.branch-dp-prod-sa.google_service_account_key.upload_key
File: /modules/iam-service-account/main.tf:83-87
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-that-there-are-only-gcp-managed-service-account-keys-for-each-service-account.html
83 | resource "google_service_account_key" "upload_key" {
84 | for_each = local.public_keys_data
85 | service_account_id = local.service_account.email
86 | public_key_data = each.value
87 | }
Check: CKV2_GCP_3: "Ensure that there are only GCP-managed service account keys for each service account"
FAILED for resource: module.branch-gke-dev-sa.google_service_account_key.upload_key
File: /modules/iam-service-account/main.tf:83-87
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-that-there-are-only-gcp-managed-service-account-keys-for-each-service-account.html
83 | resource "google_service_account_key" "upload_key" {
84 | for_each = local.public_keys_data
85 | service_account_id = local.service_account.email
86 | public_key_data = each.value
87 | }
Check: CKV2_GCP_3: "Ensure that there are only GCP-managed service account keys for each service account"
FAILED for resource: module.branch-gke-prod-sa.google_service_account_key.upload_key
File: /modules/iam-service-account/main.tf:83-87
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-that-there-are-only-gcp-managed-service-account-keys-for-each-service-account.html
83 | resource "google_service_account_key" "upload_key" {
84 | for_each = local.public_keys_data
85 | service_account_id = local.service_account.email
86 | public_key_data = each.value
87 | }
Check: CKV2_GCP_3: "Ensure that there are only GCP-managed service account keys for each service account"
FAILED for resource: module.branch-network-sa.google_service_account_key.upload_key
File: /modules/iam-service-account/main.tf:83-87
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-that-there-are-only-gcp-managed-service-account-keys-for-each-service-account.html
83 | resource "google_service_account_key" "upload_key" {
84 | for_each = local.public_keys_data
85 | service_account_id = local.service_account.email
86 | public_key_data = each.value
87 | }
Check: CKV2_GCP_3: "Ensure that there are only GCP-managed service account keys for each service account"
FAILED for resource: module.branch-pf-dev-sa.google_service_account_key.upload_key
File: /modules/iam-service-account/main.tf:83-87
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-that-there-are-only-gcp-managed-service-account-keys-for-each-service-account.html
83 | resource "google_service_account_key" "upload_key" {
84 | for_each = local.public_keys_data
85 | service_account_id = local.service_account.email
86 | public_key_data = each.value
87 | }
Check: CKV2_GCP_3: "Ensure that there are only GCP-managed service account keys for each service account"
FAILED for resource: module.branch-pf-prod-sa.google_service_account_key.upload_key
File: /modules/iam-service-account/main.tf:83-87
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-that-there-are-only-gcp-managed-service-account-keys-for-each-service-account.html
83 | resource "google_service_account_key" "upload_key" {
84 | for_each = local.public_keys_data
85 | service_account_id = local.service_account.email
86 | public_key_data = each.value
87 | }
Check: CKV2_GCP_3: "Ensure that there are only GCP-managed service account keys for each service account"
FAILED for resource: module.branch-security-sa.google_service_account_key.upload_key
File: /modules/iam-service-account/main.tf:83-87
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-that-there-are-only-gcp-managed-service-account-keys-for-each-service-account.html
83 | resource "google_service_account_key" "upload_key" {
84 | for_each = local.public_keys_data
85 | service_account_id = local.service_account.email
86 | public_key_data = each.value
87 | }
Check: CKV2_GCP_3: "Ensure that there are only GCP-managed service account keys for each service account"
FAILED for resource: module.branch-teams-sa.google_service_account_key.upload_key
File: /modules/iam-service-account/main.tf:83-87
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-that-there-are-only-gcp-managed-service-account-keys-for-each-service-account.html
83 | resource "google_service_account_key" "upload_key" {
84 | for_each = local.public_keys_data
85 | service_account_id = local.service_account.email
86 | public_key_data = each.value
87 | }
Check: CKV2_GCP_3: "Ensure that there are only GCP-managed service account keys for each service account"
FAILED for resource: module.branch-teams-team-sa.google_service_account_key.upload_key
File: /modules/iam-service-account/main.tf:83-87
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-that-there-are-only-gcp-managed-service-account-keys-for-each-service-account.html
83 | resource "google_service_account_key" "upload_key" {
84 | for_each = local.public_keys_data
85 | service_account_id = local.service_account.email
86 | public_key_data = each.value
87 | }
Check: CKV2_GCP_3: "Ensure that there are only GCP-managed service account keys for each service account"
FAILED for resource: module.branch-dp-dev-sa-cicd.google_service_account_key.upload_key
File: /modules/iam-service-account/main.tf:83-87
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-that-there-are-only-gcp-managed-service-account-keys-for-each-service-account.html
83 | resource "google_service_account_key" "upload_key" {
84 | for_each = local.public_keys_data
85 | service_account_id = local.service_account.email
86 | public_key_data = each.value
87 | }
Check: CKV2_GCP_3: "Ensure that there are only GCP-managed service account keys for each service account"
FAILED for resource: module.branch-dp-prod-sa-cicd.google_service_account_key.upload_key
File: /modules/iam-service-account/main.tf:83-87
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-that-there-are-only-gcp-managed-service-account-keys-for-each-service-account.html
83 | resource "google_service_account_key" "upload_key" {
84 | for_each = local.public_keys_data
85 | service_account_id = local.service_account.email
86 | public_key_data = each.value
87 | }
Check: CKV2_GCP_3: "Ensure that there are only GCP-managed service account keys for each service account"
FAILED for resource: module.branch-gke-dev-sa-cicd.google_service_account_key.upload_key
File: /modules/iam-service-account/main.tf:83-87
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-that-there-are-only-gcp-managed-service-account-keys-for-each-service-account.html
83 | resource "google_service_account_key" "upload_key" {
84 | for_each = local.public_keys_data
85 | service_account_id = local.service_account.email
86 | public_key_data = each.value
87 | }
Check: CKV2_GCP_3: "Ensure that there are only GCP-managed service account keys for each service account"
FAILED for resource: module.branch-gke-prod-sa-cicd.google_service_account_key.upload_key
File: /modules/iam-service-account/main.tf:83-87
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-that-there-are-only-gcp-managed-service-account-keys-for-each-service-account.html
83 | resource "google_service_account_key" "upload_key" {
84 | for_each = local.public_keys_data
85 | service_account_id = local.service_account.email
86 | public_key_data = each.value
87 | }
Check: CKV2_GCP_3: "Ensure that there are only GCP-managed service account keys for each service account"
FAILED for resource: module.branch-network-sa-cicd.google_service_account_key.upload_key
File: /modules/iam-service-account/main.tf:83-87
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-that-there-are-only-gcp-managed-service-account-keys-for-each-service-account.html
83 | resource "google_service_account_key" "upload_key" {
84 | for_each = local.public_keys_data
85 | service_account_id = local.service_account.email
86 | public_key_data = each.value
87 | }
Check: CKV2_GCP_3: "Ensure that there are only GCP-managed service account keys for each service account"
FAILED for resource: module.branch-pf-dev-sa-cicd.google_service_account_key.upload_key
File: /modules/iam-service-account/main.tf:83-87
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-that-there-are-only-gcp-managed-service-account-keys-for-each-service-account.html
83 | resource "google_service_account_key" "upload_key" {
84 | for_each = local.public_keys_data
85 | service_account_id = local.service_account.email
86 | public_key_data = each.value
87 | }
Check: CKV2_GCP_3: "Ensure that there are only GCP-managed service account keys for each service account"
FAILED for resource: module.branch-pf-prod-sa-cicd.google_service_account_key.upload_key
File: /modules/iam-service-account/main.tf:83-87
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-that-there-are-only-gcp-managed-service-account-keys-for-each-service-account.html
83 | resource "google_service_account_key" "upload_key" {
84 | for_each = local.public_keys_data
85 | service_account_id = local.service_account.email
86 | public_key_data = each.value
87 | }
Check: CKV2_GCP_3: "Ensure that there are only GCP-managed service account keys for each service account"
FAILED for resource: module.branch-security-sa-cicd.google_service_account_key.upload_key
File: /modules/iam-service-account/main.tf:83-87
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-that-there-are-only-gcp-managed-service-account-keys-for-each-service-account.html
83 | resource "google_service_account_key" "upload_key" {
84 | for_each = local.public_keys_data
85 | service_account_id = local.service_account.email
86 | public_key_data = each.value
87 | }
Check: CKV2_GCP_3: "Ensure that there are only GCP-managed service account keys for each service account"
FAILED for resource: module.automation-tf-bootstrap-sa.google_service_account_key.upload_key
File: /modules/iam-service-account/main.tf:83-87
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-that-there-are-only-gcp-managed-service-account-keys-for-each-service-account.html
83 | resource "google_service_account_key" "upload_key" {
84 | for_each = local.public_keys_data
85 | service_account_id = local.service_account.email
86 | public_key_data = each.value
87 | }
Check: CKV2_GCP_3: "Ensure that there are only GCP-managed service account keys for each service account"
FAILED for resource: module.automation-tf-cicd-sa.google_service_account_key.upload_key
File: /modules/iam-service-account/main.tf:83-87
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-that-there-are-only-gcp-managed-service-account-keys-for-each-service-account.html
83 | resource "google_service_account_key" "upload_key" {
84 | for_each = local.public_keys_data
85 | service_account_id = local.service_account.email
86 | public_key_data = each.value
87 | }
Check: CKV2_GCP_3: "Ensure that there are only GCP-managed service account keys for each service account"
FAILED for resource: module.branch-sandbox-sa.google_service_account_key.upload_key
File: /modules/iam-service-account/main.tf:83-87
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-that-there-are-only-gcp-managed-service-account-keys-for-each-service-account.html
83 | resource "google_service_account_key" "upload_key" {
84 | for_each = local.public_keys_data
85 | service_account_id = local.service_account.email
86 | public_key_data = each.value
87 | }
Check: CKV2_GCP_3: "Ensure that there are only GCP-managed service account keys for each service account"
FAILED for resource: module.tenant-core-sa.google_service_account_key.upload_key
File: /modules/iam-service-account/main.tf:83-87
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-that-there-are-only-gcp-managed-service-account-keys-for-each-service-account.html
83 | resource "google_service_account_key" "upload_key" {
84 | for_each = local.public_keys_data
85 | service_account_id = local.service_account.email
86 | public_key_data = each.value
87 | }
Check: CKV2_GCP_3: "Ensure that there are only GCP-managed service account keys for each service account"
FAILED for resource: module.tenant-self-iac-sa.google_service_account_key.upload_key
File: /modules/iam-service-account/main.tf:83-87
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-that-there-are-only-gcp-managed-service-account-keys-for-each-service-account.html
83 | resource "google_service_account_key" "upload_key" {
84 | for_each = local.public_keys_data
85 | service_account_id = local.service_account.email
86 | public_key_data = each.value
87 | }
Check: CKV2_GCP_3: "Ensure that there are only GCP-managed service account keys for each service account"
FAILED for resource: module.branch-teams-team-sa-cicd.google_service_account_key.upload_key
File: /modules/iam-service-account/main.tf:83-87
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-that-there-are-only-gcp-managed-service-account-keys-for-each-service-account.html
83 | resource "google_service_account_key" "upload_key" {
84 | for_each = local.public_keys_data
85 | service_account_id = local.service_account.email
86 | public_key_data = each.value
87 | }
Check: CKV2_GCP_3: "Ensure that there are only GCP-managed service account keys for each service account"
FAILED for resource: module.integration-sa["prisma-security"].google_service_account_key.upload_key
File: /modules/iam-service-account/main.tf:83-87
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-that-there-are-only-gcp-managed-service-account-keys-for-each-service-account.html
83 | resource "google_service_account_key" "upload_key" {
84 | for_each = local.public_keys_data
85 | service_account_id = local.service_account.email
86 | public_key_data = each.value
87 | }
Check: CKV2_GCP_10: "Ensure GCP Cloud Function HTTP trigger is secured"
FAILED for resource: module.function_export.google_cloudfunctions_function.function
File: /modules/cloud-function-v1/main.tf:53-120
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-cloud-function-http-trigger-is-secured.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV2_GCP_10: "Ensure GCP Cloud Function HTTP trigger is secured"
FAILED for resource: module.function_gcs2bq.google_cloudfunctions_function.function
File: /modules/cloud-function-v1/main.tf:53-120
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-cloud-function-http-trigger-is-secured.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV2_GCP_10: "Ensure GCP Cloud Function HTTP trigger is secured"
FAILED for resource: module.cf.google_cloudfunctions_function.function
File: /modules/cloud-function-v1/main.tf:53-120
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-cloud-function-http-trigger-is-secured.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV2_GCP_10: "Ensure GCP Cloud Function HTTP trigger is secured"
FAILED for resource: module.cloud-function.google_cloudfunctions_function.function
File: /modules/cloud-function-v1/main.tf:53-120
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-cloud-function-http-trigger-is-secured.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV2_GCP_10: "Ensure GCP Cloud Function HTTP trigger is secured"
FAILED for resource: module.cffile.google_cloudfunctions_function.function
File: /modules/cloud-function-v1/main.tf:53-120
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-cloud-function-http-trigger-is-secured.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV2_GCP_10: "Ensure GCP Cloud Function HTTP trigger is secured"
FAILED for resource: module.cf-healthchecker.google_cloudfunctions_function.function
File: /modules/cloud-function-v1/main.tf:53-120
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-cloud-function-http-trigger-is-secured.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV2_GCP_10: "Ensure GCP Cloud Function HTTP trigger is secured"
FAILED for resource: module.cf-restarter.google_cloudfunctions_function.function
File: /modules/cloud-function-v1/main.tf:53-120
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-cloud-function-http-trigger-is-secured.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV2_GCP_10: "Ensure GCP Cloud Function HTTP trigger is secured"
FAILED for resource: module.function-hello.google_cloudfunctions_function.function
File: /modules/cloud-function-v1/main.tf:53-120
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-cloud-function-http-trigger-is-secured.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV2_GCP_18: "Ensure GCP network defines a firewall and does not use the default firewall"
FAILED for resource: google_compute_network.psc_ilb_network
File: /blueprints/networking/psc-glb-and-armor/producer.tf:147-151
147 | resource "google_compute_network" "psc_ilb_network" {
148 | name = "psc-ilb-network"
149 | auto_create_subnetworks = false
150 | project = module.producer_project.project_id
151 | }
Check: CKV2_GCP_18: "Ensure GCP network defines a firewall and does not use the default firewall"
FAILED for resource: google_compute_network.default
File: /modules/__experimental/alloydb-instance/main.tf:144-146
144 | resource "google_compute_network" "default" {
145 | name = var.network_name
146 | }
Check: CKV2_GCP_18: "Ensure GCP network defines a firewall and does not use the default firewall"
FAILED for resource: module.vpc.google_compute_network.network
File: /modules/net-vpc/main.tf:36-48
36 | resource "google_compute_network" "network" {
37 | count = var.vpc_create ? 1 : 0
38 | project = var.project_id
39 | name = var.name
40 | description = var.description
41 | auto_create_subnetworks = var.auto_create_subnetworks
42 | delete_default_routes_on_create = var.delete_default_routes_on_create
43 | mtu = var.mtu
44 | routing_mode = var.routing_mode
45 | network_firewall_policy_enforcement_order = var.firewall_policy_enforcement_order
46 | enable_ula_internal_ipv6 = var.ipv6_config.enable_ula_internal
47 | internal_ipv6_range = var.ipv6_config.internal_range
48 | }
Check: CKV2_GCP_18: "Ensure GCP network defines a firewall and does not use the default firewall"
FAILED for resource: module.vpc.google_compute_network.network[0]
File: /modules/net-vpc/main.tf:36-48
36 | resource "google_compute_network" "network" {
37 | count = var.vpc_create ? 1 : 0
38 | project = var.project_id
39 | name = var.name
40 | description = var.description
41 | auto_create_subnetworks = var.auto_create_subnetworks
42 | delete_default_routes_on_create = var.delete_default_routes_on_create
43 | mtu = var.mtu
44 | routing_mode = var.routing_mode
45 | network_firewall_policy_enforcement_order = var.firewall_policy_enforcement_order
46 | enable_ula_internal_ipv6 = var.ipv6_config.enable_ula_internal
47 | internal_ipv6_range = var.ipv6_config.internal_range
48 | }
Check: CKV2_GCP_18: "Ensure GCP network defines a firewall and does not use the default firewall"
FAILED for resource: module.apigee_vpc.google_compute_network.network[0]
File: /modules/net-vpc/main.tf:36-48
36 | resource "google_compute_network" "network" {
37 | count = var.vpc_create ? 1 : 0
38 | project = var.project_id
39 | name = var.name
40 | description = var.description
41 | auto_create_subnetworks = var.auto_create_subnetworks
42 | delete_default_routes_on_create = var.delete_default_routes_on_create
43 | mtu = var.mtu
44 | routing_mode = var.routing_mode
45 | network_firewall_policy_enforcement_order = var.firewall_policy_enforcement_order
46 | enable_ula_internal_ipv6 = var.ipv6_config.enable_ula_internal
47 | internal_ipv6_range = var.ipv6_config.internal_range
48 | }
Check: CKV2_GCP_18: "Ensure GCP network defines a firewall and does not use the default firewall"
FAILED for resource: module.onprem_vpc.google_compute_network.network[0]
File: /modules/net-vpc/main.tf:36-48
36 | resource "google_compute_network" "network" {
37 | count = var.vpc_create ? 1 : 0
38 | project = var.project_id
39 | name = var.name
40 | description = var.description
41 | auto_create_subnetworks = var.auto_create_subnetworks
42 | delete_default_routes_on_create = var.delete_default_routes_on_create
43 | mtu = var.mtu
44 | routing_mode = var.routing_mode
45 | network_firewall_policy_enforcement_order = var.firewall_policy_enforcement_order
46 | enable_ula_internal_ipv6 = var.ipv6_config.enable_ula_internal
47 | internal_ipv6_range = var.ipv6_config.internal_range
48 | }
Check: CKV2_GCP_18: "Ensure GCP network defines a firewall and does not use the default firewall"
FAILED for resource: module.cloud-dns.module.vpc.google_compute_network.network[0]
File: /modules/net-vpc/main.tf:36-48
36 | resource "google_compute_network" "network" {
37 | count = var.vpc_create ? 1 : 0
38 | project = var.project_id
39 | name = var.name
40 | description = var.description
41 | auto_create_subnetworks = var.auto_create_subnetworks
42 | delete_default_routes_on_create = var.delete_default_routes_on_create
43 | mtu = var.mtu
44 | routing_mode = var.routing_mode
45 | network_firewall_policy_enforcement_order = var.firewall_policy_enforcement_order
46 | enable_ula_internal_ipv6 = var.ipv6_config.enable_ula_internal
47 | internal_ipv6_range = var.ipv6_config.internal_range
48 | }
Check: CKV2_GCP_18: "Ensure GCP network defines a firewall and does not use the default firewall"
FAILED for resource: module.landing-vpc.google_compute_network.network[0]
File: /modules/net-vpc/main.tf:36-48
36 | resource "google_compute_network" "network" {
37 | count = var.vpc_create ? 1 : 0
38 | project = var.project_id
39 | name = var.name
40 | description = var.description
41 | auto_create_subnetworks = var.auto_create_subnetworks
42 | delete_default_routes_on_create = var.delete_default_routes_on_create
43 | mtu = var.mtu
44 | routing_mode = var.routing_mode
45 | network_firewall_policy_enforcement_order = var.firewall_policy_enforcement_order
46 | enable_ula_internal_ipv6 = var.ipv6_config.enable_ula_internal
47 | internal_ipv6_range = var.ipv6_config.internal_range
48 | }
Check: CKV2_GCP_18: "Ensure GCP network defines a firewall and does not use the default firewall"
FAILED for resource: module.vpc[0].google_compute_network.network[0]
File: /modules/net-vpc/main.tf:36-48
36 | resource "google_compute_network" "network" {
37 | count = var.vpc_create ? 1 : 0
38 | project = var.project_id
39 | name = var.name
40 | description = var.description
41 | auto_create_subnetworks = var.auto_create_subnetworks
42 | delete_default_routes_on_create = var.delete_default_routes_on_create
43 | mtu = var.mtu
44 | routing_mode = var.routing_mode
45 | network_firewall_policy_enforcement_order = var.firewall_policy_enforcement_order
46 | enable_ula_internal_ipv6 = var.ipv6_config.enable_ula_internal
47 | internal_ipv6_range = var.ipv6_config.internal_range
48 | }
Check: CKV2_GCP_18: "Ensure GCP network defines a firewall and does not use the default firewall"
FAILED for resource: module.data-platform.module.load-vpc.google_compute_network.network[0]
File: /modules/net-vpc/main.tf:36-48
36 | resource "google_compute_network" "network" {
37 | count = var.vpc_create ? 1 : 0
38 | project = var.project_id
39 | name = var.name
40 | description = var.description
41 | auto_create_subnetworks = var.auto_create_subnetworks
42 | delete_default_routes_on_create = var.delete_default_routes_on_create
43 | mtu = var.mtu
44 | routing_mode = var.routing_mode
45 | network_firewall_policy_enforcement_order = var.firewall_policy_enforcement_order
46 | enable_ula_internal_ipv6 = var.ipv6_config.enable_ula_internal
47 | internal_ipv6_range = var.ipv6_config.internal_range
48 | }
Check: CKV2_GCP_18: "Ensure GCP network defines a firewall and does not use the default firewall"
FAILED for resource: module.data-platform.module.orch-vpc.google_compute_network.network[0]
File: /modules/net-vpc/main.tf:36-48
36 | resource "google_compute_network" "network" {
37 | count = var.vpc_create ? 1 : 0
38 | project = var.project_id
39 | name = var.name
40 | description = var.description
41 | auto_create_subnetworks = var.auto_create_subnetworks
42 | delete_default_routes_on_create = var.delete_default_routes_on_create
43 | mtu = var.mtu
44 | routing_mode = var.routing_mode
45 | network_firewall_policy_enforcement_order = var.firewall_policy_enforcement_order
46 | enable_ula_internal_ipv6 = var.ipv6_config.enable_ula_internal
47 | internal_ipv6_range = var.ipv6_config.internal_range
48 | }
Check: CKV2_GCP_18: "Ensure GCP network defines a firewall and does not use the default firewall"
FAILED for resource: module.data-platform.module.transf-vpc.google_compute_network.network[0]
File: /modules/net-vpc/main.tf:36-48
36 | resource "google_compute_network" "network" {
37 | count = var.vpc_create ? 1 : 0
38 | project = var.project_id
39 | name = var.name
40 | description = var.description
41 | auto_create_subnetworks = var.auto_create_subnetworks
42 | delete_default_routes_on_create = var.delete_default_routes_on_create
43 | mtu = var.mtu
44 | routing_mode = var.routing_mode
45 | network_firewall_policy_enforcement_order = var.firewall_policy_enforcement_order
46 | enable_ula_internal_ipv6 = var.ipv6_config.enable_ula_internal
47 | internal_ipv6_range = var.ipv6_config.internal_range
48 | }
Check: CKV2_GCP_18: "Ensure GCP network defines a firewall and does not use the default firewall"
FAILED for resource: module.processing-vpc.google_compute_network.network[0]
File: /modules/net-vpc/main.tf:36-48
36 | resource "google_compute_network" "network" {
37 | count = var.vpc_create ? 1 : 0
38 | project = var.project_id
39 | name = var.name
40 | description = var.description
41 | auto_create_subnetworks = var.auto_create_subnetworks
42 | delete_default_routes_on_create = var.delete_default_routes_on_create
43 | mtu = var.mtu
44 | routing_mode = var.routing_mode
45 | network_firewall_policy_enforcement_order = var.firewall_policy_enforcement_order
46 | enable_ula_internal_ipv6 = var.ipv6_config.enable_ula_internal
47 | internal_ipv6_range = var.ipv6_config.internal_range
48 | }
Check: CKV2_GCP_18: "Ensure GCP network defines a firewall and does not use the default firewall"
FAILED for resource: module.vpc-local[0].google_compute_network.network[0]
File: /modules/net-vpc/main.tf:36-48
36 | resource "google_compute_network" "network" {
37 | count = var.vpc_create ? 1 : 0
38 | project = var.project_id
39 | name = var.name
40 | description = var.description
41 | auto_create_subnetworks = var.auto_create_subnetworks
42 | delete_default_routes_on_create = var.delete_default_routes_on_create
43 | mtu = var.mtu
44 | routing_mode = var.routing_mode
45 | network_firewall_policy_enforcement_order = var.firewall_policy_enforcement_order
46 | enable_ula_internal_ipv6 = var.ipv6_config.enable_ula_internal
47 | internal_ipv6_range = var.ipv6_config.internal_range
48 | }
Check: CKV2_GCP_18: "Ensure GCP network defines a firewall and does not use the default firewall"
FAILED for resource: module.svpc.google_compute_network.network[0]
File: /modules/net-vpc/main.tf:36-48
36 | resource "google_compute_network" "network" {
37 | count = var.vpc_create ? 1 : 0
38 | project = var.project_id
39 | name = var.name
40 | description = var.description
41 | auto_create_subnetworks = var.auto_create_subnetworks
42 | delete_default_routes_on_create = var.delete_default_routes_on_create
43 | mtu = var.mtu
44 | routing_mode = var.routing_mode
45 | network_firewall_policy_enforcement_order = var.firewall_policy_enforcement_order
46 | enable_ula_internal_ipv6 = var.ipv6_config.enable_ula_internal
47 | internal_ipv6_range = var.ipv6_config.internal_range
48 | }
Check: CKV2_GCP_18: "Ensure GCP network defines a firewall and does not use the default firewall"
FAILED for resource: module.vpc-dev.google_compute_network.network[0]
File: /modules/net-vpc/main.tf:36-48
36 | resource "google_compute_network" "network" {
37 | count = var.vpc_create ? 1 : 0
38 | project = var.project_id
39 | name = var.name
40 | description = var.description
41 | auto_create_subnetworks = var.auto_create_subnetworks
42 | delete_default_routes_on_create = var.delete_default_routes_on_create
43 | mtu = var.mtu
44 | routing_mode = var.routing_mode
45 | network_firewall_policy_enforcement_order = var.firewall_policy_enforcement_order
46 | enable_ula_internal_ipv6 = var.ipv6_config.enable_ula_internal
47 | internal_ipv6_range = var.ipv6_config.internal_range
48 | }
Check: CKV2_GCP_18: "Ensure GCP network defines a firewall and does not use the default firewall"
FAILED for resource: module.vpc-prod.google_compute_network.network[0]
File: /modules/net-vpc/main.tf:36-48
36 | resource "google_compute_network" "network" {
37 | count = var.vpc_create ? 1 : 0
38 | project = var.project_id
39 | name = var.name
40 | description = var.description
41 | auto_create_subnetworks = var.auto_create_subnetworks
42 | delete_default_routes_on_create = var.delete_default_routes_on_create
43 | mtu = var.mtu
44 | routing_mode = var.routing_mode
45 | network_firewall_policy_enforcement_order = var.firewall_policy_enforcement_order
46 | enable_ula_internal_ipv6 = var.ipv6_config.enable_ula_internal
47 | internal_ipv6_range = var.ipv6_config.internal_range
48 | }
Check: CKV2_GCP_18: "Ensure GCP network defines a firewall and does not use the default firewall"
FAILED for resource: module.vpc-consumer.google_compute_network.network[0]
File: /modules/net-vpc/main.tf:36-48
36 | resource "google_compute_network" "network" {
37 | count = var.vpc_create ? 1 : 0
38 | project = var.project_id
39 | name = var.name
40 | description = var.description
41 | auto_create_subnetworks = var.auto_create_subnetworks
42 | delete_default_routes_on_create = var.delete_default_routes_on_create
43 | mtu = var.mtu
44 | routing_mode = var.routing_mode
45 | network_firewall_policy_enforcement_order = var.firewall_policy_enforcement_order
46 | enable_ula_internal_ipv6 = var.ipv6_config.enable_ula_internal
47 | internal_ipv6_range = var.ipv6_config.internal_range
48 | }
Check: CKV2_GCP_18: "Ensure GCP network defines a firewall and does not use the default firewall"
FAILED for resource: module.vpc_landing_trusted.google_compute_network.network[0]
File: /modules/net-vpc/main.tf:36-48
36 | resource "google_compute_network" "network" {
37 | count = var.vpc_create ? 1 : 0
38 | project = var.project_id
39 | name = var.name
40 | description = var.description
41 | auto_create_subnetworks = var.auto_create_subnetworks
42 | delete_default_routes_on_create = var.delete_default_routes_on_create
43 | mtu = var.mtu
44 | routing_mode = var.routing_mode
45 | network_firewall_policy_enforcement_order = var.firewall_policy_enforcement_order
46 | enable_ula_internal_ipv6 = var.ipv6_config.enable_ula_internal
47 | internal_ipv6_range = var.ipv6_config.internal_range
48 | }
Check: CKV2_GCP_18: "Ensure GCP network defines a firewall and does not use the default firewall"
FAILED for resource: module.vpc_landing_untrusted.google_compute_network.network[0]
File: /modules/net-vpc/main.tf:36-48
36 | resource "google_compute_network" "network" {
37 | count = var.vpc_create ? 1 : 0
38 | project = var.project_id
39 | name = var.name
40 | description = var.description
41 | auto_create_subnetworks = var.auto_create_subnetworks
42 | delete_default_routes_on_create = var.delete_default_routes_on_create
43 | mtu = var.mtu
44 | routing_mode = var.routing_mode
45 | network_firewall_policy_enforcement_order = var.firewall_policy_enforcement_order
46 | enable_ula_internal_ipv6 = var.ipv6_config.enable_ula_internal
47 | internal_ipv6_range = var.ipv6_config.internal_range
48 | }
Check: CKV2_GCP_18: "Ensure GCP network defines a firewall and does not use the default firewall"
FAILED for resource: module.vpc_spoke_01.google_compute_network.network[0]
File: /modules/net-vpc/main.tf:36-48
36 | resource "google_compute_network" "network" {
37 | count = var.vpc_create ? 1 : 0
38 | project = var.project_id
39 | name = var.name
40 | description = var.description
41 | auto_create_subnetworks = var.auto_create_subnetworks
42 | delete_default_routes_on_create = var.delete_default_routes_on_create
43 | mtu = var.mtu
44 | routing_mode = var.routing_mode
45 | network_firewall_policy_enforcement_order = var.firewall_policy_enforcement_order
46 | enable_ula_internal_ipv6 = var.ipv6_config.enable_ula_internal
47 | internal_ipv6_range = var.ipv6_config.internal_range
48 | }
Check: CKV2_GCP_18: "Ensure GCP network defines a firewall and does not use the default firewall"
FAILED for resource: module.vpc-hub.google_compute_network.network[0]
File: /modules/net-vpc/main.tf:36-48
36 | resource "google_compute_network" "network" {
37 | count = var.vpc_create ? 1 : 0
38 | project = var.project_id
39 | name = var.name
40 | description = var.description
41 | auto_create_subnetworks = var.auto_create_subnetworks
42 | delete_default_routes_on_create = var.delete_default_routes_on_create
43 | mtu = var.mtu
44 | routing_mode = var.routing_mode
45 | network_firewall_policy_enforcement_order = var.firewall_policy_enforcement_order
46 | enable_ula_internal_ipv6 = var.ipv6_config.enable_ula_internal
47 | internal_ipv6_range = var.ipv6_config.internal_range
48 | }
Check: CKV2_GCP_18: "Ensure GCP network defines a firewall and does not use the default firewall"
FAILED for resource: module.vpc-spoke-1.google_compute_network.network[0]
File: /modules/net-vpc/main.tf:36-48
36 | resource "google_compute_network" "network" {
37 | count = var.vpc_create ? 1 : 0
38 | project = var.project_id
39 | name = var.name
40 | description = var.description
41 | auto_create_subnetworks = var.auto_create_subnetworks
42 | delete_default_routes_on_create = var.delete_default_routes_on_create
43 | mtu = var.mtu
44 | routing_mode = var.routing_mode
45 | network_firewall_policy_enforcement_order = var.firewall_policy_enforcement_order
46 | enable_ula_internal_ipv6 = var.ipv6_config.enable_ula_internal
47 | internal_ipv6_range = var.ipv6_config.internal_range
48 | }
Check: CKV2_GCP_18: "Ensure GCP network defines a firewall and does not use the default firewall"
FAILED for resource: module.vpc-spoke-2.google_compute_network.network[0]
File: /modules/net-vpc/main.tf:36-48
36 | resource "google_compute_network" "network" {
37 | count = var.vpc_create ? 1 : 0
38 | project = var.project_id
39 | name = var.name
40 | description = var.description
41 | auto_create_subnetworks = var.auto_create_subnetworks
42 | delete_default_routes_on_create = var.delete_default_routes_on_create
43 | mtu = var.mtu
44 | routing_mode = var.routing_mode
45 | network_firewall_policy_enforcement_order = var.firewall_policy_enforcement_order
46 | enable_ula_internal_ipv6 = var.ipv6_config.enable_ula_internal
47 | internal_ipv6_range = var.ipv6_config.internal_range
48 | }
Check: CKV2_GCP_18: "Ensure GCP network defines a firewall and does not use the default firewall"
FAILED for resource: module.dev-vpc.google_compute_network.network[0]
File: /modules/net-vpc/main.tf:36-48
36 | resource "google_compute_network" "network" {
37 | count = var.vpc_create ? 1 : 0
38 | project = var.project_id
39 | name = var.name
40 | description = var.description
41 | auto_create_subnetworks = var.auto_create_subnetworks
42 | delete_default_routes_on_create = var.delete_default_routes_on_create
43 | mtu = var.mtu
44 | routing_mode = var.routing_mode
45 | network_firewall_policy_enforcement_order = var.firewall_policy_enforcement_order
46 | enable_ula_internal_ipv6 = var.ipv6_config.enable_ula_internal
47 | internal_ipv6_range = var.ipv6_config.internal_range
48 | }
Check: CKV2_GCP_18: "Ensure GCP network defines a firewall and does not use the default firewall"
FAILED for resource: module.prod-vpc.google_compute_network.network[0]
File: /modules/net-vpc/main.tf:36-48
36 | resource "google_compute_network" "network" {
37 | count = var.vpc_create ? 1 : 0
38 | project = var.project_id
39 | name = var.name
40 | description = var.description
41 | auto_create_subnetworks = var.auto_create_subnetworks
42 | delete_default_routes_on_create = var.delete_default_routes_on_create
43 | mtu = var.mtu
44 | routing_mode = var.routing_mode
45 | network_firewall_policy_enforcement_order = var.firewall_policy_enforcement_order
46 | enable_ula_internal_ipv6 = var.ipv6_config.enable_ula_internal
47 | internal_ipv6_range = var.ipv6_config.internal_range
48 | }
Check: CKV2_GCP_18: "Ensure GCP network defines a firewall and does not use the default firewall"
FAILED for resource: module.vpc-left.google_compute_network.network[0]
File: /modules/net-vpc/main.tf:36-48
36 | resource "google_compute_network" "network" {
37 | count = var.vpc_create ? 1 : 0
38 | project = var.project_id
39 | name = var.name
40 | description = var.description
41 | auto_create_subnetworks = var.auto_create_subnetworks
42 | delete_default_routes_on_create = var.delete_default_routes_on_create
43 | mtu = var.mtu
44 | routing_mode = var.routing_mode
45 | network_firewall_policy_enforcement_order = var.firewall_policy_enforcement_order
46 | enable_ula_internal_ipv6 = var.ipv6_config.enable_ula_internal
47 | internal_ipv6_range = var.ipv6_config.internal_range
48 | }
Check: CKV2_GCP_18: "Ensure GCP network defines a firewall and does not use the default firewall"
FAILED for resource: module.vpc-right.google_compute_network.network[0]
File: /modules/net-vpc/main.tf:36-48
36 | resource "google_compute_network" "network" {
37 | count = var.vpc_create ? 1 : 0
38 | project = var.project_id
39 | name = var.name
40 | description = var.description
41 | auto_create_subnetworks = var.auto_create_subnetworks
42 | delete_default_routes_on_create = var.delete_default_routes_on_create
43 | mtu = var.mtu
44 | routing_mode = var.routing_mode
45 | network_firewall_policy_enforcement_order = var.firewall_policy_enforcement_order
46 | enable_ula_internal_ipv6 = var.ipv6_config.enable_ula_internal
47 | internal_ipv6_range = var.ipv6_config.internal_range
48 | }
Check: CKV2_GCP_18: "Ensure GCP network defines a firewall and does not use the default firewall"
FAILED for resource: module.vpc-onprem.google_compute_network.network[0]
File: /modules/net-vpc/main.tf:36-48
36 | resource "google_compute_network" "network" {
37 | count = var.vpc_create ? 1 : 0
38 | project = var.project_id
39 | name = var.name
40 | description = var.description
41 | auto_create_subnetworks = var.auto_create_subnetworks
42 | delete_default_routes_on_create = var.delete_default_routes_on_create
43 | mtu = var.mtu
44 | routing_mode = var.routing_mode
45 | network_firewall_policy_enforcement_order = var.firewall_policy_enforcement_order
46 | enable_ula_internal_ipv6 = var.ipv6_config.enable_ula_internal
47 | internal_ipv6_range = var.ipv6_config.internal_range
48 | }
Check: CKV2_GCP_18: "Ensure GCP network defines a firewall and does not use the default firewall"
FAILED for resource: module.vpc_consumer.google_compute_network.network[0]
File: /modules/net-vpc/main.tf:36-48
36 | resource "google_compute_network" "network" {
37 | count = var.vpc_create ? 1 : 0
38 | project = var.project_id
39 | name = var.name
40 | description = var.description
41 | auto_create_subnetworks = var.auto_create_subnetworks
42 | delete_default_routes_on_create = var.delete_default_routes_on_create
43 | mtu = var.mtu
44 | routing_mode = var.routing_mode
45 | network_firewall_policy_enforcement_order = var.firewall_policy_enforcement_order
46 | enable_ula_internal_ipv6 = var.ipv6_config.enable_ula_internal
47 | internal_ipv6_range = var.ipv6_config.internal_range
48 | }
Check: CKV2_GCP_18: "Ensure GCP network defines a firewall and does not use the default firewall"
FAILED for resource: module.vpc_producer.google_compute_network.network[0]
File: /modules/net-vpc/main.tf:36-48
36 | resource "google_compute_network" "network" {
37 | count = var.vpc_create ? 1 : 0
38 | project = var.project_id
39 | name = var.name
40 | description = var.description
41 | auto_create_subnetworks = var.auto_create_subnetworks
42 | delete_default_routes_on_create = var.delete_default_routes_on_create
43 | mtu = var.mtu
44 | routing_mode = var.routing_mode
45 | network_firewall_policy_enforcement_order = var.firewall_policy_enforcement_order
46 | enable_ula_internal_ipv6 = var.ipv6_config.enable_ula_internal
47 | internal_ipv6_range = var.ipv6_config.internal_range
48 | }
Check: CKV2_GCP_18: "Ensure GCP network defines a firewall and does not use the default firewall"
FAILED for resource: module.vpc-shared.google_compute_network.network[0]
File: /modules/net-vpc/main.tf:36-48
36 | resource "google_compute_network" "network" {
37 | count = var.vpc_create ? 1 : 0
38 | project = var.project_id
39 | name = var.name
40 | description = var.description
41 | auto_create_subnetworks = var.auto_create_subnetworks
42 | delete_default_routes_on_create = var.delete_default_routes_on_create
43 | mtu = var.mtu
44 | routing_mode = var.routing_mode
45 | network_firewall_policy_enforcement_order = var.firewall_policy_enforcement_order
46 | enable_ula_internal_ipv6 = var.ipv6_config.enable_ula_internal
47 | internal_ipv6_range = var.ipv6_config.internal_range
48 | }
Check: CKV2_GCP_18: "Ensure GCP network defines a firewall and does not use the default firewall"
FAILED for resource: module.vpc_main.google_compute_network.network[0]
File: /modules/net-vpc/main.tf:36-48
36 | resource "google_compute_network" "network" {
37 | count = var.vpc_create ? 1 : 0
38 | project = var.project_id
39 | name = var.name
40 | description = var.description
41 | auto_create_subnetworks = var.auto_create_subnetworks
42 | delete_default_routes_on_create = var.delete_default_routes_on_create
43 | mtu = var.mtu
44 | routing_mode = var.routing_mode
45 | network_firewall_policy_enforcement_order = var.firewall_policy_enforcement_order
46 | enable_ula_internal_ipv6 = var.ipv6_config.enable_ula_internal
47 | internal_ipv6_range = var.ipv6_config.internal_range
48 | }
Check: CKV2_GCP_18: "Ensure GCP network defines a firewall and does not use the default firewall"
FAILED for resource: module.vpc_onprem.google_compute_network.network[0]
File: /modules/net-vpc/main.tf:36-48
36 | resource "google_compute_network" "network" {
37 | count = var.vpc_create ? 1 : 0
38 | project = var.project_id
39 | name = var.name
40 | description = var.description
41 | auto_create_subnetworks = var.auto_create_subnetworks
42 | delete_default_routes_on_create = var.delete_default_routes_on_create
43 | mtu = var.mtu
44 | routing_mode = var.routing_mode
45 | network_firewall_policy_enforcement_order = var.firewall_policy_enforcement_order
46 | enable_ula_internal_ipv6 = var.ipv6_config.enable_ula_internal
47 | internal_ipv6_range = var.ipv6_config.internal_range
48 | }
Check: CKV2_GCP_18: "Ensure GCP network defines a firewall and does not use the default firewall"
FAILED for resource: module.vpc_prj1.google_compute_network.network[0]
File: /modules/net-vpc/main.tf:36-48
36 | resource "google_compute_network" "network" {
37 | count = var.vpc_create ? 1 : 0
38 | project = var.project_id
39 | name = var.name
40 | description = var.description
41 | auto_create_subnetworks = var.auto_create_subnetworks
42 | delete_default_routes_on_create = var.delete_default_routes_on_create
43 | mtu = var.mtu
44 | routing_mode = var.routing_mode
45 | network_firewall_policy_enforcement_order = var.firewall_policy_enforcement_order
46 | enable_ula_internal_ipv6 = var.ipv6_config.enable_ula_internal
47 | internal_ipv6_range = var.ipv6_config.internal_range
48 | }
Check: CKV2_GCP_18: "Ensure GCP network defines a firewall and does not use the default firewall"
FAILED for resource: module.dev-spoke-vpc-serverless.google_compute_network.network
File: /modules/net-vpc/main.tf:36-48
36 | resource "google_compute_network" "network" {
37 | count = var.vpc_create ? 1 : 0
38 | project = var.project_id
39 | name = var.name
40 | description = var.description
41 | auto_create_subnetworks = var.auto_create_subnetworks
42 | delete_default_routes_on_create = var.delete_default_routes_on_create
43 | mtu = var.mtu
44 | routing_mode = var.routing_mode
45 | network_firewall_policy_enforcement_order = var.firewall_policy_enforcement_order
46 | enable_ula_internal_ipv6 = var.ipv6_config.enable_ula_internal
47 | internal_ipv6_range = var.ipv6_config.internal_range
48 | }
Check: CKV2_GCP_18: "Ensure GCP network defines a firewall and does not use the default firewall"
FAILED for resource: module.prod-spoke-vpc-serverless.google_compute_network.network
File: /modules/net-vpc/main.tf:36-48
36 | resource "google_compute_network" "network" {
37 | count = var.vpc_create ? 1 : 0
38 | project = var.project_id
39 | name = var.name
40 | description = var.description
41 | auto_create_subnetworks = var.auto_create_subnetworks
42 | delete_default_routes_on_create = var.delete_default_routes_on_create
43 | mtu = var.mtu
44 | routing_mode = var.routing_mode
45 | network_firewall_policy_enforcement_order = var.firewall_policy_enforcement_order
46 | enable_ula_internal_ipv6 = var.ipv6_config.enable_ula_internal
47 | internal_ipv6_range = var.ipv6_config.internal_range
48 | }
Check: CKV2_GCP_18: "Ensure GCP network defines a firewall and does not use the default firewall"
FAILED for resource: module.dev-spoke-vpc.google_compute_network.network[0]
File: /modules/net-vpc/main.tf:36-48
36 | resource "google_compute_network" "network" {
37 | count = var.vpc_create ? 1 : 0
38 | project = var.project_id
39 | name = var.name
40 | description = var.description
41 | auto_create_subnetworks = var.auto_create_subnetworks
42 | delete_default_routes_on_create = var.delete_default_routes_on_create
43 | mtu = var.mtu
44 | routing_mode = var.routing_mode
45 | network_firewall_policy_enforcement_order = var.firewall_policy_enforcement_order
46 | enable_ula_internal_ipv6 = var.ipv6_config.enable_ula_internal
47 | internal_ipv6_range = var.ipv6_config.internal_range
48 | }
Check: CKV2_GCP_18: "Ensure GCP network defines a firewall and does not use the default firewall"
FAILED for resource: module.prod-spoke-vpc.google_compute_network.network[0]
File: /modules/net-vpc/main.tf:36-48
36 | resource "google_compute_network" "network" {
37 | count = var.vpc_create ? 1 : 0
38 | project = var.project_id
39 | name = var.name
40 | description = var.description
41 | auto_create_subnetworks = var.auto_create_subnetworks
42 | delete_default_routes_on_create = var.delete_default_routes_on_create
43 | mtu = var.mtu
44 | routing_mode = var.routing_mode
45 | network_firewall_policy_enforcement_order = var.firewall_policy_enforcement_order
46 | enable_ula_internal_ipv6 = var.ipv6_config.enable_ula_internal
47 | internal_ipv6_range = var.ipv6_config.internal_range
48 | }
Check: CKV2_GCP_18: "Ensure GCP network defines a firewall and does not use the default firewall"
FAILED for resource: module.landing-trusted-vpc.google_compute_network.network[0]
File: /modules/net-vpc/main.tf:36-48
36 | resource "google_compute_network" "network" {
37 | count = var.vpc_create ? 1 : 0
38 | project = var.project_id
39 | name = var.name
40 | description = var.description
41 | auto_create_subnetworks = var.auto_create_subnetworks
42 | delete_default_routes_on_create = var.delete_default_routes_on_create
43 | mtu = var.mtu
44 | routing_mode = var.routing_mode
45 | network_firewall_policy_enforcement_order = var.firewall_policy_enforcement_order
46 | enable_ula_internal_ipv6 = var.ipv6_config.enable_ula_internal
47 | internal_ipv6_range = var.ipv6_config.internal_range
48 | }
Check: CKV2_GCP_18: "Ensure GCP network defines a firewall and does not use the default firewall"
FAILED for resource: module.landing-untrusted-vpc.google_compute_network.network[0]
File: /modules/net-vpc/main.tf:36-48
36 | resource "google_compute_network" "network" {
37 | count = var.vpc_create ? 1 : 0
38 | project = var.project_id
39 | name = var.name
40 | description = var.description
41 | auto_create_subnetworks = var.auto_create_subnetworks
42 | delete_default_routes_on_create = var.delete_default_routes_on_create
43 | mtu = var.mtu
44 | routing_mode = var.routing_mode
45 | network_firewall_policy_enforcement_order = var.firewall_policy_enforcement_order
46 | enable_ula_internal_ipv6 = var.ipv6_config.enable_ula_internal
47 | internal_ipv6_range = var.ipv6_config.internal_range
48 | }
Check: CKV2_AZURE_31: "Ensure VNET subnet is configured with a Network Security Group (NSG)"
FAILED for resource: azurerm_subnet.subnet
File: /blueprints/cloud-operations/workload-identity-federation/azure.tf:60-66
60 | resource "azurerm_subnet" "subnet" {
61 | count = var.vm_test ? 1 : 0
62 | name = "subnet"
63 | resource_group_name = azurerm_resource_group.resource_group[0].name
64 | virtual_network_name = azurerm_virtual_network.vnet[0].name
65 | address_prefixes = ["10.0.1.0/24"]
66 | }
Check: CKV2_GCP_5: "Ensure that Cloud Audit Logging is configured properly across all services and all users from a project"
FAILED for resource: module.project.google_project.project
File: /modules/project/main.tf:44-54
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/ensure-that-cloud-audit-logging-is-configured-properly-across-all-services-and-all-users-from-a-project.html
44 | resource "google_project" "project" {
45 | count = var.project_create ? 1 : 0
46 | org_id = local.parent_type == "organizations" ? local.parent_id : null
47 | folder_id = local.parent_type == "folders" ? local.parent_id : null
48 | project_id = "${local.prefix}${var.name}"
49 | name = local.descriptive_name
50 | billing_account = var.billing_account
51 | auto_create_network = var.auto_create_network
52 | labels = var.labels
53 | skip_delete = var.skip_delete
54 | }
Check: CKV2_GCP_5: "Ensure that Cloud Audit Logging is configured properly across all services and all users from a project"
FAILED for resource: module.project.google_project.project[0]
File: /modules/project/main.tf:44-54
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/ensure-that-cloud-audit-logging-is-configured-properly-across-all-services-and-all-users-from-a-project.html
44 | resource "google_project" "project" {
45 | count = var.project_create ? 1 : 0
46 | org_id = local.parent_type == "organizations" ? local.parent_id : null
47 | folder_id = local.parent_type == "folders" ? local.parent_id : null
48 | project_id = "${local.prefix}${var.name}"
49 | name = local.descriptive_name
50 | billing_account = var.billing_account
51 | auto_create_network = var.auto_create_network
52 | labels = var.labels
53 | skip_delete = var.skip_delete
54 | }
Check: CKV2_GCP_5: "Ensure that Cloud Audit Logging is configured properly across all services and all users from a project"
FAILED for resource: module.apigee_project.google_project.project[0]
File: /modules/project/main.tf:44-54
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/ensure-that-cloud-audit-logging-is-configured-properly-across-all-services-and-all-users-from-a-project.html
44 | resource "google_project" "project" {
45 | count = var.project_create ? 1 : 0
46 | org_id = local.parent_type == "organizations" ? local.parent_id : null
47 | folder_id = local.parent_type == "folders" ? local.parent_id : null
48 | project_id = "${local.prefix}${var.name}"
49 | name = local.descriptive_name
50 | billing_account = var.billing_account
51 | auto_create_network = var.auto_create_network
52 | labels = var.labels
53 | skip_delete = var.skip_delete
54 | }
Check: CKV2_GCP_5: "Ensure that Cloud Audit Logging is configured properly across all services and all users from a project"
FAILED for resource: module.onprem_project.google_project.project[0]
File: /modules/project/main.tf:44-54
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/ensure-that-cloud-audit-logging-is-configured-properly-across-all-services-and-all-users-from-a-project.html
44 | resource "google_project" "project" {
45 | count = var.project_create ? 1 : 0
46 | org_id = local.parent_type == "organizations" ? local.parent_id : null
47 | folder_id = local.parent_type == "folders" ? local.parent_id : null
48 | project_id = "${local.prefix}${var.name}"
49 | name = local.descriptive_name
50 | billing_account = var.billing_account
51 | auto_create_network = var.auto_create_network
52 | labels = var.labels
53 | skip_delete = var.skip_delete
54 | }
Check: CKV2_GCP_5: "Ensure that Cloud Audit Logging is configured properly across all services and all users from a project"
FAILED for resource: module.cloud-dns.module.project["appteam2"].google_project.project[0]
File: /modules/project/main.tf:44-54
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/ensure-that-cloud-audit-logging-is-configured-properly-across-all-services-and-all-users-from-a-project.html
44 | resource "google_project" "project" {
45 | count = var.project_create ? 1 : 0
46 | org_id = local.parent_type == "organizations" ? local.parent_id : null
47 | folder_id = local.parent_type == "folders" ? local.parent_id : null
48 | project_id = "${local.prefix}${var.name}"
49 | name = local.descriptive_name
50 | billing_account = var.billing_account
51 | auto_create_network = var.auto_create_network
52 | labels = var.labels
53 | skip_delete = var.skip_delete
54 | }
Check: CKV2_GCP_5: "Ensure that Cloud Audit Logging is configured properly across all services and all users from a project"
FAILED for resource: module.host-project.google_project.project[0]
File: /modules/project/main.tf:44-54
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/ensure-that-cloud-audit-logging-is-configured-properly-across-all-services-and-all-users-from-a-project.html
44 | resource "google_project" "project" {
45 | count = var.project_create ? 1 : 0
46 | org_id = local.parent_type == "organizations" ? local.parent_id : null
47 | folder_id = local.parent_type == "folders" ? local.parent_id : null
48 | project_id = "${local.prefix}${var.name}"
49 | name = local.descriptive_name
50 | billing_account = var.billing_account
51 | auto_create_network = var.auto_create_network
52 | labels = var.labels
53 | skip_delete = var.skip_delete
54 | }
Check: CKV2_GCP_5: "Ensure that Cloud Audit Logging is configured properly across all services and all users from a project"
FAILED for resource: module.target-projects.google_project.project
File: /modules/project/main.tf:44-54
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/ensure-that-cloud-audit-logging-is-configured-properly-across-all-services-and-all-users-from-a-project.html
44 | resource "google_project" "project" {
45 | count = var.project_create ? 1 : 0
46 | org_id = local.parent_type == "organizations" ? local.parent_id : null
47 | folder_id = local.parent_type == "folders" ? local.parent_id : null
48 | project_id = "${local.prefix}${var.name}"
49 | name = local.descriptive_name
50 | billing_account = var.billing_account
51 | auto_create_network = var.auto_create_network
52 | labels = var.labels
53 | skip_delete = var.skip_delete
54 | }
Check: CKV2_GCP_5: "Ensure that Cloud Audit Logging is configured properly across all services and all users from a project"
FAILED for resource: module.sharedvpc_host_project.google_project.project
File: /modules/project/main.tf:44-54
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/ensure-that-cloud-audit-logging-is-configured-properly-across-all-services-and-all-users-from-a-project.html
44 | resource "google_project" "project" {
45 | count = var.project_create ? 1 : 0
46 | org_id = local.parent_type == "organizations" ? local.parent_id : null
47 | folder_id = local.parent_type == "folders" ? local.parent_id : null
48 | project_id = "${local.prefix}${var.name}"
49 | name = local.descriptive_name
50 | billing_account = var.billing_account
51 | auto_create_network = var.auto_create_network
52 | labels = var.labels
53 | skip_delete = var.skip_delete
54 | }
Check: CKV2_GCP_5: "Ensure that Cloud Audit Logging is configured properly across all services and all users from a project"
FAILED for resource: module.landing-project.google_project.project[0]
File: /modules/project/main.tf:44-54
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/ensure-that-cloud-audit-logging-is-configured-properly-across-all-services-and-all-users-from-a-project.html
44 | resource "google_project" "project" {
45 | count = var.project_create ? 1 : 0
46 | org_id = local.parent_type == "organizations" ? local.parent_id : null
47 | folder_id = local.parent_type == "folders" ? local.parent_id : null
48 | project_id = "${local.prefix}${var.name}"
49 | name = local.descriptive_name
50 | billing_account = var.billing_account
51 | auto_create_network = var.auto_create_network
52 | labels = var.labels
53 | skip_delete = var.skip_delete
54 | }
Check: CKV2_GCP_5: "Ensure that Cloud Audit Logging is configured properly across all services and all users from a project"
FAILED for resource: module.prj.google_project.project
File: /modules/project/main.tf:44-54
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/ensure-that-cloud-audit-logging-is-configured-properly-across-all-services-and-all-users-from-a-project.html
44 | resource "google_project" "project" {
45 | count = var.project_create ? 1 : 0
46 | org_id = local.parent_type == "organizations" ? local.parent_id : null
47 | folder_id = local.parent_type == "folders" ? local.parent_id : null
48 | project_id = "${local.prefix}${var.name}"
49 | name = local.descriptive_name
50 | billing_account = var.billing_account
51 | auto_create_network = var.auto_create_network
52 | labels = var.labels
53 | skip_delete = var.skip_delete
54 | }
Check: CKV2_GCP_5: "Ensure that Cloud Audit Logging is configured properly across all services and all users from a project"
FAILED for resource: module.project-kms.google_project.project[0]
File: /modules/project/main.tf:44-54
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/ensure-that-cloud-audit-logging-is-configured-properly-across-all-services-and-all-users-from-a-project.html
44 | resource "google_project" "project" {
45 | count = var.project_create ? 1 : 0
46 | org_id = local.parent_type == "organizations" ? local.parent_id : null
47 | folder_id = local.parent_type == "folders" ? local.parent_id : null
48 | project_id = "${local.prefix}${var.name}"
49 | name = local.descriptive_name
50 | billing_account = var.billing_account
51 | auto_create_network = var.auto_create_network
52 | labels = var.labels
53 | skip_delete = var.skip_delete
54 | }
Check: CKV2_GCP_5: "Ensure that Cloud Audit Logging is configured properly across all services and all users from a project"
FAILED for resource: module.project-service.google_project.project[0]
File: /modules/project/main.tf:44-54
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/ensure-that-cloud-audit-logging-is-configured-properly-across-all-services-and-all-users-from-a-project.html
44 | resource "google_project" "project" {
45 | count = var.project_create ? 1 : 0
46 | org_id = local.parent_type == "organizations" ? local.parent_id : null
47 | folder_id = local.parent_type == "folders" ? local.parent_id : null
48 | project_id = "${local.prefix}${var.name}"
49 | name = local.descriptive_name
50 | billing_account = var.billing_account
51 | auto_create_network = var.auto_create_network
52 | labels = var.labels
53 | skip_delete = var.skip_delete
54 | }
Check: CKV2_GCP_5: "Ensure that Cloud Audit Logging is configured properly across all services and all users from a project"
FAILED for resource: module.data-platform.module.drop-project.google_project.project
File: /modules/project/main.tf:44-54
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/ensure-that-cloud-audit-logging-is-configured-properly-across-all-services-and-all-users-from-a-project.html
44 | resource "google_project" "project" {
45 | count = var.project_create ? 1 : 0
46 | org_id = local.parent_type == "organizations" ? local.parent_id : null
47 | folder_id = local.parent_type == "folders" ? local.parent_id : null
48 | project_id = "${local.prefix}${var.name}"
49 | name = local.descriptive_name
50 | billing_account = var.billing_account
51 | auto_create_network = var.auto_create_network
52 | labels = var.labels
53 | skip_delete = var.skip_delete
54 | }
Check: CKV2_GCP_5: "Ensure that Cloud Audit Logging is configured properly across all services and all users from a project"
FAILED for resource: module.data-platform.module.load-project.google_project.project
File: /modules/project/main.tf:44-54
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/ensure-that-cloud-audit-logging-is-configured-properly-across-all-services-and-all-users-from-a-project.html
44 | resource "google_project" "project" {
45 | count = var.project_create ? 1 : 0
46 | org_id = local.parent_type == "organizations" ? local.parent_id : null
47 | folder_id = local.parent_type == "folders" ? local.parent_id : null
48 | project_id = "${local.prefix}${var.name}"
49 | name = local.descriptive_name
50 | billing_account = var.billing_account
51 | auto_create_network = var.auto_create_network
52 | labels = var.labels
53 | skip_delete = var.skip_delete
54 | }
Check: CKV2_GCP_5: "Ensure that Cloud Audit Logging is configured properly across all services and all users from a project"
FAILED for resource: module.data-platform.module.orch-project.google_project.project
File: /modules/project/main.tf:44-54
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/ensure-that-cloud-audit-logging-is-configured-properly-across-all-services-and-all-users-from-a-project.html
44 | resource "google_project" "project" {
45 | count = var.project_create ? 1 : 0
46 | org_id = local.parent_type == "organizations" ? local.parent_id : null
47 | folder_id = local.parent_type == "folders" ? local.parent_id : null
48 | project_id = "${local.prefix}${var.name}"
49 | name = local.descriptive_name
50 | billing_account = var.billing_account
51 | auto_create_network = var.auto_create_network
52 | labels = var.labels
53 | skip_delete = var.skip_delete
54 | }
Check: CKV2_GCP_5: "Ensure that Cloud Audit Logging is configured properly across all services and all users from a project"
FAILED for resource: module.data-platform.module.transf-project.google_project.project
File: /modules/project/main.tf:44-54
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/ensure-that-cloud-audit-logging-is-configured-properly-across-all-services-and-all-users-from-a-project.html
44 | resource "google_project" "project" {
45 | count = var.project_create ? 1 : 0
46 | org_id = local.parent_type == "organizations" ? local.parent_id : null
47 | folder_id = local.parent_type == "folders" ? local.parent_id : null
48 | project_id = "${local.prefix}${var.name}"
49 | name = local.descriptive_name
50 | billing_account = var.billing_account
51 | auto_create_network = var.auto_create_network
52 | labels = var.labels
53 | skip_delete = var.skip_delete
54 | }
Check: CKV2_GCP_5: "Ensure that Cloud Audit Logging is configured properly across all services and all users from a project"
FAILED for resource: module.data-platform.module.dwh-conf-project.google_project.project
File: /modules/project/main.tf:44-54
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/ensure-that-cloud-audit-logging-is-configured-properly-across-all-services-and-all-users-from-a-project.html
44 | resource "google_project" "project" {
45 | count = var.project_create ? 1 : 0
46 | org_id = local.parent_type == "organizations" ? local.parent_id : null
47 | folder_id = local.parent_type == "folders" ? local.parent_id : null
48 | project_id = "${local.prefix}${var.name}"
49 | name = local.descriptive_name
50 | billing_account = var.billing_account
51 | auto_create_network = var.auto_create_network
52 | labels = var.labels
53 | skip_delete = var.skip_delete
54 | }
Check: CKV2_GCP_5: "Ensure that Cloud Audit Logging is configured properly across all services and all users from a project"
FAILED for resource: module.data-platform.module.dwh-cur-project.google_project.project
File: /modules/project/main.tf:44-54
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/ensure-that-cloud-audit-logging-is-configured-properly-across-all-services-and-all-users-from-a-project.html
44 | resource "google_project" "project" {
45 | count = var.project_create ? 1 : 0
46 | org_id = local.parent_type == "organizations" ? local.parent_id : null
47 | folder_id = local.parent_type == "folders" ? local.parent_id : null
48 | project_id = "${local.prefix}${var.name}"
49 | name = local.descriptive_name
50 | billing_account = var.billing_account
51 | auto_create_network = var.auto_create_network
52 | labels = var.labels
53 | skip_delete = var.skip_delete
54 | }
Check: CKV2_GCP_5: "Ensure that Cloud Audit Logging is configured properly across all services and all users from a project"
FAILED for resource: module.data-platform.module.dwh-lnd-project.google_project.project
File: /modules/project/main.tf:44-54
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/ensure-that-cloud-audit-logging-is-configured-properly-across-all-services-and-all-users-from-a-project.html
44 | resource "google_project" "project" {
45 | count = var.project_create ? 1 : 0
46 | org_id = local.parent_type == "organizations" ? local.parent_id : null
47 | folder_id = local.parent_type == "folders" ? local.parent_id : null
48 | project_id = "${local.prefix}${var.name}"
49 | name = local.descriptive_name
50 | billing_account = var.billing_account
51 | auto_create_network = var.auto_create_network
52 | labels = var.labels
53 | skip_delete = var.skip_delete
54 | }
Check: CKV2_GCP_5: "Ensure that Cloud Audit Logging is configured properly across all services and all users from a project"
FAILED for resource: module.data-platform.module.common-project.google_project.project
File: /modules/project/main.tf:44-54
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/ensure-that-cloud-audit-logging-is-configured-properly-across-all-services-and-all-users-from-a-project.html
44 | resource "google_project" "project" {
45 | count = var.project_create ? 1 : 0
46 | org_id = local.parent_type == "organizations" ? local.parent_id : null
47 | folder_id = local.parent_type == "folders" ? local.parent_id : null
48 | project_id = "${local.prefix}${var.name}"
49 | name = local.descriptive_name
50 | billing_account = var.billing_account
51 | auto_create_network = var.auto_create_network
52 | labels = var.labels
53 | skip_delete = var.skip_delete
54 | }
Check: CKV2_GCP_5: "Ensure that Cloud Audit Logging is configured properly across all services and all users from a project"
FAILED for resource: module.data-platform.module.exp-project.google_project.project[0]
File: /modules/project/main.tf:44-54
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/ensure-that-cloud-audit-logging-is-configured-properly-across-all-services-and-all-users-from-a-project.html
44 | resource "google_project" "project" {
45 | count = var.project_create ? 1 : 0
46 | org_id = local.parent_type == "organizations" ? local.parent_id : null
47 | folder_id = local.parent_type == "folders" ? local.parent_id : null
48 | project_id = "${local.prefix}${var.name}"
49 | name = local.descriptive_name
50 | billing_account = var.billing_account
51 | auto_create_network = var.auto_create_network
52 | labels = var.labels
53 | skip_delete = var.skip_delete
54 | }
Check: CKV2_GCP_5: "Ensure that Cloud Audit Logging is configured properly across all services and all users from a project"
FAILED for resource: module.land-project.google_project.project
File: /modules/project/main.tf:44-54
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/ensure-that-cloud-audit-logging-is-configured-properly-across-all-services-and-all-users-from-a-project.html
44 | resource "google_project" "project" {
45 | count = var.project_create ? 1 : 0
46 | org_id = local.parent_type == "organizations" ? local.parent_id : null
47 | folder_id = local.parent_type == "folders" ? local.parent_id : null
48 | project_id = "${local.prefix}${var.name}"
49 | name = local.descriptive_name
50 | billing_account = var.billing_account
51 | auto_create_network = var.auto_create_network
52 | labels = var.labels
53 | skip_delete = var.skip_delete
54 | }
Check: CKV2_GCP_5: "Ensure that Cloud Audit Logging is configured properly across all services and all users from a project"
FAILED for resource: module.processing-project.google_project.project
File: /modules/project/main.tf:44-54
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/ensure-that-cloud-audit-logging-is-configured-properly-across-all-services-and-all-users-from-a-project.html
44 | resource "google_project" "project" {
45 | count = var.project_create ? 1 : 0
46 | org_id = local.parent_type == "organizations" ? local.parent_id : null
47 | folder_id = local.parent_type == "folders" ? local.parent_id : null
48 | project_id = "${local.prefix}${var.name}"
49 | name = local.descriptive_name
50 | billing_account = var.billing_account
51 | auto_create_network = var.auto_create_network
52 | labels = var.labels
53 | skip_delete = var.skip_delete
54 | }
Check: CKV2_GCP_5: "Ensure that Cloud Audit Logging is configured properly across all services and all users from a project"
FAILED for resource: module.cur-project.google_project.project
File: /modules/project/main.tf:44-54
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/ensure-that-cloud-audit-logging-is-configured-properly-across-all-services-and-all-users-from-a-project.html
44 | resource "google_project" "project" {
45 | count = var.project_create ? 1 : 0
46 | org_id = local.parent_type == "organizations" ? local.parent_id : null
47 | folder_id = local.parent_type == "folders" ? local.parent_id : null
48 | project_id = "${local.prefix}${var.name}"
49 | name = local.descriptive_name
50 | billing_account = var.billing_account
51 | auto_create_network = var.auto_create_network
52 | labels = var.labels
53 | skip_delete = var.skip_delete
54 | }
Check: CKV2_GCP_5: "Ensure that Cloud Audit Logging is configured properly across all services and all users from a project"
FAILED for resource: module.common-project.google_project.project
File: /modules/project/main.tf:44-54
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/ensure-that-cloud-audit-logging-is-configured-properly-across-all-services-and-all-users-from-a-project.html
44 | resource "google_project" "project" {
45 | count = var.project_create ? 1 : 0
46 | org_id = local.parent_type == "organizations" ? local.parent_id : null
47 | folder_id = local.parent_type == "folders" ? local.parent_id : null
48 | project_id = "${local.prefix}${var.name}"
49 | name = local.descriptive_name
50 | billing_account = var.billing_account
51 | auto_create_network = var.auto_create_network
52 | labels = var.labels
53 | skip_delete = var.skip_delete
54 | }
Check: CKV2_GCP_5: "Ensure that Cloud Audit Logging is configured properly across all services and all users from a project"
FAILED for resource: module.sec-project.google_project.project[0]
File: /modules/project/main.tf:44-54
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/ensure-that-cloud-audit-logging-is-configured-properly-across-all-services-and-all-users-from-a-project.html
44 | resource "google_project" "project" {
45 | count = var.project_create ? 1 : 0
46 | org_id = local.parent_type == "organizations" ? local.parent_id : null
47 | folder_id = local.parent_type == "folders" ? local.parent_id : null
48 | project_id = "${local.prefix}${var.name}"
49 | name = local.descriptive_name
50 | billing_account = var.billing_account
51 | auto_create_network = var.auto_create_network
52 | labels = var.labels
53 | skip_delete = var.skip_delete
54 | }
Check: CKV2_GCP_5: "Ensure that Cloud Audit Logging is configured properly across all services and all users from a project"
FAILED for resource: module.log-export-project[0].google_project.project[0]
File: /modules/project/main.tf:44-54
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/ensure-that-cloud-audit-logging-is-configured-properly-across-all-services-and-all-users-from-a-project.html
44 | resource "google_project" "project" {
45 | count = var.project_create ? 1 : 0
46 | org_id = local.parent_type == "organizations" ? local.parent_id : null
47 | folder_id = local.parent_type == "folders" ? local.parent_id : null
48 | project_id = "${local.prefix}${var.name}"
49 | name = local.descriptive_name
50 | billing_account = var.billing_account
51 | auto_create_network = var.auto_create_network
52 | labels = var.labels
53 | skip_delete = var.skip_delete
54 | }
Check: CKV2_GCP_5: "Ensure that Cloud Audit Logging is configured properly across all services and all users from a project"
FAILED for resource: module.projects.module.projects.google_project.project[0]
File: /modules/project/main.tf:44-54
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/ensure-that-cloud-audit-logging-is-configured-properly-across-all-services-and-all-users-from-a-project.html
44 | resource "google_project" "project" {
45 | count = var.project_create ? 1 : 0
46 | org_id = local.parent_type == "organizations" ? local.parent_id : null
47 | folder_id = local.parent_type == "folders" ? local.parent_id : null
48 | project_id = "${local.prefix}${var.name}"
49 | name = local.descriptive_name
50 | billing_account = var.billing_account
51 | auto_create_network = var.auto_create_network
52 | labels = var.labels
53 | skip_delete = var.skip_delete
54 | }
Check: CKV2_GCP_5: "Ensure that Cloud Audit Logging is configured properly across all services and all users from a project"
FAILED for resource: module.fleet_project.google_project.project[0]
File: /modules/project/main.tf:44-54
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/ensure-that-cloud-audit-logging-is-configured-properly-across-all-services-and-all-users-from-a-project.html
44 | resource "google_project" "project" {
45 | count = var.project_create ? 1 : 0
46 | org_id = local.parent_type == "organizations" ? local.parent_id : null
47 | folder_id = local.parent_type == "folders" ? local.parent_id : null
48 | project_id = "${local.prefix}${var.name}"
49 | name = local.descriptive_name
50 | billing_account = var.billing_account
51 | auto_create_network = var.auto_create_network
52 | labels = var.labels
53 | skip_delete = var.skip_delete
54 | }
Check: CKV2_GCP_5: "Ensure that Cloud Audit Logging is configured properly across all services and all users from a project"
FAILED for resource: module.host_project.google_project.project[0]
File: /modules/project/main.tf:44-54
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/ensure-that-cloud-audit-logging-is-configured-properly-across-all-services-and-all-users-from-a-project.html
44 | resource "google_project" "project" {
45 | count = var.project_create ? 1 : 0
46 | org_id = local.parent_type == "organizations" ? local.parent_id : null
47 | folder_id = local.parent_type == "folders" ? local.parent_id : null
48 | project_id = "${local.prefix}${var.name}"
49 | name = local.descriptive_name
50 | billing_account = var.billing_account
51 | auto_create_network = var.auto_create_network
52 | labels = var.labels
53 | skip_delete = var.skip_delete
54 | }
Check: CKV2_GCP_5: "Ensure that Cloud Audit Logging is configured properly across all services and all users from a project"
FAILED for resource: module.mgmt_project.google_project.project[0]
File: /modules/project/main.tf:44-54
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/ensure-that-cloud-audit-logging-is-configured-properly-across-all-services-and-all-users-from-a-project.html
44 | resource "google_project" "project" {
45 | count = var.project_create ? 1 : 0
46 | org_id = local.parent_type == "organizations" ? local.parent_id : null
47 | folder_id = local.parent_type == "folders" ? local.parent_id : null
48 | project_id = "${local.prefix}${var.name}"
49 | name = local.descriptive_name
50 | billing_account = var.billing_account
51 | auto_create_network = var.auto_create_network
52 | labels = var.labels
53 | skip_delete = var.skip_delete
54 | }
Check: CKV2_GCP_5: "Ensure that Cloud Audit Logging is configured properly across all services and all users from a project"
FAILED for resource: module.gke-multitenant.module.gke-project-0.google_project.project[0]
File: /modules/project/main.tf:44-54
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/ensure-that-cloud-audit-logging-is-configured-properly-across-all-services-and-all-users-from-a-project.html
44 | resource "google_project" "project" {
45 | count = var.project_create ? 1 : 0
46 | org_id = local.parent_type == "organizations" ? local.parent_id : null
47 | folder_id = local.parent_type == "folders" ? local.parent_id : null
48 | project_id = "${local.prefix}${var.name}"
49 | name = local.descriptive_name
50 | billing_account = var.billing_account
51 | auto_create_network = var.auto_create_network
52 | labels = var.labels
53 | skip_delete = var.skip_delete
54 | }
Check: CKV2_GCP_5: "Ensure that Cloud Audit Logging is configured properly across all services and all users from a project"
FAILED for resource: module.project-host-dev.google_project.project[0]
File: /modules/project/main.tf:44-54
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/ensure-that-cloud-audit-logging-is-configured-properly-across-all-services-and-all-users-from-a-project.html
44 | resource "google_project" "project" {
45 | count = var.project_create ? 1 : 0
46 | org_id = local.parent_type == "organizations" ? local.parent_id : null
47 | folder_id = local.parent_type == "folders" ? local.parent_id : null
48 | project_id = "${local.prefix}${var.name}"
49 | name = local.descriptive_name
50 | billing_account = var.billing_account
51 | auto_create_network = var.auto_create_network
52 | labels = var.labels
53 | skip_delete = var.skip_delete
54 | }
Check: CKV2_GCP_5: "Ensure that Cloud Audit Logging is configured properly across all services and all users from a project"
FAILED for resource: module.project-host-prod.google_project.project[0]
File: /modules/project/main.tf:44-54
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/ensure-that-cloud-audit-logging-is-configured-properly-across-all-services-and-all-users-from-a-project.html
44 | resource "google_project" "project" {
45 | count = var.project_create ? 1 : 0
46 | org_id = local.parent_type == "organizations" ? local.parent_id : null
47 | folder_id = local.parent_type == "folders" ? local.parent_id : null
48 | project_id = "${local.prefix}${var.name}"
49 | name = local.descriptive_name
50 | billing_account = var.billing_account
51 | auto_create_network = var.auto_create_network
52 | labels = var.labels
53 | skip_delete = var.skip_delete
54 | }
Check: CKV2_GCP_5: "Ensure that Cloud Audit Logging is configured properly across all services and all users from a project"
FAILED for resource: module.project-app.google_project.project[0]
File: /modules/project/main.tf:44-54
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/ensure-that-cloud-audit-logging-is-configured-properly-across-all-services-and-all-users-from-a-project.html
44 | resource "google_project" "project" {
45 | count = var.project_create ? 1 : 0
46 | org_id = local.parent_type == "organizations" ? local.parent_id : null
47 | folder_id = local.parent_type == "folders" ? local.parent_id : null
48 | project_id = "${local.prefix}${var.name}"
49 | name = local.descriptive_name
50 | billing_account = var.billing_account
51 | auto_create_network = var.auto_create_network
52 | labels = var.labels
53 | skip_delete = var.skip_delete
54 | }
Check: CKV2_GCP_5: "Ensure that Cloud Audit Logging is configured properly across all services and all users from a project"
FAILED for resource: module.project-host.google_project.project[0]
File: /modules/project/main.tf:44-54
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/ensure-that-cloud-audit-logging-is-configured-properly-across-all-services-and-all-users-from-a-project.html
44 | resource "google_project" "project" {
45 | count = var.project_create ? 1 : 0
46 | org_id = local.parent_type == "organizations" ? local.parent_id : null
47 | folder_id = local.parent_type == "folders" ? local.parent_id : null
48 | project_id = "${local.prefix}${var.name}"
49 | name = local.descriptive_name
50 | billing_account = var.billing_account
51 | auto_create_network = var.auto_create_network
52 | labels = var.labels
53 | skip_delete = var.skip_delete
54 | }
Check: CKV2_GCP_5: "Ensure that Cloud Audit Logging is configured properly across all services and all users from a project"
FAILED for resource: module.project_landing.google_project.project[0]
File: /modules/project/main.tf:44-54
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/ensure-that-cloud-audit-logging-is-configured-properly-across-all-services-and-all-users-from-a-project.html
44 | resource "google_project" "project" {
45 | count = var.project_create ? 1 : 0
46 | org_id = local.parent_type == "organizations" ? local.parent_id : null
47 | folder_id = local.parent_type == "folders" ? local.parent_id : null
48 | project_id = "${local.prefix}${var.name}"
49 | name = local.descriptive_name
50 | billing_account = var.billing_account
51 | auto_create_network = var.auto_create_network
52 | labels = var.labels
53 | skip_delete = var.skip_delete
54 | }
Check: CKV2_GCP_5: "Ensure that Cloud Audit Logging is configured properly across all services and all users from a project"
FAILED for resource: module.project_spoke_01.google_project.project[0]
File: /modules/project/main.tf:44-54
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/ensure-that-cloud-audit-logging-is-configured-properly-across-all-services-and-all-users-from-a-project.html
44 | resource "google_project" "project" {
45 | count = var.project_create ? 1 : 0
46 | org_id = local.parent_type == "organizations" ? local.parent_id : null
47 | folder_id = local.parent_type == "folders" ? local.parent_id : null
48 | project_id = "${local.prefix}${var.name}"
49 | name = local.descriptive_name
50 | billing_account = var.billing_account
51 | auto_create_network = var.auto_create_network
52 | labels = var.labels
53 | skip_delete = var.skip_delete
54 | }
Check: CKV2_GCP_5: "Ensure that Cloud Audit Logging is configured properly across all services and all users from a project"
FAILED for resource: module.consumer_project.google_project.project
File: /modules/project/main.tf:44-54
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/ensure-that-cloud-audit-logging-is-configured-properly-across-all-services-and-all-users-from-a-project.html
44 | resource "google_project" "project" {
45 | count = var.project_create ? 1 : 0
46 | org_id = local.parent_type == "organizations" ? local.parent_id : null
47 | folder_id = local.parent_type == "folders" ? local.parent_id : null
48 | project_id = "${local.prefix}${var.name}"
49 | name = local.descriptive_name
50 | billing_account = var.billing_account
51 | auto_create_network = var.auto_create_network
52 | labels = var.labels
53 | skip_delete = var.skip_delete
54 | }
Check: CKV2_GCP_5: "Ensure that Cloud Audit Logging is configured properly across all services and all users from a project"
FAILED for resource: module.producer_project.google_project.project
File: /modules/project/main.tf:44-54
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/ensure-that-cloud-audit-logging-is-configured-properly-across-all-services-and-all-users-from-a-project.html
44 | resource "google_project" "project" {
45 | count = var.project_create ? 1 : 0
46 | org_id = local.parent_type == "organizations" ? local.parent_id : null
47 | folder_id = local.parent_type == "folders" ? local.parent_id : null
48 | project_id = "${local.prefix}${var.name}"
49 | name = local.descriptive_name
50 | billing_account = var.billing_account
51 | auto_create_network = var.auto_create_network
52 | labels = var.labels
53 | skip_delete = var.skip_delete
54 | }
Check: CKV2_GCP_5: "Ensure that Cloud Audit Logging is configured properly across all services and all users from a project"
FAILED for resource: module.project-svc-gce.google_project.project[0]
File: /modules/project/main.tf:44-54
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/ensure-that-cloud-audit-logging-is-configured-properly-across-all-services-and-all-users-from-a-project.html
44 | resource "google_project" "project" {
45 | count = var.project_create ? 1 : 0
46 | org_id = local.parent_type == "organizations" ? local.parent_id : null
47 | folder_id = local.parent_type == "folders" ? local.parent_id : null
48 | project_id = "${local.prefix}${var.name}"
49 | name = local.descriptive_name
50 | billing_account = var.billing_account
51 | auto_create_network = var.auto_create_network
52 | labels = var.labels
53 | skip_delete = var.skip_delete
54 | }
Check: CKV2_GCP_5: "Ensure that Cloud Audit Logging is configured properly across all services and all users from a project"
FAILED for resource: module.project-svc-gke.google_project.project[0]
File: /modules/project/main.tf:44-54
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/ensure-that-cloud-audit-logging-is-configured-properly-across-all-services-and-all-users-from-a-project.html
44 | resource "google_project" "project" {
45 | count = var.project_create ? 1 : 0
46 | org_id = local.parent_type == "organizations" ? local.parent_id : null
47 | folder_id = local.parent_type == "folders" ? local.parent_id : null
48 | project_id = "${local.prefix}${var.name}"
49 | name = local.descriptive_name
50 | billing_account = var.billing_account
51 | auto_create_network = var.auto_create_network
52 | labels = var.labels
53 | skip_delete = var.skip_delete
54 | }
Check: CKV2_GCP_5: "Ensure that Cloud Audit Logging is configured properly across all services and all users from a project"
FAILED for resource: module.project_main.google_project.project[0]
File: /modules/project/main.tf:44-54
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/ensure-that-cloud-audit-logging-is-configured-properly-across-all-services-and-all-users-from-a-project.html
44 | resource "google_project" "project" {
45 | count = var.project_create ? 1 : 0
46 | org_id = local.parent_type == "organizations" ? local.parent_id : null
47 | folder_id = local.parent_type == "folders" ? local.parent_id : null
48 | project_id = "${local.prefix}${var.name}"
49 | name = local.descriptive_name
50 | billing_account = var.billing_account
51 | auto_create_network = var.auto_create_network
52 | labels = var.labels
53 | skip_delete = var.skip_delete
54 | }
Check: CKV2_GCP_5: "Ensure that Cloud Audit Logging is configured properly across all services and all users from a project"
FAILED for resource: module.project_onprem[0].google_project.project[0]
File: /modules/project/main.tf:44-54
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/ensure-that-cloud-audit-logging-is-configured-properly-across-all-services-and-all-users-from-a-project.html
44 | resource "google_project" "project" {
45 | count = var.project_create ? 1 : 0
46 | org_id = local.parent_type == "organizations" ? local.parent_id : null
47 | folder_id = local.parent_type == "folders" ? local.parent_id : null
48 | project_id = "${local.prefix}${var.name}"
49 | name = local.descriptive_name
50 | billing_account = var.billing_account
51 | auto_create_network = var.auto_create_network
52 | labels = var.labels
53 | skip_delete = var.skip_delete
54 | }
Check: CKV2_GCP_5: "Ensure that Cloud Audit Logging is configured properly across all services and all users from a project"
FAILED for resource: module.project_prj1[0].google_project.project[0]
File: /modules/project/main.tf:44-54
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/ensure-that-cloud-audit-logging-is-configured-properly-across-all-services-and-all-users-from-a-project.html
44 | resource "google_project" "project" {
45 | count = var.project_create ? 1 : 0
46 | org_id = local.parent_type == "organizations" ? local.parent_id : null
47 | folder_id = local.parent_type == "folders" ? local.parent_id : null
48 | project_id = "${local.prefix}${var.name}"
49 | name = local.descriptive_name
50 | billing_account = var.billing_account
51 | auto_create_network = var.auto_create_network
52 | labels = var.labels
53 | skip_delete = var.skip_delete
54 | }
Check: CKV2_GCP_5: "Ensure that Cloud Audit Logging is configured properly across all services and all users from a project"
FAILED for resource: module.project_svc1[0].google_project.project[0]
File: /modules/project/main.tf:44-54
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/ensure-that-cloud-audit-logging-is-configured-properly-across-all-services-and-all-users-from-a-project.html
44 | resource "google_project" "project" {
45 | count = var.project_create ? 1 : 0
46 | org_id = local.parent_type == "organizations" ? local.parent_id : null
47 | folder_id = local.parent_type == "folders" ? local.parent_id : null
48 | project_id = "${local.prefix}${var.name}"
49 | name = local.descriptive_name
50 | billing_account = var.billing_account
51 | auto_create_network = var.auto_create_network
52 | labels = var.labels
53 | skip_delete = var.skip_delete
54 | }
Check: CKV2_GCP_5: "Ensure that Cloud Audit Logging is configured properly across all services and all users from a project"
FAILED for resource: module.automation-project.google_project.project[0]
File: /modules/project/main.tf:44-54
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/ensure-that-cloud-audit-logging-is-configured-properly-across-all-services-and-all-users-from-a-project.html
44 | resource "google_project" "project" {
45 | count = var.project_create ? 1 : 0
46 | org_id = local.parent_type == "organizations" ? local.parent_id : null
47 | folder_id = local.parent_type == "folders" ? local.parent_id : null
48 | project_id = "${local.prefix}${var.name}"
49 | name = local.descriptive_name
50 | billing_account = var.billing_account
51 | auto_create_network = var.auto_create_network
52 | labels = var.labels
53 | skip_delete = var.skip_delete
54 | }
Check: CKV2_GCP_5: "Ensure that Cloud Audit Logging is configured properly across all services and all users from a project"
FAILED for resource: module.log-export-project.google_project.project[0]
File: /modules/project/main.tf:44-54
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/ensure-that-cloud-audit-logging-is-configured-properly-across-all-services-and-all-users-from-a-project.html
44 | resource "google_project" "project" {
45 | count = var.project_create ? 1 : 0
46 | org_id = local.parent_type == "organizations" ? local.parent_id : null
47 | folder_id = local.parent_type == "folders" ? local.parent_id : null
48 | project_id = "${local.prefix}${var.name}"
49 | name = local.descriptive_name
50 | billing_account = var.billing_account
51 | auto_create_network = var.auto_create_network
52 | labels = var.labels
53 | skip_delete = var.skip_delete
54 | }
Check: CKV2_GCP_5: "Ensure that Cloud Audit Logging is configured properly across all services and all users from a project"
FAILED for resource: module.billing-export-project.google_project.project[0]
File: /modules/project/main.tf:44-54
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/ensure-that-cloud-audit-logging-is-configured-properly-across-all-services-and-all-users-from-a-project.html
44 | resource "google_project" "project" {
45 | count = var.project_create ? 1 : 0
46 | org_id = local.parent_type == "organizations" ? local.parent_id : null
47 | folder_id = local.parent_type == "folders" ? local.parent_id : null
48 | project_id = "${local.prefix}${var.name}"
49 | name = local.descriptive_name
50 | billing_account = var.billing_account
51 | auto_create_network = var.auto_create_network
52 | labels = var.labels
53 | skip_delete = var.skip_delete
54 | }
Check: CKV2_GCP_5: "Ensure that Cloud Audit Logging is configured properly across all services and all users from a project"
FAILED for resource: module.tenant-self-iac-project.google_project.project[0]
File: /modules/project/main.tf:44-54
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/ensure-that-cloud-audit-logging-is-configured-properly-across-all-services-and-all-users-from-a-project.html
44 | resource "google_project" "project" {
45 | count = var.project_create ? 1 : 0
46 | org_id = local.parent_type == "organizations" ? local.parent_id : null
47 | folder_id = local.parent_type == "folders" ? local.parent_id : null
48 | project_id = "${local.prefix}${var.name}"
49 | name = local.descriptive_name
50 | billing_account = var.billing_account
51 | auto_create_network = var.auto_create_network
52 | labels = var.labels
53 | skip_delete = var.skip_delete
54 | }
Check: CKV2_GCP_5: "Ensure that Cloud Audit Logging is configured properly across all services and all users from a project"
FAILED for resource: module.dev-spoke-project.google_project.project[0]
File: /modules/project/main.tf:44-54
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/ensure-that-cloud-audit-logging-is-configured-properly-across-all-services-and-all-users-from-a-project.html
44 | resource "google_project" "project" {
45 | count = var.project_create ? 1 : 0
46 | org_id = local.parent_type == "organizations" ? local.parent_id : null
47 | folder_id = local.parent_type == "folders" ? local.parent_id : null
48 | project_id = "${local.prefix}${var.name}"
49 | name = local.descriptive_name
50 | billing_account = var.billing_account
51 | auto_create_network = var.auto_create_network
52 | labels = var.labels
53 | skip_delete = var.skip_delete
54 | }
Check: CKV2_GCP_5: "Ensure that Cloud Audit Logging is configured properly across all services and all users from a project"
FAILED for resource: module.prod-spoke-project.google_project.project[0]
File: /modules/project/main.tf:44-54
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/ensure-that-cloud-audit-logging-is-configured-properly-across-all-services-and-all-users-from-a-project.html
44 | resource "google_project" "project" {
45 | count = var.project_create ? 1 : 0
46 | org_id = local.parent_type == "organizations" ? local.parent_id : null
47 | folder_id = local.parent_type == "folders" ? local.parent_id : null
48 | project_id = "${local.prefix}${var.name}"
49 | name = local.descriptive_name
50 | billing_account = var.billing_account
51 | auto_create_network = var.auto_create_network
52 | labels = var.labels
53 | skip_delete = var.skip_delete
54 | }
Check: CKV2_GCP_5: "Ensure that Cloud Audit Logging is configured properly across all services and all users from a project"
FAILED for resource: module.dev-sec-project.google_project.project[0]
File: /modules/project/main.tf:44-54
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/ensure-that-cloud-audit-logging-is-configured-properly-across-all-services-and-all-users-from-a-project.html
44 | resource "google_project" "project" {
45 | count = var.project_create ? 1 : 0
46 | org_id = local.parent_type == "organizations" ? local.parent_id : null
47 | folder_id = local.parent_type == "folders" ? local.parent_id : null
48 | project_id = "${local.prefix}${var.name}"
49 | name = local.descriptive_name
50 | billing_account = var.billing_account
51 | auto_create_network = var.auto_create_network
52 | labels = var.labels
53 | skip_delete = var.skip_delete
54 | }
Check: CKV2_GCP_5: "Ensure that Cloud Audit Logging is configured properly across all services and all users from a project"
FAILED for resource: module.prod-sec-project.google_project.project[0]
File: /modules/project/main.tf:44-54
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/ensure-that-cloud-audit-logging-is-configured-properly-across-all-services-and-all-users-from-a-project.html
44 | resource "google_project" "project" {
45 | count = var.project_create ? 1 : 0
46 | org_id = local.parent_type == "organizations" ? local.parent_id : null
47 | folder_id = local.parent_type == "folders" ? local.parent_id : null
48 | project_id = "${local.prefix}${var.name}"
49 | name = local.descriptive_name
50 | billing_account = var.billing_account
51 | auto_create_network = var.auto_create_network
52 | labels = var.labels
53 | skip_delete = var.skip_delete
54 | }
Check: CKV2_GCP_5: "Ensure that Cloud Audit Logging is configured properly across all services and all users from a project"
FAILED for resource: module.cloud-dns.module.project["appteam1"].google_project.project[0]
File: /modules/project/main.tf:44-54
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/ensure-that-cloud-audit-logging-is-configured-properly-across-all-services-and-all-users-from-a-project.html
44 | resource "google_project" "project" {
45 | count = var.project_create ? 1 : 0
46 | org_id = local.parent_type == "organizations" ? local.parent_id : null
47 | folder_id = local.parent_type == "folders" ? local.parent_id : null
48 | project_id = "${local.prefix}${var.name}"
49 | name = local.descriptive_name
50 | billing_account = var.billing_account
51 | auto_create_network = var.auto_create_network
52 | labels = var.labels
53 | skip_delete = var.skip_delete
54 | }
Check: CKV2_GIT_1: "Ensure each Repository has branch protection associated"
FAILED for resource: github_repository.default
File: /fast/extras/0-cicd-github/main.tf:73-106
73 | resource "github_repository" "default" {
74 | for_each = {
75 | for k, v in var.repositories : k => v if v.create_options != null
76 | }
77 | name = each.key
78 | description = (
79 | each.value.create_options.description != null
80 | ? each.value.create_options.description
81 | : "FAST stage ${each.key}."
82 | )
83 | visibility = each.value.create_options.visibility
84 | auto_init = each.value.create_options.auto_init
85 | allow_auto_merge = try(each.value.create_options.allow.auto_merge, null)
86 | allow_merge_commit = try(each.value.create_options.allow.merge_commit, null)
87 | allow_rebase_merge = try(each.value.create_options.allow.rebase_merge, null)
88 | allow_squash_merge = try(each.value.create_options.allow.squash_merge, null)
89 | has_issues = try(each.value.create_options.features.issues, null)
90 | has_projects = try(each.value.create_options.features.projects, null)
91 | has_wiki = try(each.value.create_options.features.wiki, null)
92 | gitignore_template = try(each.value.create_options.templates.gitignore, null)
93 | license_template = try(each.value.create_options.templates.license, null)
94 |
95 | dynamic "template" {
96 | for_each = (
97 | try(each.value.create_options.templates.repository, null) != null
98 | ? [""]
99 | : []
100 | )
101 | content {
102 | owner = each.value.create_options.templates.repository.owner
103 | repository = each.value.create_options.templates.repository.name
104 | }
105 | }
106 | }
kubernetes scan results:
Passed checks: 581, Failed checks: 103, Skipped checks: 0
Check: CKV_K8S_11: "CPU limits should be set"
FAILED for resource: StatefulSet.gmp-public.kube-state-metrics
File: /blueprints/gke/autopilot/bundle/monitoring/kube-state-metrics.yaml:15-98
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-10.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_K8S_31: "Ensure that the seccomp profile is set to docker/default or runtime/default"
FAILED for resource: StatefulSet.gmp-public.kube-state-metrics
File: /blueprints/gke/autopilot/bundle/monitoring/kube-state-metrics.yaml:15-98
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-29.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_K8S_29: "Apply security context to your pods and containers"
FAILED for resource: StatefulSet.gmp-public.kube-state-metrics
File: /blueprints/gke/autopilot/bundle/monitoring/kube-state-metrics.yaml:15-98
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/ensure-securitycontext-is-applied-to-pods-and-containers.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_K8S_22: "Use read-only filesystem for containers where possible"
FAILED for resource: StatefulSet.gmp-public.kube-state-metrics
File: /blueprints/gke/autopilot/bundle/monitoring/kube-state-metrics.yaml:15-98
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-21.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_K8S_43: "Image should use digest"
FAILED for resource: StatefulSet.gmp-public.kube-state-metrics
File: /blueprints/gke/autopilot/bundle/monitoring/kube-state-metrics.yaml:15-98
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-39.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_K8S_40: "Containers should run as a high UID to avoid host conflict"
FAILED for resource: StatefulSet.gmp-public.kube-state-metrics
File: /blueprints/gke/autopilot/bundle/monitoring/kube-state-metrics.yaml:15-98
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-37.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_K8S_15: "Image Pull Policy should be Always"
FAILED for resource: StatefulSet.gmp-public.kube-state-metrics
File: /blueprints/gke/autopilot/bundle/monitoring/kube-state-metrics.yaml:15-98
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-14.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_K8S_38: "Ensure that Service Account Tokens are only mounted where necessary"
FAILED for resource: StatefulSet.gmp-public.kube-state-metrics
File: /blueprints/gke/autopilot/bundle/monitoring/kube-state-metrics.yaml:15-98
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-35.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_K8S_31: "Ensure that the seccomp profile is set to docker/default or runtime/default"
FAILED for resource: Deployment.monitoring.custom-metrics-stackdriver-adapter
File: /blueprints/gke/autopilot/bundle/monitoring/custom-stackdriver-metrics-adapter.yaml:61-96
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-29.html
61 | apiVersion: apps/v1
62 | kind: Deployment
63 | metadata:
64 | name: custom-metrics-stackdriver-adapter
65 | namespace: monitoring
66 | labels:
67 | run: custom-metrics-stackdriver-adapter
68 | k8s-app: custom-metrics-stackdriver-adapter
69 | spec:
70 | replicas: 1
71 | selector:
72 | matchLabels:
73 | run: custom-metrics-stackdriver-adapter
74 | k8s-app: custom-metrics-stackdriver-adapter
75 | template:
76 | metadata:
77 | labels:
78 | run: custom-metrics-stackdriver-adapter
79 | k8s-app: custom-metrics-stackdriver-adapter
80 | kubernetes.io/cluster-service: "true"
81 | spec:
82 | serviceAccountName: custom-metrics-stackdriver-adapter
83 | containers:
84 | - image: gcr.io/gke-release/custom-metrics-stackdriver-adapter:v0.13.1-gke.0
85 | imagePullPolicy: Always
86 | name: pod-custom-metrics-stackdriver-adapter
87 | command:
88 | - /adapter
89 | - --use-new-resource-model=false
90 | resources:
91 | limits:
92 | cpu: 250m
93 | memory: 500Mi
94 | requests:
95 | memory: 500Mi
96 | ---
Check: CKV_K8S_10: "CPU requests should be set"
FAILED for resource: Deployment.monitoring.custom-metrics-stackdriver-adapter
File: /blueprints/gke/autopilot/bundle/monitoring/custom-stackdriver-metrics-adapter.yaml:61-96
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-9.html
61 | apiVersion: apps/v1
62 | kind: Deployment
63 | metadata:
64 | name: custom-metrics-stackdriver-adapter
65 | namespace: monitoring
66 | labels:
67 | run: custom-metrics-stackdriver-adapter
68 | k8s-app: custom-metrics-stackdriver-adapter
69 | spec:
70 | replicas: 1
71 | selector:
72 | matchLabels:
73 | run: custom-metrics-stackdriver-adapter
74 | k8s-app: custom-metrics-stackdriver-adapter
75 | template:
76 | metadata:
77 | labels:
78 | run: custom-metrics-stackdriver-adapter
79 | k8s-app: custom-metrics-stackdriver-adapter
80 | kubernetes.io/cluster-service: "true"
81 | spec:
82 | serviceAccountName: custom-metrics-stackdriver-adapter
83 | containers:
84 | - image: gcr.io/gke-release/custom-metrics-stackdriver-adapter:v0.13.1-gke.0
85 | imagePullPolicy: Always
86 | name: pod-custom-metrics-stackdriver-adapter
87 | command:
88 | - /adapter
89 | - --use-new-resource-model=false
90 | resources:
91 | limits:
92 | cpu: 250m
93 | memory: 500Mi
94 | requests:
95 | memory: 500Mi
96 | ---
Check: CKV_K8S_30: "Apply security context to your containers"
FAILED for resource: Deployment.monitoring.custom-metrics-stackdriver-adapter
File: /blueprints/gke/autopilot/bundle/monitoring/custom-stackdriver-metrics-adapter.yaml:61-96
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-28.html
61 | apiVersion: apps/v1
62 | kind: Deployment
63 | metadata:
64 | name: custom-metrics-stackdriver-adapter
65 | namespace: monitoring
66 | labels:
67 | run: custom-metrics-stackdriver-adapter
68 | k8s-app: custom-metrics-stackdriver-adapter
69 | spec:
70 | replicas: 1
71 | selector:
72 | matchLabels:
73 | run: custom-metrics-stackdriver-adapter
74 | k8s-app: custom-metrics-stackdriver-adapter
75 | template:
76 | metadata:
77 | labels:
78 | run: custom-metrics-stackdriver-adapter
79 | k8s-app: custom-metrics-stackdriver-adapter
80 | kubernetes.io/cluster-service: "true"
81 | spec:
82 | serviceAccountName: custom-metrics-stackdriver-adapter
83 | containers:
84 | - image: gcr.io/gke-release/custom-metrics-stackdriver-adapter:v0.13.1-gke.0
85 | imagePullPolicy: Always
86 | name: pod-custom-metrics-stackdriver-adapter
87 | command:
88 | - /adapter
89 | - --use-new-resource-model=false
90 | resources:
91 | limits:
92 | cpu: 250m
93 | memory: 500Mi
94 | requests:
95 | memory: 500Mi
96 | ---
Check: CKV_K8S_29: "Apply security context to your pods and containers"
FAILED for resource: Deployment.monitoring.custom-metrics-stackdriver-adapter
File: /blueprints/gke/autopilot/bundle/monitoring/custom-stackdriver-metrics-adapter.yaml:61-96
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/ensure-securitycontext-is-applied-to-pods-and-containers.html
61 | apiVersion: apps/v1
62 | kind: Deployment
63 | metadata:
64 | name: custom-metrics-stackdriver-adapter
65 | namespace: monitoring
66 | labels:
67 | run: custom-metrics-stackdriver-adapter
68 | k8s-app: custom-metrics-stackdriver-adapter
69 | spec:
70 | replicas: 1
71 | selector:
72 | matchLabels:
73 | run: custom-metrics-stackdriver-adapter
74 | k8s-app: custom-metrics-stackdriver-adapter
75 | template:
76 | metadata:
77 | labels:
78 | run: custom-metrics-stackdriver-adapter
79 | k8s-app: custom-metrics-stackdriver-adapter
80 | kubernetes.io/cluster-service: "true"
81 | spec:
82 | serviceAccountName: custom-metrics-stackdriver-adapter
83 | containers:
84 | - image: gcr.io/gke-release/custom-metrics-stackdriver-adapter:v0.13.1-gke.0
85 | imagePullPolicy: Always
86 | name: pod-custom-metrics-stackdriver-adapter
87 | command:
88 | - /adapter
89 | - --use-new-resource-model=false
90 | resources:
91 | limits:
92 | cpu: 250m
93 | memory: 500Mi
94 | requests:
95 | memory: 500Mi
96 | ---
Check: CKV_K8S_9: "Readiness Probe Should be Configured"
FAILED for resource: Deployment.monitoring.custom-metrics-stackdriver-adapter
File: /blueprints/gke/autopilot/bundle/monitoring/custom-stackdriver-metrics-adapter.yaml:61-96
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-8.html
61 | apiVersion: apps/v1
62 | kind: Deployment
63 | metadata:
64 | name: custom-metrics-stackdriver-adapter
65 | namespace: monitoring
66 | labels:
67 | run: custom-metrics-stackdriver-adapter
68 | k8s-app: custom-metrics-stackdriver-adapter
69 | spec:
70 | replicas: 1
71 | selector:
72 | matchLabels:
73 | run: custom-metrics-stackdriver-adapter
74 | k8s-app: custom-metrics-stackdriver-adapter
75 | template:
76 | metadata:
77 | labels:
78 | run: custom-metrics-stackdriver-adapter
79 | k8s-app: custom-metrics-stackdriver-adapter
80 | kubernetes.io/cluster-service: "true"
81 | spec:
82 | serviceAccountName: custom-metrics-stackdriver-adapter
83 | containers:
84 | - image: gcr.io/gke-release/custom-metrics-stackdriver-adapter:v0.13.1-gke.0
85 | imagePullPolicy: Always
86 | name: pod-custom-metrics-stackdriver-adapter
87 | command:
88 | - /adapter
89 | - --use-new-resource-model=false
90 | resources:
91 | limits:
92 | cpu: 250m
93 | memory: 500Mi
94 | requests:
95 | memory: 500Mi
96 | ---
Check: CKV_K8S_22: "Use read-only filesystem for containers where possible"
FAILED for resource: Deployment.monitoring.custom-metrics-stackdriver-adapter
File: /blueprints/gke/autopilot/bundle/monitoring/custom-stackdriver-metrics-adapter.yaml:61-96
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-21.html
61 | apiVersion: apps/v1
62 | kind: Deployment
63 | metadata:
64 | name: custom-metrics-stackdriver-adapter
65 | namespace: monitoring
66 | labels:
67 | run: custom-metrics-stackdriver-adapter
68 | k8s-app: custom-metrics-stackdriver-adapter
69 | spec:
70 | replicas: 1
71 | selector:
72 | matchLabels:
73 | run: custom-metrics-stackdriver-adapter
74 | k8s-app: custom-metrics-stackdriver-adapter
75 | template:
76 | metadata:
77 | labels:
78 | run: custom-metrics-stackdriver-adapter
79 | k8s-app: custom-metrics-stackdriver-adapter
80 | kubernetes.io/cluster-service: "true"
81 | spec:
82 | serviceAccountName: custom-metrics-stackdriver-adapter
83 | containers:
84 | - image: gcr.io/gke-release/custom-metrics-stackdriver-adapter:v0.13.1-gke.0
85 | imagePullPolicy: Always
86 | name: pod-custom-metrics-stackdriver-adapter
87 | command:
88 | - /adapter
89 | - --use-new-resource-model=false
90 | resources:
91 | limits:
92 | cpu: 250m
93 | memory: 500Mi
94 | requests:
95 | memory: 500Mi
96 | ---
Check: CKV_K8S_43: "Image should use digest"
FAILED for resource: Deployment.monitoring.custom-metrics-stackdriver-adapter
File: /blueprints/gke/autopilot/bundle/monitoring/custom-stackdriver-metrics-adapter.yaml:61-96
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-39.html
61 | apiVersion: apps/v1
62 | kind: Deployment
63 | metadata:
64 | name: custom-metrics-stackdriver-adapter
65 | namespace: monitoring
66 | labels:
67 | run: custom-metrics-stackdriver-adapter
68 | k8s-app: custom-metrics-stackdriver-adapter
69 | spec:
70 | replicas: 1
71 | selector:
72 | matchLabels:
73 | run: custom-metrics-stackdriver-adapter
74 | k8s-app: custom-metrics-stackdriver-adapter
75 | template:
76 | metadata:
77 | labels:
78 | run: custom-metrics-stackdriver-adapter
79 | k8s-app: custom-metrics-stackdriver-adapter
80 | kubernetes.io/cluster-service: "true"
81 | spec:
82 | serviceAccountName: custom-metrics-stackdriver-adapter
83 | containers:
84 | - image: gcr.io/gke-release/custom-metrics-stackdriver-adapter:v0.13.1-gke.0
85 | imagePullPolicy: Always
86 | name: pod-custom-metrics-stackdriver-adapter
87 | command:
88 | - /adapter
89 | - --use-new-resource-model=false
90 | resources:
91 | limits:
92 | cpu: 250m
93 | memory: 500Mi
94 | requests:
95 | memory: 500Mi
96 | ---
Check: CKV_K8S_23: "Minimize the admission of root containers"
FAILED for resource: Deployment.monitoring.custom-metrics-stackdriver-adapter
File: /blueprints/gke/autopilot/bundle/monitoring/custom-stackdriver-metrics-adapter.yaml:61-96
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-22.html
61 | apiVersion: apps/v1
62 | kind: Deployment
63 | metadata:
64 | name: custom-metrics-stackdriver-adapter
65 | namespace: monitoring
66 | labels:
67 | run: custom-metrics-stackdriver-adapter
68 | k8s-app: custom-metrics-stackdriver-adapter
69 | spec:
70 | replicas: 1
71 | selector:
72 | matchLabels:
73 | run: custom-metrics-stackdriver-adapter
74 | k8s-app: custom-metrics-stackdriver-adapter
75 | template:
76 | metadata:
77 | labels:
78 | run: custom-metrics-stackdriver-adapter
79 | k8s-app: custom-metrics-stackdriver-adapter
80 | kubernetes.io/cluster-service: "true"
81 | spec:
82 | serviceAccountName: custom-metrics-stackdriver-adapter
83 | containers:
84 | - image: gcr.io/gke-release/custom-metrics-stackdriver-adapter:v0.13.1-gke.0
85 | imagePullPolicy: Always
86 | name: pod-custom-metrics-stackdriver-adapter
87 | command:
88 | - /adapter
89 | - --use-new-resource-model=false
90 | resources:
91 | limits:
92 | cpu: 250m
93 | memory: 500Mi
94 | requests:
95 | memory: 500Mi
96 | ---
Check: CKV_K8S_8: "Liveness Probe Should be Configured"
FAILED for resource: Deployment.monitoring.custom-metrics-stackdriver-adapter
File: /blueprints/gke/autopilot/bundle/monitoring/custom-stackdriver-metrics-adapter.yaml:61-96
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-7.html
61 | apiVersion: apps/v1
62 | kind: Deployment
63 | metadata:
64 | name: custom-metrics-stackdriver-adapter
65 | namespace: monitoring
66 | labels:
67 | run: custom-metrics-stackdriver-adapter
68 | k8s-app: custom-metrics-stackdriver-adapter
69 | spec:
70 | replicas: 1
71 | selector:
72 | matchLabels:
73 | run: custom-metrics-stackdriver-adapter
74 | k8s-app: custom-metrics-stackdriver-adapter
75 | template:
76 | metadata:
77 | labels:
78 | run: custom-metrics-stackdriver-adapter
79 | k8s-app: custom-metrics-stackdriver-adapter
80 | kubernetes.io/cluster-service: "true"
81 | spec:
82 | serviceAccountName: custom-metrics-stackdriver-adapter
83 | containers:
84 | - image: gcr.io/gke-release/custom-metrics-stackdriver-adapter:v0.13.1-gke.0
85 | imagePullPolicy: Always
86 | name: pod-custom-metrics-stackdriver-adapter
87 | command:
88 | - /adapter
89 | - --use-new-resource-model=false
90 | resources:
91 | limits:
92 | cpu: 250m
93 | memory: 500Mi
94 | requests:
95 | memory: 500Mi
96 | ---
Check: CKV_K8S_40: "Containers should run as a high UID to avoid host conflict"
FAILED for resource: Deployment.monitoring.custom-metrics-stackdriver-adapter
File: /blueprints/gke/autopilot/bundle/monitoring/custom-stackdriver-metrics-adapter.yaml:61-96
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-37.html
61 | apiVersion: apps/v1
62 | kind: Deployment
63 | metadata:
64 | name: custom-metrics-stackdriver-adapter
65 | namespace: monitoring
66 | labels:
67 | run: custom-metrics-stackdriver-adapter
68 | k8s-app: custom-metrics-stackdriver-adapter
69 | spec:
70 | replicas: 1
71 | selector:
72 | matchLabels:
73 | run: custom-metrics-stackdriver-adapter
74 | k8s-app: custom-metrics-stackdriver-adapter
75 | template:
76 | metadata:
77 | labels:
78 | run: custom-metrics-stackdriver-adapter
79 | k8s-app: custom-metrics-stackdriver-adapter
80 | kubernetes.io/cluster-service: "true"
81 | spec:
82 | serviceAccountName: custom-metrics-stackdriver-adapter
83 | containers:
84 | - image: gcr.io/gke-release/custom-metrics-stackdriver-adapter:v0.13.1-gke.0
85 | imagePullPolicy: Always
86 | name: pod-custom-metrics-stackdriver-adapter
87 | command:
88 | - /adapter
89 | - --use-new-resource-model=false
90 | resources:
91 | limits:
92 | cpu: 250m
93 | memory: 500Mi
94 | requests:
95 | memory: 500Mi
96 | ---
Check: CKV_K8S_20: "Containers should not run with allowPrivilegeEscalation"
FAILED for resource: Deployment.monitoring.custom-metrics-stackdriver-adapter
File: /blueprints/gke/autopilot/bundle/monitoring/custom-stackdriver-metrics-adapter.yaml:61-96
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-19.html
61 | apiVersion: apps/v1
62 | kind: Deployment
63 | metadata:
64 | name: custom-metrics-stackdriver-adapter
65 | namespace: monitoring
66 | labels:
67 | run: custom-metrics-stackdriver-adapter
68 | k8s-app: custom-metrics-stackdriver-adapter
69 | spec:
70 | replicas: 1
71 | selector:
72 | matchLabels:
73 | run: custom-metrics-stackdriver-adapter
74 | k8s-app: custom-metrics-stackdriver-adapter
75 | template:
76 | metadata:
77 | labels:
78 | run: custom-metrics-stackdriver-adapter
79 | k8s-app: custom-metrics-stackdriver-adapter
80 | kubernetes.io/cluster-service: "true"
81 | spec:
82 | serviceAccountName: custom-metrics-stackdriver-adapter
83 | containers:
84 | - image: gcr.io/gke-release/custom-metrics-stackdriver-adapter:v0.13.1-gke.0
85 | imagePullPolicy: Always
86 | name: pod-custom-metrics-stackdriver-adapter
87 | command:
88 | - /adapter
89 | - --use-new-resource-model=false
90 | resources:
91 | limits:
92 | cpu: 250m
93 | memory: 500Mi
94 | requests:
95 | memory: 500Mi
96 | ---
Check: CKV_K8S_28: "Minimize the admission of containers with the NET_RAW capability"
FAILED for resource: Deployment.monitoring.custom-metrics-stackdriver-adapter
File: /blueprints/gke/autopilot/bundle/monitoring/custom-stackdriver-metrics-adapter.yaml:61-96
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-27.html
61 | apiVersion: apps/v1
62 | kind: Deployment
63 | metadata:
64 | name: custom-metrics-stackdriver-adapter
65 | namespace: monitoring
66 | labels:
67 | run: custom-metrics-stackdriver-adapter
68 | k8s-app: custom-metrics-stackdriver-adapter
69 | spec:
70 | replicas: 1
71 | selector:
72 | matchLabels:
73 | run: custom-metrics-stackdriver-adapter
74 | k8s-app: custom-metrics-stackdriver-adapter
75 | template:
76 | metadata:
77 | labels:
78 | run: custom-metrics-stackdriver-adapter
79 | k8s-app: custom-metrics-stackdriver-adapter
80 | kubernetes.io/cluster-service: "true"
81 | spec:
82 | serviceAccountName: custom-metrics-stackdriver-adapter
83 | containers:
84 | - image: gcr.io/gke-release/custom-metrics-stackdriver-adapter:v0.13.1-gke.0
85 | imagePullPolicy: Always
86 | name: pod-custom-metrics-stackdriver-adapter
87 | command:
88 | - /adapter
89 | - --use-new-resource-model=false
90 | resources:
91 | limits:
92 | cpu: 250m
93 | memory: 500Mi
94 | requests:
95 | memory: 500Mi
96 | ---
Check: CKV_K8S_37: "Minimize the admission of containers with capabilities assigned"
FAILED for resource: Deployment.monitoring.custom-metrics-stackdriver-adapter
File: /blueprints/gke/autopilot/bundle/monitoring/custom-stackdriver-metrics-adapter.yaml:61-96
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-34.html
61 | apiVersion: apps/v1
62 | kind: Deployment
63 | metadata:
64 | name: custom-metrics-stackdriver-adapter
65 | namespace: monitoring
66 | labels:
67 | run: custom-metrics-stackdriver-adapter
68 | k8s-app: custom-metrics-stackdriver-adapter
69 | spec:
70 | replicas: 1
71 | selector:
72 | matchLabels:
73 | run: custom-metrics-stackdriver-adapter
74 | k8s-app: custom-metrics-stackdriver-adapter
75 | template:
76 | metadata:
77 | labels:
78 | run: custom-metrics-stackdriver-adapter
79 | k8s-app: custom-metrics-stackdriver-adapter
80 | kubernetes.io/cluster-service: "true"
81 | spec:
82 | serviceAccountName: custom-metrics-stackdriver-adapter
83 | containers:
84 | - image: gcr.io/gke-release/custom-metrics-stackdriver-adapter:v0.13.1-gke.0
85 | imagePullPolicy: Always
86 | name: pod-custom-metrics-stackdriver-adapter
87 | command:
88 | - /adapter
89 | - --use-new-resource-model=false
90 | resources:
91 | limits:
92 | cpu: 250m
93 | memory: 500Mi
94 | requests:
95 | memory: 500Mi
96 | ---
Check: CKV_K8S_38: "Ensure that Service Account Tokens are only mounted where necessary"
FAILED for resource: Deployment.monitoring.custom-metrics-stackdriver-adapter
File: /blueprints/gke/autopilot/bundle/monitoring/custom-stackdriver-metrics-adapter.yaml:61-96
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-35.html
61 | apiVersion: apps/v1
62 | kind: Deployment
63 | metadata:
64 | name: custom-metrics-stackdriver-adapter
65 | namespace: monitoring
66 | labels:
67 | run: custom-metrics-stackdriver-adapter
68 | k8s-app: custom-metrics-stackdriver-adapter
69 | spec:
70 | replicas: 1
71 | selector:
72 | matchLabels:
73 | run: custom-metrics-stackdriver-adapter
74 | k8s-app: custom-metrics-stackdriver-adapter
75 | template:
76 | metadata:
77 | labels:
78 | run: custom-metrics-stackdriver-adapter
79 | k8s-app: custom-metrics-stackdriver-adapter
80 | kubernetes.io/cluster-service: "true"
81 | spec:
82 | serviceAccountName: custom-metrics-stackdriver-adapter
83 | containers:
84 | - image: gcr.io/gke-release/custom-metrics-stackdriver-adapter:v0.13.1-gke.0
85 | imagePullPolicy: Always
86 | name: pod-custom-metrics-stackdriver-adapter
87 | command:
88 | - /adapter
89 | - --use-new-resource-model=false
90 | resources:
91 | limits:
92 | cpu: 250m
93 | memory: 500Mi
94 | requests:
95 | memory: 500Mi
96 | ---
Check: CKV_K8S_49: "Minimize wildcard use in Roles and ClusterRoles"
FAILED for resource: ClusterRole.default.external-metrics-reader
File: /blueprints/gke/autopilot/bundle/monitoring/custom-stackdriver-metrics-adapter.yaml:159-172
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/ensure-minimized-wildcard-use-in-roles-and-clusterroles.html
159 | apiVersion: rbac.authorization.k8s.io/v1
160 | kind: ClusterRole
161 | metadata:
162 | name: external-metrics-reader
163 | rules:
164 | - apiGroups:
165 | - "external.metrics.k8s.io"
166 | resources:
167 | - "*"
168 | verbs:
169 | - list
170 | - get
171 | - watch©
172 | ---
Check: CKV_K8S_11: "CPU limits should be set"
FAILED for resource: Deployment.monitoring.grafana
File: /blueprints/gke/autopilot/bundle/monitoring/grafana.yaml:71-168
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-10.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_K8S_31: "Ensure that the seccomp profile is set to docker/default or runtime/default"
FAILED for resource: Deployment.monitoring.grafana
File: /blueprints/gke/autopilot/bundle/monitoring/grafana.yaml:71-168
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-29.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_K8S_30: "Apply security context to your containers"
FAILED for resource: Deployment.monitoring.grafana
File: /blueprints/gke/autopilot/bundle/monitoring/grafana.yaml:71-168
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-28.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_K8S_29: "Apply security context to your pods and containers"
FAILED for resource: Deployment.monitoring.grafana
File: /blueprints/gke/autopilot/bundle/monitoring/grafana.yaml:71-168
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/ensure-securitycontext-is-applied-to-pods-and-containers.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_K8S_22: "Use read-only filesystem for containers where possible"
FAILED for resource: Deployment.monitoring.grafana
File: /blueprints/gke/autopilot/bundle/monitoring/grafana.yaml:71-168
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-21.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_K8S_43: "Image should use digest"
FAILED for resource: Deployment.monitoring.grafana
File: /blueprints/gke/autopilot/bundle/monitoring/grafana.yaml:71-168
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-39.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_K8S_23: "Minimize the admission of root containers"
FAILED for resource: Deployment.monitoring.grafana
File: /blueprints/gke/autopilot/bundle/monitoring/grafana.yaml:71-168
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-22.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_K8S_40: "Containers should run as a high UID to avoid host conflict"
FAILED for resource: Deployment.monitoring.grafana
File: /blueprints/gke/autopilot/bundle/monitoring/grafana.yaml:71-168
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-37.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_K8S_20: "Containers should not run with allowPrivilegeEscalation"
FAILED for resource: Deployment.monitoring.grafana
File: /blueprints/gke/autopilot/bundle/monitoring/grafana.yaml:71-168
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-19.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_K8S_28: "Minimize the admission of containers with the NET_RAW capability"
FAILED for resource: Deployment.monitoring.grafana
File: /blueprints/gke/autopilot/bundle/monitoring/grafana.yaml:71-168
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-27.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_K8S_37: "Minimize the admission of containers with capabilities assigned"
FAILED for resource: Deployment.monitoring.grafana
File: /blueprints/gke/autopilot/bundle/monitoring/grafana.yaml:71-168
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-34.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_K8S_15: "Image Pull Policy should be Always"
FAILED for resource: Deployment.monitoring.grafana
File: /blueprints/gke/autopilot/bundle/monitoring/grafana.yaml:71-168
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-14.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_K8S_38: "Ensure that Service Account Tokens are only mounted where necessary"
FAILED for resource: Deployment.monitoring.grafana
File: /blueprints/gke/autopilot/bundle/monitoring/grafana.yaml:71-168
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-35.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_K8S_11: "CPU limits should be set"
FAILED for resource: Deployment.monitoring.frontend
File: /blueprints/gke/autopilot/bundle/monitoring/frontend.yaml:21-67
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-10.html
21 | apiVersion: apps/v1
22 | kind: Deployment
23 | metadata:
24 | name: frontend
25 | namespace: monitoring
26 | spec:
27 | replicas: 1
28 | selector:
29 | matchLabels:
30 | app: frontend
31 | template:
32 | metadata:
33 | labels:
34 | app: frontend
35 | spec:
36 | serviceAccountName: frontend
37 | tolerations:
38 | - key: group
39 | operator: Equal
40 | value: monitoring
41 | effect: NoSchedule
42 | nodeSelector:
43 | group: monitoring
44 | automountServiceAccountToken: true
45 | containers:
46 | - name: frontend
47 | image: "gke.gcr.io/prometheus-engine/frontend:v0.5.0-gke.0"
48 | args:
49 | - "--web.listen-address=:9090"
50 | ports:
51 | - name: web
52 | containerPort: 9090
53 | resources:
54 | requests:
55 | cpu: 250m
56 | memory: 500Mi
57 | limits:
58 | memory: 500Mi
59 | readinessProbe:
60 | httpGet:
61 | path: /-/ready
62 | port: web
63 | livenessProbe:
64 | httpGet:
65 | path: /-/healthy
66 | port: web
67 | ---
Check: CKV_K8S_31: "Ensure that the seccomp profile is set to docker/default or runtime/default"
FAILED for resource: Deployment.monitoring.frontend
File: /blueprints/gke/autopilot/bundle/monitoring/frontend.yaml:21-67
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-29.html
21 | apiVersion: apps/v1
22 | kind: Deployment
23 | metadata:
24 | name: frontend
25 | namespace: monitoring
26 | spec:
27 | replicas: 1
28 | selector:
29 | matchLabels:
30 | app: frontend
31 | template:
32 | metadata:
33 | labels:
34 | app: frontend
35 | spec:
36 | serviceAccountName: frontend
37 | tolerations:
38 | - key: group
39 | operator: Equal
40 | value: monitoring
41 | effect: NoSchedule
42 | nodeSelector:
43 | group: monitoring
44 | automountServiceAccountToken: true
45 | containers:
46 | - name: frontend
47 | image: "gke.gcr.io/prometheus-engine/frontend:v0.5.0-gke.0"
48 | args:
49 | - "--web.listen-address=:9090"
50 | ports:
51 | - name: web
52 | containerPort: 9090
53 | resources:
54 | requests:
55 | cpu: 250m
56 | memory: 500Mi
57 | limits:
58 | memory: 500Mi
59 | readinessProbe:
60 | httpGet:
61 | path: /-/ready
62 | port: web
63 | livenessProbe:
64 | httpGet:
65 | path: /-/healthy
66 | port: web
67 | ---
Check: CKV_K8S_30: "Apply security context to your containers"
FAILED for resource: Deployment.monitoring.frontend
File: /blueprints/gke/autopilot/bundle/monitoring/frontend.yaml:21-67
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-28.html
21 | apiVersion: apps/v1
22 | kind: Deployment
23 | metadata:
24 | name: frontend
25 | namespace: monitoring
26 | spec:
27 | replicas: 1
28 | selector:
29 | matchLabels:
30 | app: frontend
31 | template:
32 | metadata:
33 | labels:
34 | app: frontend
35 | spec:
36 | serviceAccountName: frontend
37 | tolerations:
38 | - key: group
39 | operator: Equal
40 | value: monitoring
41 | effect: NoSchedule
42 | nodeSelector:
43 | group: monitoring
44 | automountServiceAccountToken: true
45 | containers:
46 | - name: frontend
47 | image: "gke.gcr.io/prometheus-engine/frontend:v0.5.0-gke.0"
48 | args:
49 | - "--web.listen-address=:9090"
50 | ports:
51 | - name: web
52 | containerPort: 9090
53 | resources:
54 | requests:
55 | cpu: 250m
56 | memory: 500Mi
57 | limits:
58 | memory: 500Mi
59 | readinessProbe:
60 | httpGet:
61 | path: /-/ready
62 | port: web
63 | livenessProbe:
64 | httpGet:
65 | path: /-/healthy
66 | port: web
67 | ---
Check: CKV_K8S_29: "Apply security context to your pods and containers"
FAILED for resource: Deployment.monitoring.frontend
File: /blueprints/gke/autopilot/bundle/monitoring/frontend.yaml:21-67
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/ensure-securitycontext-is-applied-to-pods-and-containers.html
21 | apiVersion: apps/v1
22 | kind: Deployment
23 | metadata:
24 | name: frontend
25 | namespace: monitoring
26 | spec:
27 | replicas: 1
28 | selector:
29 | matchLabels:
30 | app: frontend
31 | template:
32 | metadata:
33 | labels:
34 | app: frontend
35 | spec:
36 | serviceAccountName: frontend
37 | tolerations:
38 | - key: group
39 | operator: Equal
40 | value: monitoring
41 | effect: NoSchedule
42 | nodeSelector:
43 | group: monitoring
44 | automountServiceAccountToken: true
45 | containers:
46 | - name: frontend
47 | image: "gke.gcr.io/prometheus-engine/frontend:v0.5.0-gke.0"
48 | args:
49 | - "--web.listen-address=:9090"
50 | ports:
51 | - name: web
52 | containerPort: 9090
53 | resources:
54 | requests:
55 | cpu: 250m
56 | memory: 500Mi
57 | limits:
58 | memory: 500Mi
59 | readinessProbe:
60 | httpGet:
61 | path: /-/ready
62 | port: web
63 | livenessProbe:
64 | httpGet:
65 | path: /-/healthy
66 | port: web
67 | ---
Check: CKV_K8S_22: "Use read-only filesystem for containers where possible"
FAILED for resource: Deployment.monitoring.frontend
File: /blueprints/gke/autopilot/bundle/monitoring/frontend.yaml:21-67
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-21.html
21 | apiVersion: apps/v1
22 | kind: Deployment
23 | metadata:
24 | name: frontend
25 | namespace: monitoring
26 | spec:
27 | replicas: 1
28 | selector:
29 | matchLabels:
30 | app: frontend
31 | template:
32 | metadata:
33 | labels:
34 | app: frontend
35 | spec:
36 | serviceAccountName: frontend
37 | tolerations:
38 | - key: group
39 | operator: Equal
40 | value: monitoring
41 | effect: NoSchedule
42 | nodeSelector:
43 | group: monitoring
44 | automountServiceAccountToken: true
45 | containers:
46 | - name: frontend
47 | image: "gke.gcr.io/prometheus-engine/frontend:v0.5.0-gke.0"
48 | args:
49 | - "--web.listen-address=:9090"
50 | ports:
51 | - name: web
52 | containerPort: 9090
53 | resources:
54 | requests:
55 | cpu: 250m
56 | memory: 500Mi
57 | limits:
58 | memory: 500Mi
59 | readinessProbe:
60 | httpGet:
61 | path: /-/ready
62 | port: web
63 | livenessProbe:
64 | httpGet:
65 | path: /-/healthy
66 | port: web
67 | ---
Check: CKV_K8S_43: "Image should use digest"
FAILED for resource: Deployment.monitoring.frontend
File: /blueprints/gke/autopilot/bundle/monitoring/frontend.yaml:21-67
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-39.html
21 | apiVersion: apps/v1
22 | kind: Deployment
23 | metadata:
24 | name: frontend
25 | namespace: monitoring
26 | spec:
27 | replicas: 1
28 | selector:
29 | matchLabels:
30 | app: frontend
31 | template:
32 | metadata:
33 | labels:
34 | app: frontend
35 | spec:
36 | serviceAccountName: frontend
37 | tolerations:
38 | - key: group
39 | operator: Equal
40 | value: monitoring
41 | effect: NoSchedule
42 | nodeSelector:
43 | group: monitoring
44 | automountServiceAccountToken: true
45 | containers:
46 | - name: frontend
47 | image: "gke.gcr.io/prometheus-engine/frontend:v0.5.0-gke.0"
48 | args:
49 | - "--web.listen-address=:9090"
50 | ports:
51 | - name: web
52 | containerPort: 9090
53 | resources:
54 | requests:
55 | cpu: 250m
56 | memory: 500Mi
57 | limits:
58 | memory: 500Mi
59 | readinessProbe:
60 | httpGet:
61 | path: /-/ready
62 | port: web
63 | livenessProbe:
64 | httpGet:
65 | path: /-/healthy
66 | port: web
67 | ---
Check: CKV_K8S_23: "Minimize the admission of root containers"
FAILED for resource: Deployment.monitoring.frontend
File: /blueprints/gke/autopilot/bundle/monitoring/frontend.yaml:21-67
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-22.html
21 | apiVersion: apps/v1
22 | kind: Deployment
23 | metadata:
24 | name: frontend
25 | namespace: monitoring
26 | spec:
27 | replicas: 1
28 | selector:
29 | matchLabels:
30 | app: frontend
31 | template:
32 | metadata:
33 | labels:
34 | app: frontend
35 | spec:
36 | serviceAccountName: frontend
37 | tolerations:
38 | - key: group
39 | operator: Equal
40 | value: monitoring
41 | effect: NoSchedule
42 | nodeSelector:
43 | group: monitoring
44 | automountServiceAccountToken: true
45 | containers:
46 | - name: frontend
47 | image: "gke.gcr.io/prometheus-engine/frontend:v0.5.0-gke.0"
48 | args:
49 | - "--web.listen-address=:9090"
50 | ports:
51 | - name: web
52 | containerPort: 9090
53 | resources:
54 | requests:
55 | cpu: 250m
56 | memory: 500Mi
57 | limits:
58 | memory: 500Mi
59 | readinessProbe:
60 | httpGet:
61 | path: /-/ready
62 | port: web
63 | livenessProbe:
64 | httpGet:
65 | path: /-/healthy
66 | port: web
67 | ---
Check: CKV_K8S_40: "Containers should run as a high UID to avoid host conflict"
FAILED for resource: Deployment.monitoring.frontend
File: /blueprints/gke/autopilot/bundle/monitoring/frontend.yaml:21-67
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-37.html
21 | apiVersion: apps/v1
22 | kind: Deployment
23 | metadata:
24 | name: frontend
25 | namespace: monitoring
26 | spec:
27 | replicas: 1
28 | selector:
29 | matchLabels:
30 | app: frontend
31 | template:
32 | metadata:
33 | labels:
34 | app: frontend
35 | spec:
36 | serviceAccountName: frontend
37 | tolerations:
38 | - key: group
39 | operator: Equal
40 | value: monitoring
41 | effect: NoSchedule
42 | nodeSelector:
43 | group: monitoring
44 | automountServiceAccountToken: true
45 | containers:
46 | - name: frontend
47 | image: "gke.gcr.io/prometheus-engine/frontend:v0.5.0-gke.0"
48 | args:
49 | - "--web.listen-address=:9090"
50 | ports:
51 | - name: web
52 | containerPort: 9090
53 | resources:
54 | requests:
55 | cpu: 250m
56 | memory: 500Mi
57 | limits:
58 | memory: 500Mi
59 | readinessProbe:
60 | httpGet:
61 | path: /-/ready
62 | port: web
63 | livenessProbe:
64 | httpGet:
65 | path: /-/healthy
66 | port: web
67 | ---
Check: CKV_K8S_20: "Containers should not run with allowPrivilegeEscalation"
FAILED for resource: Deployment.monitoring.frontend
File: /blueprints/gke/autopilot/bundle/monitoring/frontend.yaml:21-67
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-19.html
21 | apiVersion: apps/v1
22 | kind: Deployment
23 | metadata:
24 | name: frontend
25 | namespace: monitoring
26 | spec:
27 | replicas: 1
28 | selector:
29 | matchLabels:
30 | app: frontend
31 | template:
32 | metadata:
33 | labels:
34 | app: frontend
35 | spec:
36 | serviceAccountName: frontend
37 | tolerations:
38 | - key: group
39 | operator: Equal
40 | value: monitoring
41 | effect: NoSchedule
42 | nodeSelector:
43 | group: monitoring
44 | automountServiceAccountToken: true
45 | containers:
46 | - name: frontend
47 | image: "gke.gcr.io/prometheus-engine/frontend:v0.5.0-gke.0"
48 | args:
49 | - "--web.listen-address=:9090"
50 | ports:
51 | - name: web
52 | containerPort: 9090
53 | resources:
54 | requests:
55 | cpu: 250m
56 | memory: 500Mi
57 | limits:
58 | memory: 500Mi
59 | readinessProbe:
60 | httpGet:
61 | path: /-/ready
62 | port: web
63 | livenessProbe:
64 | httpGet:
65 | path: /-/healthy
66 | port: web
67 | ---
Check: CKV_K8S_28: "Minimize the admission of containers with the NET_RAW capability"
FAILED for resource: Deployment.monitoring.frontend
File: /blueprints/gke/autopilot/bundle/monitoring/frontend.yaml:21-67
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-27.html
21 | apiVersion: apps/v1
22 | kind: Deployment
23 | metadata:
24 | name: frontend
25 | namespace: monitoring
26 | spec:
27 | replicas: 1
28 | selector:
29 | matchLabels:
30 | app: frontend
31 | template:
32 | metadata:
33 | labels:
34 | app: frontend
35 | spec:
36 | serviceAccountName: frontend
37 | tolerations:
38 | - key: group
39 | operator: Equal
40 | value: monitoring
41 | effect: NoSchedule
42 | nodeSelector:
43 | group: monitoring
44 | automountServiceAccountToken: true
45 | containers:
46 | - name: frontend
47 | image: "gke.gcr.io/prometheus-engine/frontend:v0.5.0-gke.0"
48 | args:
49 | - "--web.listen-address=:9090"
50 | ports:
51 | - name: web
52 | containerPort: 9090
53 | resources:
54 | requests:
55 | cpu: 250m
56 | memory: 500Mi
57 | limits:
58 | memory: 500Mi
59 | readinessProbe:
60 | httpGet:
61 | path: /-/ready
62 | port: web
63 | livenessProbe:
64 | httpGet:
65 | path: /-/healthy
66 | port: web
67 | ---
Check: CKV_K8S_37: "Minimize the admission of containers with capabilities assigned"
FAILED for resource: Deployment.monitoring.frontend
File: /blueprints/gke/autopilot/bundle/monitoring/frontend.yaml:21-67
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-34.html
21 | apiVersion: apps/v1
22 | kind: Deployment
23 | metadata:
24 | name: frontend
25 | namespace: monitoring
26 | spec:
27 | replicas: 1
28 | selector:
29 | matchLabels:
30 | app: frontend
31 | template:
32 | metadata:
33 | labels:
34 | app: frontend
35 | spec:
36 | serviceAccountName: frontend
37 | tolerations:
38 | - key: group
39 | operator: Equal
40 | value: monitoring
41 | effect: NoSchedule
42 | nodeSelector:
43 | group: monitoring
44 | automountServiceAccountToken: true
45 | containers:
46 | - name: frontend
47 | image: "gke.gcr.io/prometheus-engine/frontend:v0.5.0-gke.0"
48 | args:
49 | - "--web.listen-address=:9090"
50 | ports:
51 | - name: web
52 | containerPort: 9090
53 | resources:
54 | requests:
55 | cpu: 250m
56 | memory: 500Mi
57 | limits:
58 | memory: 500Mi
59 | readinessProbe:
60 | httpGet:
61 | path: /-/ready
62 | port: web
63 | livenessProbe:
64 | httpGet:
65 | path: /-/healthy
66 | port: web
67 | ---
Check: CKV_K8S_15: "Image Pull Policy should be Always"
FAILED for resource: Deployment.monitoring.frontend
File: /blueprints/gke/autopilot/bundle/monitoring/frontend.yaml:21-67
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-14.html
21 | apiVersion: apps/v1
22 | kind: Deployment
23 | metadata:
24 | name: frontend
25 | namespace: monitoring
26 | spec:
27 | replicas: 1
28 | selector:
29 | matchLabels:
30 | app: frontend
31 | template:
32 | metadata:
33 | labels:
34 | app: frontend
35 | spec:
36 | serviceAccountName: frontend
37 | tolerations:
38 | - key: group
39 | operator: Equal
40 | value: monitoring
41 | effect: NoSchedule
42 | nodeSelector:
43 | group: monitoring
44 | automountServiceAccountToken: true
45 | containers:
46 | - name: frontend
47 | image: "gke.gcr.io/prometheus-engine/frontend:v0.5.0-gke.0"
48 | args:
49 | - "--web.listen-address=:9090"
50 | ports:
51 | - name: web
52 | containerPort: 9090
53 | resources:
54 | requests:
55 | cpu: 250m
56 | memory: 500Mi
57 | limits:
58 | memory: 500Mi
59 | readinessProbe:
60 | httpGet:
61 | path: /-/ready
62 | port: web
63 | livenessProbe:
64 | httpGet:
65 | path: /-/healthy
66 | port: web
67 | ---
Check: CKV_K8S_38: "Ensure that Service Account Tokens are only mounted where necessary"
FAILED for resource: Deployment.monitoring.frontend
File: /blueprints/gke/autopilot/bundle/monitoring/frontend.yaml:21-67
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-35.html
21 | apiVersion: apps/v1
22 | kind: Deployment
23 | metadata:
24 | name: frontend
25 | namespace: monitoring
26 | spec:
27 | replicas: 1
28 | selector:
29 | matchLabels:
30 | app: frontend
31 | template:
32 | metadata:
33 | labels:
34 | app: frontend
35 | spec:
36 | serviceAccountName: frontend
37 | tolerations:
38 | - key: group
39 | operator: Equal
40 | value: monitoring
41 | effect: NoSchedule
42 | nodeSelector:
43 | group: monitoring
44 | automountServiceAccountToken: true
45 | containers:
46 | - name: frontend
47 | image: "gke.gcr.io/prometheus-engine/frontend:v0.5.0-gke.0"
48 | args:
49 | - "--web.listen-address=:9090"
50 | ports:
51 | - name: web
52 | containerPort: 9090
53 | resources:
54 | requests:
55 | cpu: 250m
56 | memory: 500Mi
57 | limits:
58 | memory: 500Mi
59 | readinessProbe:
60 | httpGet:
61 | path: /-/ready
62 | port: web
63 | livenessProbe:
64 | httpGet:
65 | path: /-/healthy
66 | port: web
67 | ---
Check: CKV_K8S_11: "CPU limits should be set"
FAILED for resource: Deployment.locust.locust-worker
File: /blueprints/gke/autopilot/bundle/locust/workers.yaml:15-52
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-10.html
15 | apiVersion: "apps/v1"
16 | kind: "Deployment"
17 | metadata:
18 | name: locust-worker
19 | namespace: locust
20 | labels:
21 | name: locust-worker
22 | spec:
23 | replicas: 5
24 | selector:
25 | matchLabels:
26 | app: locust-worker
27 | template:
28 | metadata:
29 | labels:
30 | app: locust-worker
31 | spec:
32 | tolerations:
33 | - key: group
34 | operator: Equal
35 | value: "locust"
36 | effect: NoSchedule
37 | nodeSelector:
38 | group: "locust"
39 | containers:
40 | - name: locust-worker
41 | image: load-test-image
42 | env:
43 | - name: LOCUST_MODE
44 | value: worker
45 | - name: LOCUST_MASTER
46 | value: locust-master
47 | resources:
48 | requests:
49 | cpu: 250m
50 | memory: 500Mi
51 | limits:
52 | memory: 500Mi
Check: CKV_K8S_31: "Ensure that the seccomp profile is set to docker/default or runtime/default"
FAILED for resource: Deployment.locust.locust-worker
File: /blueprints/gke/autopilot/bundle/locust/workers.yaml:15-52
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-29.html
15 | apiVersion: "apps/v1"
16 | kind: "Deployment"
17 | metadata:
18 | name: locust-worker
19 | namespace: locust
20 | labels:
21 | name: locust-worker
22 | spec:
23 | replicas: 5
24 | selector:
25 | matchLabels:
26 | app: locust-worker
27 | template:
28 | metadata:
29 | labels:
30 | app: locust-worker
31 | spec:
32 | tolerations:
33 | - key: group
34 | operator: Equal
35 | value: "locust"
36 | effect: NoSchedule
37 | nodeSelector:
38 | group: "locust"
39 | containers:
40 | - name: locust-worker
41 | image: load-test-image
42 | env:
43 | - name: LOCUST_MODE
44 | value: worker
45 | - name: LOCUST_MASTER
46 | value: locust-master
47 | resources:
48 | requests:
49 | cpu: 250m
50 | memory: 500Mi
51 | limits:
52 | memory: 500Mi
Check: CKV_K8S_30: "Apply security context to your containers"
FAILED for resource: Deployment.locust.locust-worker
File: /blueprints/gke/autopilot/bundle/locust/workers.yaml:15-52
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-28.html
15 | apiVersion: "apps/v1"
16 | kind: "Deployment"
17 | metadata:
18 | name: locust-worker
19 | namespace: locust
20 | labels:
21 | name: locust-worker
22 | spec:
23 | replicas: 5
24 | selector:
25 | matchLabels:
26 | app: locust-worker
27 | template:
28 | metadata:
29 | labels:
30 | app: locust-worker
31 | spec:
32 | tolerations:
33 | - key: group
34 | operator: Equal
35 | value: "locust"
36 | effect: NoSchedule
37 | nodeSelector:
38 | group: "locust"
39 | containers:
40 | - name: locust-worker
41 | image: load-test-image
42 | env:
43 | - name: LOCUST_MODE
44 | value: worker
45 | - name: LOCUST_MASTER
46 | value: locust-master
47 | resources:
48 | requests:
49 | cpu: 250m
50 | memory: 500Mi
51 | limits:
52 | memory: 500Mi
Check: CKV_K8S_29: "Apply security context to your pods and containers"
FAILED for resource: Deployment.locust.locust-worker
File: /blueprints/gke/autopilot/bundle/locust/workers.yaml:15-52
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/ensure-securitycontext-is-applied-to-pods-and-containers.html
15 | apiVersion: "apps/v1"
16 | kind: "Deployment"
17 | metadata:
18 | name: locust-worker
19 | namespace: locust
20 | labels:
21 | name: locust-worker
22 | spec:
23 | replicas: 5
24 | selector:
25 | matchLabels:
26 | app: locust-worker
27 | template:
28 | metadata:
29 | labels:
30 | app: locust-worker
31 | spec:
32 | tolerations:
33 | - key: group
34 | operator: Equal
35 | value: "locust"
36 | effect: NoSchedule
37 | nodeSelector:
38 | group: "locust"
39 | containers:
40 | - name: locust-worker
41 | image: load-test-image
42 | env:
43 | - name: LOCUST_MODE
44 | value: worker
45 | - name: LOCUST_MASTER
46 | value: locust-master
47 | resources:
48 | requests:
49 | cpu: 250m
50 | memory: 500Mi
51 | limits:
52 | memory: 500Mi
Check: CKV_K8S_9: "Readiness Probe Should be Configured"
FAILED for resource: Deployment.locust.locust-worker
File: /blueprints/gke/autopilot/bundle/locust/workers.yaml:15-52
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-8.html
15 | apiVersion: "apps/v1"
16 | kind: "Deployment"
17 | metadata:
18 | name: locust-worker
19 | namespace: locust
20 | labels:
21 | name: locust-worker
22 | spec:
23 | replicas: 5
24 | selector:
25 | matchLabels:
26 | app: locust-worker
27 | template:
28 | metadata:
29 | labels:
30 | app: locust-worker
31 | spec:
32 | tolerations:
33 | - key: group
34 | operator: Equal
35 | value: "locust"
36 | effect: NoSchedule
37 | nodeSelector:
38 | group: "locust"
39 | containers:
40 | - name: locust-worker
41 | image: load-test-image
42 | env:
43 | - name: LOCUST_MODE
44 | value: worker
45 | - name: LOCUST_MASTER
46 | value: locust-master
47 | resources:
48 | requests:
49 | cpu: 250m
50 | memory: 500Mi
51 | limits:
52 | memory: 500Mi
Check: CKV_K8S_22: "Use read-only filesystem for containers where possible"
FAILED for resource: Deployment.locust.locust-worker
File: /blueprints/gke/autopilot/bundle/locust/workers.yaml:15-52
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-21.html
15 | apiVersion: "apps/v1"
16 | kind: "Deployment"
17 | metadata:
18 | name: locust-worker
19 | namespace: locust
20 | labels:
21 | name: locust-worker
22 | spec:
23 | replicas: 5
24 | selector:
25 | matchLabels:
26 | app: locust-worker
27 | template:
28 | metadata:
29 | labels:
30 | app: locust-worker
31 | spec:
32 | tolerations:
33 | - key: group
34 | operator: Equal
35 | value: "locust"
36 | effect: NoSchedule
37 | nodeSelector:
38 | group: "locust"
39 | containers:
40 | - name: locust-worker
41 | image: load-test-image
42 | env:
43 | - name: LOCUST_MODE
44 | value: worker
45 | - name: LOCUST_MASTER
46 | value: locust-master
47 | resources:
48 | requests:
49 | cpu: 250m
50 | memory: 500Mi
51 | limits:
52 | memory: 500Mi
Check: CKV_K8S_43: "Image should use digest"
FAILED for resource: Deployment.locust.locust-worker
File: /blueprints/gke/autopilot/bundle/locust/workers.yaml:15-52
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-39.html
15 | apiVersion: "apps/v1"
16 | kind: "Deployment"
17 | metadata:
18 | name: locust-worker
19 | namespace: locust
20 | labels:
21 | name: locust-worker
22 | spec:
23 | replicas: 5
24 | selector:
25 | matchLabels:
26 | app: locust-worker
27 | template:
28 | metadata:
29 | labels:
30 | app: locust-worker
31 | spec:
32 | tolerations:
33 | - key: group
34 | operator: Equal
35 | value: "locust"
36 | effect: NoSchedule
37 | nodeSelector:
38 | group: "locust"
39 | containers:
40 | - name: locust-worker
41 | image: load-test-image
42 | env:
43 | - name: LOCUST_MODE
44 | value: worker
45 | - name: LOCUST_MASTER
46 | value: locust-master
47 | resources:
48 | requests:
49 | cpu: 250m
50 | memory: 500Mi
51 | limits:
52 | memory: 500Mi
Check: CKV_K8S_23: "Minimize the admission of root containers"
FAILED for resource: Deployment.locust.locust-worker
File: /blueprints/gke/autopilot/bundle/locust/workers.yaml:15-52
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-22.html
15 | apiVersion: "apps/v1"
16 | kind: "Deployment"
17 | metadata:
18 | name: locust-worker
19 | namespace: locust
20 | labels:
21 | name: locust-worker
22 | spec:
23 | replicas: 5
24 | selector:
25 | matchLabels:
26 | app: locust-worker
27 | template:
28 | metadata:
29 | labels:
30 | app: locust-worker
31 | spec:
32 | tolerations:
33 | - key: group
34 | operator: Equal
35 | value: "locust"
36 | effect: NoSchedule
37 | nodeSelector:
38 | group: "locust"
39 | containers:
40 | - name: locust-worker
41 | image: load-test-image
42 | env:
43 | - name: LOCUST_MODE
44 | value: worker
45 | - name: LOCUST_MASTER
46 | value: locust-master
47 | resources:
48 | requests:
49 | cpu: 250m
50 | memory: 500Mi
51 | limits:
52 | memory: 500Mi
Check: CKV_K8S_8: "Liveness Probe Should be Configured"
FAILED for resource: Deployment.locust.locust-worker
File: /blueprints/gke/autopilot/bundle/locust/workers.yaml:15-52
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-7.html
15 | apiVersion: "apps/v1"
16 | kind: "Deployment"
17 | metadata:
18 | name: locust-worker
19 | namespace: locust
20 | labels:
21 | name: locust-worker
22 | spec:
23 | replicas: 5
24 | selector:
25 | matchLabels:
26 | app: locust-worker
27 | template:
28 | metadata:
29 | labels:
30 | app: locust-worker
31 | spec:
32 | tolerations:
33 | - key: group
34 | operator: Equal
35 | value: "locust"
36 | effect: NoSchedule
37 | nodeSelector:
38 | group: "locust"
39 | containers:
40 | - name: locust-worker
41 | image: load-test-image
42 | env:
43 | - name: LOCUST_MODE
44 | value: worker
45 | - name: LOCUST_MASTER
46 | value: locust-master
47 | resources:
48 | requests:
49 | cpu: 250m
50 | memory: 500Mi
51 | limits:
52 | memory: 500Mi
Check: CKV_K8S_40: "Containers should run as a high UID to avoid host conflict"
FAILED for resource: Deployment.locust.locust-worker
File: /blueprints/gke/autopilot/bundle/locust/workers.yaml:15-52
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-37.html
15 | apiVersion: "apps/v1"
16 | kind: "Deployment"
17 | metadata:
18 | name: locust-worker
19 | namespace: locust
20 | labels:
21 | name: locust-worker
22 | spec:
23 | replicas: 5
24 | selector:
25 | matchLabels:
26 | app: locust-worker
27 | template:
28 | metadata:
29 | labels:
30 | app: locust-worker
31 | spec:
32 | tolerations:
33 | - key: group
34 | operator: Equal
35 | value: "locust"
36 | effect: NoSchedule
37 | nodeSelector:
38 | group: "locust"
39 | containers:
40 | - name: locust-worker
41 | image: load-test-image
42 | env:
43 | - name: LOCUST_MODE
44 | value: worker
45 | - name: LOCUST_MASTER
46 | value: locust-master
47 | resources:
48 | requests:
49 | cpu: 250m
50 | memory: 500Mi
51 | limits:
52 | memory: 500Mi
Check: CKV_K8S_20: "Containers should not run with allowPrivilegeEscalation"
FAILED for resource: Deployment.locust.locust-worker
File: /blueprints/gke/autopilot/bundle/locust/workers.yaml:15-52
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-19.html
15 | apiVersion: "apps/v1"
16 | kind: "Deployment"
17 | metadata:
18 | name: locust-worker
19 | namespace: locust
20 | labels:
21 | name: locust-worker
22 | spec:
23 | replicas: 5
24 | selector:
25 | matchLabels:
26 | app: locust-worker
27 | template:
28 | metadata:
29 | labels:
30 | app: locust-worker
31 | spec:
32 | tolerations:
33 | - key: group
34 | operator: Equal
35 | value: "locust"
36 | effect: NoSchedule
37 | nodeSelector:
38 | group: "locust"
39 | containers:
40 | - name: locust-worker
41 | image: load-test-image
42 | env:
43 | - name: LOCUST_MODE
44 | value: worker
45 | - name: LOCUST_MASTER
46 | value: locust-master
47 | resources:
48 | requests:
49 | cpu: 250m
50 | memory: 500Mi
51 | limits:
52 | memory: 500Mi
Check: CKV_K8S_28: "Minimize the admission of containers with the NET_RAW capability"
FAILED for resource: Deployment.locust.locust-worker
File: /blueprints/gke/autopilot/bundle/locust/workers.yaml:15-52
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-27.html
15 | apiVersion: "apps/v1"
16 | kind: "Deployment"
17 | metadata:
18 | name: locust-worker
19 | namespace: locust
20 | labels:
21 | name: locust-worker
22 | spec:
23 | replicas: 5
24 | selector:
25 | matchLabels:
26 | app: locust-worker
27 | template:
28 | metadata:
29 | labels:
30 | app: locust-worker
31 | spec:
32 | tolerations:
33 | - key: group
34 | operator: Equal
35 | value: "locust"
36 | effect: NoSchedule
37 | nodeSelector:
38 | group: "locust"
39 | containers:
40 | - name: locust-worker
41 | image: load-test-image
42 | env:
43 | - name: LOCUST_MODE
44 | value: worker
45 | - name: LOCUST_MASTER
46 | value: locust-master
47 | resources:
48 | requests:
49 | cpu: 250m
50 | memory: 500Mi
51 | limits:
52 | memory: 500Mi
Check: CKV_K8S_37: "Minimize the admission of containers with capabilities assigned"
FAILED for resource: Deployment.locust.locust-worker
File: /blueprints/gke/autopilot/bundle/locust/workers.yaml:15-52
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-34.html
15 | apiVersion: "apps/v1"
16 | kind: "Deployment"
17 | metadata:
18 | name: locust-worker
19 | namespace: locust
20 | labels:
21 | name: locust-worker
22 | spec:
23 | replicas: 5
24 | selector:
25 | matchLabels:
26 | app: locust-worker
27 | template:
28 | metadata:
29 | labels:
30 | app: locust-worker
31 | spec:
32 | tolerations:
33 | - key: group
34 | operator: Equal
35 | value: "locust"
36 | effect: NoSchedule
37 | nodeSelector:
38 | group: "locust"
39 | containers:
40 | - name: locust-worker
41 | image: load-test-image
42 | env:
43 | - name: LOCUST_MODE
44 | value: worker
45 | - name: LOCUST_MASTER
46 | value: locust-master
47 | resources:
48 | requests:
49 | cpu: 250m
50 | memory: 500Mi
51 | limits:
52 | memory: 500Mi
Check: CKV_K8S_14: "Image Tag should be fixed - not latest or blank"
FAILED for resource: Deployment.locust.locust-worker
File: /blueprints/gke/autopilot/bundle/locust/workers.yaml:15-52
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-13.html
15 | apiVersion: "apps/v1"
16 | kind: "Deployment"
17 | metadata:
18 | name: locust-worker
19 | namespace: locust
20 | labels:
21 | name: locust-worker
22 | spec:
23 | replicas: 5
24 | selector:
25 | matchLabels:
26 | app: locust-worker
27 | template:
28 | metadata:
29 | labels:
30 | app: locust-worker
31 | spec:
32 | tolerations:
33 | - key: group
34 | operator: Equal
35 | value: "locust"
36 | effect: NoSchedule
37 | nodeSelector:
38 | group: "locust"
39 | containers:
40 | - name: locust-worker
41 | image: load-test-image
42 | env:
43 | - name: LOCUST_MODE
44 | value: worker
45 | - name: LOCUST_MASTER
46 | value: locust-master
47 | resources:
48 | requests:
49 | cpu: 250m
50 | memory: 500Mi
51 | limits:
52 | memory: 500Mi
Check: CKV_K8S_38: "Ensure that Service Account Tokens are only mounted where necessary"
FAILED for resource: Deployment.locust.locust-worker
File: /blueprints/gke/autopilot/bundle/locust/workers.yaml:15-52
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-35.html
15 | apiVersion: "apps/v1"
16 | kind: "Deployment"
17 | metadata:
18 | name: locust-worker
19 | namespace: locust
20 | labels:
21 | name: locust-worker
22 | spec:
23 | replicas: 5
24 | selector:
25 | matchLabels:
26 | app: locust-worker
27 | template:
28 | metadata:
29 | labels:
30 | app: locust-worker
31 | spec:
32 | tolerations:
33 | - key: group
34 | operator: Equal
35 | value: "locust"
36 | effect: NoSchedule
37 | nodeSelector:
38 | group: "locust"
39 | containers:
40 | - name: locust-worker
41 | image: load-test-image
42 | env:
43 | - name: LOCUST_MODE
44 | value: worker
45 | - name: LOCUST_MASTER
46 | value: locust-master
47 | resources:
48 | requests:
49 | cpu: 250m
50 | memory: 500Mi
51 | limits:
52 | memory: 500Mi
Check: CKV_K8S_11: "CPU limits should be set"
FAILED for resource: Deployment.locust.locust-master
File: /blueprints/gke/autopilot/bundle/locust/master.yaml:15-72
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-10.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_K8S_31: "Ensure that the seccomp profile is set to docker/default or runtime/default"
FAILED for resource: Deployment.locust.locust-master
File: /blueprints/gke/autopilot/bundle/locust/master.yaml:15-72
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-29.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_K8S_30: "Apply security context to your containers"
FAILED for resource: Deployment.locust.locust-master
File: /blueprints/gke/autopilot/bundle/locust/master.yaml:15-72
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-28.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_K8S_29: "Apply security context to your pods and containers"
FAILED for resource: Deployment.locust.locust-master
File: /blueprints/gke/autopilot/bundle/locust/master.yaml:15-72
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/ensure-securitycontext-is-applied-to-pods-and-containers.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_K8S_9: "Readiness Probe Should be Configured"
FAILED for resource: Deployment.locust.locust-master
File: /blueprints/gke/autopilot/bundle/locust/master.yaml:15-72
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-8.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_K8S_22: "Use read-only filesystem for containers where possible"
FAILED for resource: Deployment.locust.locust-master
File: /blueprints/gke/autopilot/bundle/locust/master.yaml:15-72
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-21.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_K8S_43: "Image should use digest"
FAILED for resource: Deployment.locust.locust-master
File: /blueprints/gke/autopilot/bundle/locust/master.yaml:15-72
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-39.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_K8S_23: "Minimize the admission of root containers"
FAILED for resource: Deployment.locust.locust-master
File: /blueprints/gke/autopilot/bundle/locust/master.yaml:15-72
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-22.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_K8S_8: "Liveness Probe Should be Configured"
FAILED for resource: Deployment.locust.locust-master
File: /blueprints/gke/autopilot/bundle/locust/master.yaml:15-72
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-7.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_K8S_40: "Containers should run as a high UID to avoid host conflict"
FAILED for resource: Deployment.locust.locust-master
File: /blueprints/gke/autopilot/bundle/locust/master.yaml:15-72
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-37.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_K8S_20: "Containers should not run with allowPrivilegeEscalation"
FAILED for resource: Deployment.locust.locust-master
File: /blueprints/gke/autopilot/bundle/locust/master.yaml:15-72
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-19.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_K8S_28: "Minimize the admission of containers with the NET_RAW capability"
FAILED for resource: Deployment.locust.locust-master
File: /blueprints/gke/autopilot/bundle/locust/master.yaml:15-72
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-27.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_K8S_37: "Minimize the admission of containers with capabilities assigned"
FAILED for resource: Deployment.locust.locust-master
File: /blueprints/gke/autopilot/bundle/locust/master.yaml:15-72
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-34.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_K8S_14: "Image Tag should be fixed - not latest or blank"
FAILED for resource: Deployment.locust.locust-master
File: /blueprints/gke/autopilot/bundle/locust/master.yaml:15-72
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-13.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_K8S_38: "Ensure that Service Account Tokens are only mounted where necessary"
FAILED for resource: Deployment.locust.locust-master
File: /blueprints/gke/autopilot/bundle/locust/master.yaml:15-72
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-35.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_K8S_11: "CPU limits should be set"
FAILED for resource: Deployment.sample.nginx
File: /blueprints/gke/autopilot/bundle/app/nginx.yaml:39-97
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-10.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_K8S_31: "Ensure that the seccomp profile is set to docker/default or runtime/default"
FAILED for resource: Deployment.sample.nginx
File: /blueprints/gke/autopilot/bundle/app/nginx.yaml:39-97
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-29.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_K8S_30: "Apply security context to your containers"
FAILED for resource: Deployment.sample.nginx
File: /blueprints/gke/autopilot/bundle/app/nginx.yaml:39-97
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-28.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_K8S_29: "Apply security context to your pods and containers"
FAILED for resource: Deployment.sample.nginx
File: /blueprints/gke/autopilot/bundle/app/nginx.yaml:39-97
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/ensure-securitycontext-is-applied-to-pods-and-containers.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_K8S_9: "Readiness Probe Should be Configured"
FAILED for resource: Deployment.sample.nginx
File: /blueprints/gke/autopilot/bundle/app/nginx.yaml:39-97
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-8.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_K8S_22: "Use read-only filesystem for containers where possible"
FAILED for resource: Deployment.sample.nginx
File: /blueprints/gke/autopilot/bundle/app/nginx.yaml:39-97
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-21.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_K8S_43: "Image should use digest"
FAILED for resource: Deployment.sample.nginx
File: /blueprints/gke/autopilot/bundle/app/nginx.yaml:39-97
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-39.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_K8S_23: "Minimize the admission of root containers"
FAILED for resource: Deployment.sample.nginx
File: /blueprints/gke/autopilot/bundle/app/nginx.yaml:39-97
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-22.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_K8S_8: "Liveness Probe Should be Configured"
FAILED for resource: Deployment.sample.nginx
File: /blueprints/gke/autopilot/bundle/app/nginx.yaml:39-97
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-7.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_K8S_40: "Containers should run as a high UID to avoid host conflict"
FAILED for resource: Deployment.sample.nginx
File: /blueprints/gke/autopilot/bundle/app/nginx.yaml:39-97
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-37.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_K8S_20: "Containers should not run with allowPrivilegeEscalation"
FAILED for resource: Deployment.sample.nginx
File: /blueprints/gke/autopilot/bundle/app/nginx.yaml:39-97
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-19.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_K8S_28: "Minimize the admission of containers with the NET_RAW capability"
FAILED for resource: Deployment.sample.nginx
File: /blueprints/gke/autopilot/bundle/app/nginx.yaml:39-97
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-27.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_K8S_37: "Minimize the admission of containers with capabilities assigned"
FAILED for resource: Deployment.sample.nginx
File: /blueprints/gke/autopilot/bundle/app/nginx.yaml:39-97
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-34.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_K8S_15: "Image Pull Policy should be Always"
FAILED for resource: Deployment.sample.nginx
File: /blueprints/gke/autopilot/bundle/app/nginx.yaml:39-97
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-14.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_K8S_14: "Image Tag should be fixed - not latest or blank"
FAILED for resource: Deployment.sample.nginx
File: /blueprints/gke/autopilot/bundle/app/nginx.yaml:39-97
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-13.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_K8S_38: "Ensure that Service Account Tokens are only mounted where necessary"
FAILED for resource: Deployment.sample.nginx
File: /blueprints/gke/autopilot/bundle/app/nginx.yaml:39-97
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-35.html
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV2_K8S_5: "No ServiceAccount/Node should be able to read all secrets"
FAILED for resource: ClusterRoleBinding.default.external-metrics-reader
File: /blueprints/gke/autopilot/bundle/monitoring/custom-stackdriver-metrics-adapter.yaml:173-184
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/no-serviceaccountnode-should-be-able-to-read-all-secrets.html
173 | apiVersion: rbac.authorization.k8s.io/v1
174 | kind: ClusterRoleBinding
175 | metadata:
176 | name: external-metrics-reader
177 | roleRef:
178 | apiGroup: rbac.authorization.k8s.io
179 | kind: ClusterRole
180 | name: external-metrics-reader
181 | subjects:
182 | - kind: ServiceAccount
183 | name: horizontal-pod-autoscaler
184 | namespace: kube-system
Check: CKV2_K8S_6: "Minimize the admission of pods which lack an associated NetworkPolicy"
FAILED for resource: Pod.default.kube-state-metrics.app.kubernetes.io/name-kube-state-metrics.app.kubernetes.io/version-2.3.0
File: /blueprints/gke/autopilot/bundle/monitoring/kube-state-metrics.yaml:15-98
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV2_K8S_6: "Minimize the admission of pods which lack an associated NetworkPolicy"
FAILED for resource: Pod.default.custom-metrics-stackdriver-adapter.run-custom-metrics-stackdriver-adapter.k8s-app-custom-metrics-stackdriver-adapter.kubernetes.io/cluster-service-true
File: /blueprints/gke/autopilot/bundle/monitoring/custom-stackdriver-metrics-adapter.yaml:61-96
61 | apiVersion: apps/v1
62 | kind: Deployment
63 | metadata:
64 | name: custom-metrics-stackdriver-adapter
65 | namespace: monitoring
66 | labels:
67 | run: custom-metrics-stackdriver-adapter
68 | k8s-app: custom-metrics-stackdriver-adapter
69 | spec:
70 | replicas: 1
71 | selector:
72 | matchLabels:
73 | run: custom-metrics-stackdriver-adapter
74 | k8s-app: custom-metrics-stackdriver-adapter
75 | template:
76 | metadata:
77 | labels:
78 | run: custom-metrics-stackdriver-adapter
79 | k8s-app: custom-metrics-stackdriver-adapter
80 | kubernetes.io/cluster-service: "true"
81 | spec:
82 | serviceAccountName: custom-metrics-stackdriver-adapter
83 | containers:
84 | - image: gcr.io/gke-release/custom-metrics-stackdriver-adapter:v0.13.1-gke.0
85 | imagePullPolicy: Always
86 | name: pod-custom-metrics-stackdriver-adapter
87 | command:
88 | - /adapter
89 | - --use-new-resource-model=false
90 | resources:
91 | limits:
92 | cpu: 250m
93 | memory: 500Mi
94 | requests:
95 | memory: 500Mi
96 | ---
Check: CKV2_K8S_6: "Minimize the admission of pods which lack an associated NetworkPolicy"
FAILED for resource: Pod.default.grafana.app-grafana
File: /blueprints/gke/autopilot/bundle/monitoring/grafana.yaml:71-168
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV2_K8S_6: "Minimize the admission of pods which lack an associated NetworkPolicy"
FAILED for resource: Pod.default.frontend.app-frontend
File: /blueprints/gke/autopilot/bundle/monitoring/frontend.yaml:21-67
21 | apiVersion: apps/v1
22 | kind: Deployment
23 | metadata:
24 | name: frontend
25 | namespace: monitoring
26 | spec:
27 | replicas: 1
28 | selector:
29 | matchLabels:
30 | app: frontend
31 | template:
32 | metadata:
33 | labels:
34 | app: frontend
35 | spec:
36 | serviceAccountName: frontend
37 | tolerations:
38 | - key: group
39 | operator: Equal
40 | value: monitoring
41 | effect: NoSchedule
42 | nodeSelector:
43 | group: monitoring
44 | automountServiceAccountToken: true
45 | containers:
46 | - name: frontend
47 | image: "gke.gcr.io/prometheus-engine/frontend:v0.5.0-gke.0"
48 | args:
49 | - "--web.listen-address=:9090"
50 | ports:
51 | - name: web
52 | containerPort: 9090
53 | resources:
54 | requests:
55 | cpu: 250m
56 | memory: 500Mi
57 | limits:
58 | memory: 500Mi
59 | readinessProbe:
60 | httpGet:
61 | path: /-/ready
62 | port: web
63 | livenessProbe:
64 | httpGet:
65 | path: /-/healthy
66 | port: web
67 | ---
Check: CKV2_K8S_6: "Minimize the admission of pods which lack an associated NetworkPolicy"
FAILED for resource: Pod.default.locust-worker.app-locust-worker
File: /blueprints/gke/autopilot/bundle/locust/workers.yaml:15-52
15 | apiVersion: "apps/v1"
16 | kind: "Deployment"
17 | metadata:
18 | name: locust-worker
19 | namespace: locust
20 | labels:
21 | name: locust-worker
22 | spec:
23 | replicas: 5
24 | selector:
25 | matchLabels:
26 | app: locust-worker
27 | template:
28 | metadata:
29 | labels:
30 | app: locust-worker
31 | spec:
32 | tolerations:
33 | - key: group
34 | operator: Equal
35 | value: "locust"
36 | effect: NoSchedule
37 | nodeSelector:
38 | group: "locust"
39 | containers:
40 | - name: locust-worker
41 | image: load-test-image
42 | env:
43 | - name: LOCUST_MODE
44 | value: worker
45 | - name: LOCUST_MASTER
46 | value: locust-master
47 | resources:
48 | requests:
49 | cpu: 250m
50 | memory: 500Mi
51 | limits:
52 | memory: 500Mi
Check: CKV2_K8S_6: "Minimize the admission of pods which lack an associated NetworkPolicy"
FAILED for resource: Pod.default.locust-master.app-locust-master
File: /blueprints/gke/autopilot/bundle/locust/master.yaml:15-72
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV2_K8S_6: "Minimize the admission of pods which lack an associated NetworkPolicy"
FAILED for resource: Pod.default.nginx.app-nginx
File: /blueprints/gke/autopilot/bundle/app/nginx.yaml:39-97
Code lines for this resource are too many. Please use IDE of your choice to review the file.
dockerfile scan results:
Passed checks: 508, Failed checks: 21, Skipped checks: 0
Check: CKV_DOCKER_7: "Ensure the base image uses a non latest version tag"
FAILED for resource: /blueprints/networking/__need_fixing/nginx-reverse-proxy-cluster/Dockerfile.FROM
File: /blueprints/networking/__need_fixing/nginx-reverse-proxy-cluster/Dockerfile:14-14
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/docker-policies/docker-policy-index/ensure-the-base-image-uses-a-non-latest-version-tag.html
14 | FROM marketplace.gcr.io/google/debian11
Check: CKV_DOCKER_3: "Ensure that a user for the container has been created"
FAILED for resource: /blueprints/networking/__need_fixing/nginx-reverse-proxy-cluster/Dockerfile.
File: /blueprints/networking/__need_fixing/nginx-reverse-proxy-cluster/Dockerfile:1-28
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/docker-policies/docker-policy-index/ensure-that-a-user-for-the-container-has-been-created.html
1 | # Copyright 2022 Google LLC
2 | #
3 | # Licensed under the Apache License, Version 2.0 (the "License");
4 | # you may not use this file except in compliance with the License.
5 | # You may obtain a copy of the License at
6 | #
7 | # http://www.apache.org/licenses/LICENSE-2.0
8 | #
9 | # Unless required by applicable law or agreed to in writing, software
10 | # distributed under the License is distributed on an "AS IS" BASIS,
11 | # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 | # See the License for the specific language governing permissions and
13 | # limitations under the License.
14 | FROM marketplace.gcr.io/google/debian11
15 |
16 | RUN apt-get update && apt-get dist-upgrade -y && apt-get install -y curl gnupg2
17 | RUN curl -sSO https://dl.google.com/cloudagents/add-google-cloud-ops-agent-repo.sh
18 | RUN bash add-google-cloud-ops-agent-repo.sh --also-install
19 | RUN rm -f add-google-cloud-ops-agent-repo.sh
20 |
21 | RUN echo '#!/bin/bash' > /entrypoint.sh
22 | RUN echo 'cd /tmp' >> /entrypoint.sh
23 | RUN echo '/opt/google-cloud-ops-agent/libexec/google_cloud_ops_agent_engine -service=otel -in /etc/google-cloud-ops-agent/config.yaml' >> /entrypoint.sh
24 | RUN echo '/opt/google-cloud-ops-agent/subagents/opentelemetry-collector/otelopscol --config=/tmp/otel.yaml --feature-gates=exporter.googlecloud.OTLPDirect' >> /entrypoint.sh
25 | RUN chmod +x /entrypoint.sh
26 |
27 | ENTRYPOINT /entrypoint.sh
28 | CMD []
Check: CKV_DOCKER_2: "Ensure that HEALTHCHECK instructions have been added to container images"
FAILED for resource: /blueprints/networking/__need_fixing/nginx-reverse-proxy-cluster/Dockerfile.
File: /blueprints/networking/__need_fixing/nginx-reverse-proxy-cluster/Dockerfile:1-28
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/docker-policies/docker-policy-index/ensure-that-healthcheck-instructions-have-been-added-to-container-images.html
1 | # Copyright 2022 Google LLC
2 | #
3 | # Licensed under the Apache License, Version 2.0 (the "License");
4 | # you may not use this file except in compliance with the License.
5 | # You may obtain a copy of the License at
6 | #
7 | # http://www.apache.org/licenses/LICENSE-2.0
8 | #
9 | # Unless required by applicable law or agreed to in writing, software
10 | # distributed under the License is distributed on an "AS IS" BASIS,
11 | # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 | # See the License for the specific language governing permissions and
13 | # limitations under the License.
14 | FROM marketplace.gcr.io/google/debian11
15 |
16 | RUN apt-get update && apt-get dist-upgrade -y && apt-get install -y curl gnupg2
17 | RUN curl -sSO https://dl.google.com/cloudagents/add-google-cloud-ops-agent-repo.sh
18 | RUN bash add-google-cloud-ops-agent-repo.sh --also-install
19 | RUN rm -f add-google-cloud-ops-agent-repo.sh
20 |
21 | RUN echo '#!/bin/bash' > /entrypoint.sh
22 | RUN echo 'cd /tmp' >> /entrypoint.sh
23 | RUN echo '/opt/google-cloud-ops-agent/libexec/google_cloud_ops_agent_engine -service=otel -in /etc/google-cloud-ops-agent/config.yaml' >> /entrypoint.sh
24 | RUN echo '/opt/google-cloud-ops-agent/subagents/opentelemetry-collector/otelopscol --config=/tmp/otel.yaml --feature-gates=exporter.googlecloud.OTLPDirect' >> /entrypoint.sh
25 | RUN chmod +x /entrypoint.sh
26 |
27 | ENTRYPOINT /entrypoint.sh
28 | CMD []
Check: CKV_DOCKER_4: "Ensure that COPY is used instead of ADD in Dockerfiles"
FAILED for resource: /blueprints/gke/autopilot/bundle/locust/image/Dockerfile.ADD
File: /blueprints/gke/autopilot/bundle/locust/image/Dockerfile:17-17
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/docker-policies/docker-policy-index/ensure-that-copy-is-used-instead-of-add-in-dockerfiles.html
17 | ADD locust-files /home/locust/locust-files
Check: CKV_DOCKER_4: "Ensure that COPY is used instead of ADD in Dockerfiles"
FAILED for resource: /blueprints/gke/autopilot/bundle/locust/image/Dockerfile.ADD
File: /blueprints/gke/autopilot/bundle/locust/image/Dockerfile:19-19
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/docker-policies/docker-policy-index/ensure-that-copy-is-used-instead-of-add-in-dockerfiles.html
19 | ADD run.sh /home/locust/run.sh
Check: CKV_DOCKER_7: "Ensure the base image uses a non latest version tag"
FAILED for resource: /blueprints/gke/autopilot/bundle/locust/image/Dockerfile.FROM
File: /blueprints/gke/autopilot/bundle/locust/image/Dockerfile:15-15
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/docker-policies/docker-policy-index/ensure-the-base-image-uses-a-non-latest-version-tag.html
15 | FROM locustio/locust:latest
Check: CKV_DOCKER_3: "Ensure that a user for the container has been created"
FAILED for resource: /blueprints/gke/autopilot/bundle/locust/image/Dockerfile.
File: /blueprints/gke/autopilot/bundle/locust/image/Dockerfile:1-21
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/docker-policies/docker-policy-index/ensure-that-a-user-for-the-container-has-been-created.html
1 | # Copyright 2023 Google LLC
2 | #
3 | # Licensed under the Apache License, Version 2.0 (the "License");
4 | # you may not use this file except in compliance with the License.
5 | # You may obtain a copy of the License at
6 | #
7 | # https://www.apache.org/licenses/LICENSE-2.0
8 | #
9 | # Unless required by applicable law or agreed to in writing, software
10 | # distributed under the License is distributed on an "AS IS" BASIS,
11 | # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 | # See the License for the specific language governing permissions and
13 | # limitations under the License.
14 |
15 | FROM locustio/locust:latest
16 |
17 | ADD locust-files /home/locust/locust-files
18 |
19 | ADD run.sh /home/locust/run.sh
20 |
21 | ENTRYPOINT ["/home/locust/run.sh"]
Check: CKV_DOCKER_2: "Ensure that HEALTHCHECK instructions have been added to container images"
FAILED for resource: /blueprints/gke/autopilot/bundle/locust/image/Dockerfile.
File: /blueprints/gke/autopilot/bundle/locust/image/Dockerfile:1-21
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/docker-policies/docker-policy-index/ensure-that-healthcheck-instructions-have-been-added-to-container-images.html
1 | # Copyright 2023 Google LLC
2 | #
3 | # Licensed under the Apache License, Version 2.0 (the "License");
4 | # you may not use this file except in compliance with the License.
5 | # You may obtain a copy of the License at
6 | #
7 | # https://www.apache.org/licenses/LICENSE-2.0
8 | #
9 | # Unless required by applicable law or agreed to in writing, software
10 | # distributed under the License is distributed on an "AS IS" BASIS,
11 | # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 | # See the License for the specific language governing permissions and
13 | # limitations under the License.
14 |
15 | FROM locustio/locust:latest
16 |
17 | ADD locust-files /home/locust/locust-files
18 |
19 | ADD run.sh /home/locust/run.sh
20 |
21 | ENTRYPOINT ["/home/locust/run.sh"]
Check: CKV_DOCKER_7: "Ensure the base image uses a non latest version tag"
FAILED for resource: /blueprints/data-solutions/data-platform-foundations/demo/dataflow-csv2bq/Dockerfile.FROM
File: /blueprints/data-solutions/data-platform-foundations/demo/dataflow-csv2bq/Dockerfile:15-15
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/docker-policies/docker-policy-index/ensure-the-base-image-uses-a-non-latest-version-tag.html
15 | FROM gcr.io/dataflow-templates-base/python39-template-launcher-base
Check: CKV_DOCKER_3: "Ensure that a user for the container has been created"
FAILED for resource: /blueprints/data-solutions/data-platform-foundations/demo/dataflow-csv2bq/Dockerfile.
File: /blueprints/data-solutions/data-platform-foundations/demo/dataflow-csv2bq/Dockerfile:1-29
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/docker-policies/docker-policy-index/ensure-that-a-user-for-the-container-has-been-created.html
1 | # Copyright 2023 Google LLC
2 | #
3 | # Licensed under the Apache License, Version 2.0 (the "License");
4 | # you may not use this file except in compliance with the License.
5 | # You may obtain a copy of the License at
6 | #
7 | # https://www.apache.org/licenses/LICENSE-2.0
8 | #
9 | # Unless required by applicable law or agreed to in writing, software
10 | # distributed under the License is distributed on an "AS IS" BASIS,
11 | # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 | # See the License for the specific language governing permissions and
13 | # limitations under the License.
14 |
15 | FROM gcr.io/dataflow-templates-base/python39-template-launcher-base
16 |
17 | ENV FLEX_TEMPLATE_PYTHON_REQUIREMENTS_FILE="/template/requirements.txt"
18 | ENV FLEX_TEMPLATE_PYTHON_PY_FILE="/template/csv2bq.py"
19 |
20 | COPY ./src/ /template
21 |
22 | RUN apt-get update \
23 | && apt-get install -y libffi-dev git \
24 | && rm -rf /var/lib/apt/lists/* \
25 | && pip install --no-cache-dir --upgrade pip \
26 | && pip install --no-cache-dir -r $FLEX_TEMPLATE_PYTHON_REQUIREMENTS_FILE \
27 | && pip download --no-cache-dir --dest /tmp/dataflow-requirements-cache -r $FLEX_TEMPLATE_PYTHON_REQUIREMENTS_FILE
28 |
29 | ENV PIP_NO_DEPS=True
Check: CKV_DOCKER_2: "Ensure that HEALTHCHECK instructions have been added to container images"
FAILED for resource: /blueprints/data-solutions/data-platform-foundations/demo/dataflow-csv2bq/Dockerfile.
File: /blueprints/data-solutions/data-platform-foundations/demo/dataflow-csv2bq/Dockerfile:1-29
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/docker-policies/docker-policy-index/ensure-that-healthcheck-instructions-have-been-added-to-container-images.html
1 | # Copyright 2023 Google LLC
2 | #
3 | # Licensed under the Apache License, Version 2.0 (the "License");
4 | # you may not use this file except in compliance with the License.
5 | # You may obtain a copy of the License at
6 | #
7 | # https://www.apache.org/licenses/LICENSE-2.0
8 | #
9 | # Unless required by applicable law or agreed to in writing, software
10 | # distributed under the License is distributed on an "AS IS" BASIS,
11 | # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 | # See the License for the specific language governing permissions and
13 | # limitations under the License.
14 |
15 | FROM gcr.io/dataflow-templates-base/python39-template-launcher-base
16 |
17 | ENV FLEX_TEMPLATE_PYTHON_REQUIREMENTS_FILE="/template/requirements.txt"
18 | ENV FLEX_TEMPLATE_PYTHON_PY_FILE="/template/csv2bq.py"
19 |
20 | COPY ./src/ /template
21 |
22 | RUN apt-get update \
23 | && apt-get install -y libffi-dev git \
24 | && rm -rf /var/lib/apt/lists/* \
25 | && pip install --no-cache-dir --upgrade pip \
26 | && pip install --no-cache-dir -r $FLEX_TEMPLATE_PYTHON_REQUIREMENTS_FILE \
27 | && pip download --no-cache-dir --dest /tmp/dataflow-requirements-cache -r $FLEX_TEMPLATE_PYTHON_REQUIREMENTS_FILE
28 |
29 | ENV PIP_NO_DEPS=True
Check: CKV_DOCKER_3: "Ensure that a user for the container has been created"
FAILED for resource: /blueprints/networking/decentralized-firewall/validator/Dockerfile.
File: /blueprints/networking/decentralized-firewall/validator/Dockerfile:1-29
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/docker-policies/docker-policy-index/ensure-that-a-user-for-the-container-has-been-created.html
1 | # Copyright 2022 Google LLC
2 | #
3 | # Licensed under the Apache License, Version 2.0 (the "License");
4 | # you may not use this file except in compliance with the License.
5 | # You may obtain a copy of the License at
6 | #
7 | # https://www.apache.org/licenses/LICENSE-2.0
8 | #
9 | # Unless required by applicable law or agreed to in writing, software
10 | # distributed under the License is distributed on an "AS IS" BASIS,
11 | # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 | # See the License for the specific language governing permissions and
13 | # limitations under the License.
14 | FROM python:3.9-slim
15 |
16 | RUN mkdir /validator
17 | COPY requirements.txt /validator/requirements.txt
18 | RUN pip install -r /validator/requirements.txt
19 | COPY validator.py /validator/validator.py
20 |
21 | RUN mkdir /schemas
22 | COPY firewallSchema.yaml /schemas/firewallSchema.yaml
23 | COPY firewallSchemaAutoApprove.yaml /schemas/firewallAutoApprove.yaml
24 | COPY firewallSchemaSettings.yaml /schemas/firewallSchemaSettings.yaml
25 |
26 | RUN mkdir /rules
27 |
28 | CMD ["/rules/**/*.yaml"]
29 | ENTRYPOINT ["python3", "/validator/validator.py"]
Check: CKV_DOCKER_2: "Ensure that HEALTHCHECK instructions have been added to container images"
FAILED for resource: /blueprints/networking/decentralized-firewall/validator/Dockerfile.
File: /blueprints/networking/decentralized-firewall/validator/Dockerfile:1-29
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/docker-policies/docker-policy-index/ensure-that-healthcheck-instructions-have-been-added-to-container-images.html
1 | # Copyright 2022 Google LLC
2 | #
3 | # Licensed under the Apache License, Version 2.0 (the "License");
4 | # you may not use this file except in compliance with the License.
5 | # You may obtain a copy of the License at
6 | #
7 | # https://www.apache.org/licenses/LICENSE-2.0
8 | #
9 | # Unless required by applicable law or agreed to in writing, software
10 | # distributed under the License is distributed on an "AS IS" BASIS,
11 | # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 | # See the License for the specific language governing permissions and
13 | # limitations under the License.
14 | FROM python:3.9-slim
15 |
16 | RUN mkdir /validator
17 | COPY requirements.txt /validator/requirements.txt
18 | RUN pip install -r /validator/requirements.txt
19 | COPY validator.py /validator/validator.py
20 |
21 | RUN mkdir /schemas
22 | COPY firewallSchema.yaml /schemas/firewallSchema.yaml
23 | COPY firewallSchemaAutoApprove.yaml /schemas/firewallAutoApprove.yaml
24 | COPY firewallSchemaSettings.yaml /schemas/firewallSchemaSettings.yaml
25 |
26 | RUN mkdir /rules
27 |
28 | CMD ["/rules/**/*.yaml"]
29 | ENTRYPOINT ["python3", "/validator/validator.py"]
Check: CKV_DOCKER_3: "Ensure that a user for the container has been created"
FAILED for resource: /modules/cloud-config-container/__need_fixing/onprem/docker-images/toolbox/Dockerfile.
File: /modules/cloud-config-container/__need_fixing/onprem/docker-images/toolbox/Dockerfile:1-30
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/docker-policies/docker-policy-index/ensure-that-a-user-for-the-container-has-been-created.html
1 | # Copyright 2022 Google LLC
2 | #
3 | # Licensed under the Apache License, Version 2.0 (the "License");
4 | # you may not use this file except in compliance with the License.
5 | # You may obtain a copy of the License at
6 | #
7 | # https://www.apache.org/licenses/LICENSE-2.0
8 | #
9 | # Unless required by applicable law or agreed to in writing, software
10 | # distributed under the License is distributed on an "AS IS" BASIS,
11 | # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 | # See the License for the specific language governing permissions and
13 | # limitations under the License.
14 |
15 |
16 | FROM google/cloud-sdk:alpine
17 |
18 | COPY entrypoint.sh /entrypoint.sh
19 | RUN chmod 0755 /entrypoint.sh
20 |
21 | RUN apk update && \
22 | apk add bash curl bind-tools busybox-extras netcat-openbsd && \
23 | rm /var/cache/apk/*
24 |
25 | RUN curl -LO https://storage.googleapis.com/kubernetes-release/release/`curl -s https://storage.googleapis.com/kubernetes-release/release/stable.txt`/bin/linux/amd64/kubectl && \
26 | chmod 755 kubectl && mv kubectl /usr/local/bin/
27 |
28 | CMD ["/bin/bash"]
29 |
30 | ENTRYPOINT ["/entrypoint.sh"]
Check: CKV_DOCKER_2: "Ensure that HEALTHCHECK instructions have been added to container images"
FAILED for resource: /modules/cloud-config-container/__need_fixing/onprem/docker-images/toolbox/Dockerfile.
File: /modules/cloud-config-container/__need_fixing/onprem/docker-images/toolbox/Dockerfile:1-30
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/docker-policies/docker-policy-index/ensure-that-healthcheck-instructions-have-been-added-to-container-images.html
1 | # Copyright 2022 Google LLC
2 | #
3 | # Licensed under the Apache License, Version 2.0 (the "License");
4 | # you may not use this file except in compliance with the License.
5 | # You may obtain a copy of the License at
6 | #
7 | # https://www.apache.org/licenses/LICENSE-2.0
8 | #
9 | # Unless required by applicable law or agreed to in writing, software
10 | # distributed under the License is distributed on an "AS IS" BASIS,
11 | # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 | # See the License for the specific language governing permissions and
13 | # limitations under the License.
14 |
15 |
16 | FROM google/cloud-sdk:alpine
17 |
18 | COPY entrypoint.sh /entrypoint.sh
19 | RUN chmod 0755 /entrypoint.sh
20 |
21 | RUN apk update && \
22 | apk add bash curl bind-tools busybox-extras netcat-openbsd && \
23 | rm /var/cache/apk/*
24 |
25 | RUN curl -LO https://storage.googleapis.com/kubernetes-release/release/`curl -s https://storage.googleapis.com/kubernetes-release/release/stable.txt`/bin/linux/amd64/kubectl && \
26 | chmod 755 kubectl && mv kubectl /usr/local/bin/
27 |
28 | CMD ["/bin/bash"]
29 |
30 | ENTRYPOINT ["/entrypoint.sh"]
Check: CKV_DOCKER_3: "Ensure that a user for the container has been created"
FAILED for resource: /modules/cloud-config-container/__need_fixing/onprem/docker-images/strongswan/Dockerfile.
File: /modules/cloud-config-container/__need_fixing/onprem/docker-images/strongswan/Dockerfile:1-37
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/docker-policies/docker-policy-index/ensure-that-a-user-for-the-container-has-been-created.html
1 | # Copyright 2022 Google LLC
2 | #
3 | # Licensed under the Apache License, Version 2.0 (the "License");
4 | # you may not use this file except in compliance with the License.
5 | # You may obtain a copy of the License at
6 | #
7 | # https://www.apache.org/licenses/LICENSE-2.0
8 | #
9 | # Unless required by applicable law or agreed to in writing, software
10 | # distributed under the License is distributed on an "AS IS" BASIS,
11 | # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 | # See the License for the specific language governing permissions and
13 | # limitations under the License.
14 |
15 | FROM debian:bullseye-slim
16 |
17 | ENV STRONGSWAN_VERSION=5.9
18 |
19 | RUN apt-get update \
20 | && DEBIAN_FRONTEND=noninteractive apt-get install -y sudo iptables procps strongswan=${STRONGSWAN_VERSION}* \
21 | && rm -rf /var/lib/apt/lists/*
22 |
23 | COPY entrypoint.sh /entrypoint.sh
24 | RUN chmod 0755 /entrypoint.sh
25 |
26 | COPY ipsec-vti.sh /var/lib/strongswan/ipsec-vti.sh
27 | RUN chmod 0755 /var/lib/strongswan/ipsec-vti.sh
28 |
29 | RUN echo 'ipsec ALL=NOPASSWD:SETENV:/usr/sbin/ipsec,/sbin/ip,/sbin/sysctl' > /etc/sudoers.d/ipsec
30 | RUN chmod 0440 /etc/sudoers.d/ipsec
31 |
32 | ENV VPN_DEVICE=eth0
33 | ENV LAN_NETWORKS=192.168.0.0/24
34 |
35 | EXPOSE 500/udp 4500/udp
36 |
37 | ENTRYPOINT ["/entrypoint.sh"]
Check: CKV_DOCKER_2: "Ensure that HEALTHCHECK instructions have been added to container images"
FAILED for resource: /modules/cloud-config-container/__need_fixing/onprem/docker-images/strongswan/Dockerfile.
File: /modules/cloud-config-container/__need_fixing/onprem/docker-images/strongswan/Dockerfile:1-37
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/docker-policies/docker-policy-index/ensure-that-healthcheck-instructions-have-been-added-to-container-images.html
1 | # Copyright 2022 Google LLC
2 | #
3 | # Licensed under the Apache License, Version 2.0 (the "License");
4 | # you may not use this file except in compliance with the License.
5 | # You may obtain a copy of the License at
6 | #
7 | # https://www.apache.org/licenses/LICENSE-2.0
8 | #
9 | # Unless required by applicable law or agreed to in writing, software
10 | # distributed under the License is distributed on an "AS IS" BASIS,
11 | # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 | # See the License for the specific language governing permissions and
13 | # limitations under the License.
14 |
15 | FROM debian:bullseye-slim
16 |
17 | ENV STRONGSWAN_VERSION=5.9
18 |
19 | RUN apt-get update \
20 | && DEBIAN_FRONTEND=noninteractive apt-get install -y sudo iptables procps strongswan=${STRONGSWAN_VERSION}* \
21 | && rm -rf /var/lib/apt/lists/*
22 |
23 | COPY entrypoint.sh /entrypoint.sh
24 | RUN chmod 0755 /entrypoint.sh
25 |
26 | COPY ipsec-vti.sh /var/lib/strongswan/ipsec-vti.sh
27 | RUN chmod 0755 /var/lib/strongswan/ipsec-vti.sh
28 |
29 | RUN echo 'ipsec ALL=NOPASSWD:SETENV:/usr/sbin/ipsec,/sbin/ip,/sbin/sysctl' > /etc/sudoers.d/ipsec
30 | RUN chmod 0440 /etc/sudoers.d/ipsec
31 |
32 | ENV VPN_DEVICE=eth0
33 | ENV LAN_NETWORKS=192.168.0.0/24
34 |
35 | EXPOSE 500/udp 4500/udp
36 |
37 | ENTRYPOINT ["/entrypoint.sh"]
Check: CKV_DOCKER_2: "Ensure that HEALTHCHECK instructions have been added to container images"
FAILED for resource: /modules/cloud-config-container/squid/docker/Dockerfile.
File: /modules/cloud-config-container/squid/docker/Dockerfile:1-38
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/docker-policies/docker-policy-index/ensure-that-healthcheck-instructions-have-been-added-to-container-images.html
1 | # Copyright 2022 Google LLC
2 | #
3 | # Licensed under the Apache License, Version 2.0 (the "License");
4 | # you may not use this file except in compliance with the License.
5 | # You may obtain a copy of the License at
6 | #
7 | # https://www.apache.org/licenses/LICENSE-2.0
8 | #
9 | # Unless required by applicable law or agreed to in writing, software
10 | # distributed under the License is distributed on an "AS IS" BASIS,
11 | # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 | # See the License for the specific language governing permissions and
13 | # limitations under the License.
14 |
15 | FROM debian:buster-slim
16 |
17 | ENV SQUID_VERSION=4.6 \
18 | SQUID_CACHE_DIR=/var/spool/squid \
19 | SQUID_LOG_DIR=/var/log/squid \
20 | SQUID_PID_DIR=/var/run/squid \
21 | SQUID_USER=proxy
22 |
23 | RUN apt-get update \
24 | && DEBIAN_FRONTEND=noninteractive apt-get install -y squid=${SQUID_VERSION}* \
25 | && rm -rf /var/lib/apt/lists/*
26 |
27 | COPY entrypoint.sh /sbin/entrypoint.sh
28 | RUN chmod 755 /sbin/entrypoint.sh
29 |
30 | # Create the PID file directory as root, as the non-privileged user squid is not
31 | # allowed to write in /var/run.
32 | RUN mkdir -p ${SQUID_PID_DIR} \
33 | && chown ${SQUID_USER}:${SQUID_USER} ${SQUID_PID_DIR}
34 |
35 | USER ${SQUID_USER}
36 |
37 | EXPOSE 3128/tcp
38 | ENTRYPOINT ["/sbin/entrypoint.sh"]
Check: CKV_DOCKER_3: "Ensure that a user for the container has been created"
FAILED for resource: /blueprints/gke/binauthz/image/Dockerfile.
File: /blueprints/gke/binauthz/image/Dockerfile:1-25
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/docker-policies/docker-policy-index/ensure-that-a-user-for-the-container-has-been-created.html
1 | # Copyright 2019 Google LLC
2 | #
3 | # Licensed under the Apache License, Version 2.0 (the "License");
4 | # you may not use this file except in compliance with the License.
5 | # You may obtain a copy of the License at
6 | #
7 | # http://www.apache.org/licenses/LICENSE-2.0
8 | #
9 | # Unless required by applicable law or agreed to in writing, software
10 | # distributed under the License is distributed on an "AS IS" BASIS,
11 | # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 | # See the License for the specific language governing permissions and
13 | # limitations under the License.
14 |
15 | FROM node:18-alpine
16 |
17 | WORKDIR /app
18 |
19 | COPY ["package.json", "package-lock.json*", "./"]
20 |
21 | RUN npm install
22 |
23 | COPY . .
24 |
25 | CMD [ "node", "index.js" ]
Check: CKV_DOCKER_2: "Ensure that HEALTHCHECK instructions have been added to container images"
FAILED for resource: /blueprints/gke/binauthz/image/Dockerfile.
File: /blueprints/gke/binauthz/image/Dockerfile:1-25
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/docker-policies/docker-policy-index/ensure-that-healthcheck-instructions-have-been-added-to-container-images.html
1 | # Copyright 2019 Google LLC
2 | #
3 | # Licensed under the Apache License, Version 2.0 (the "License");
4 | # you may not use this file except in compliance with the License.
5 | # You may obtain a copy of the License at
6 | #
7 | # http://www.apache.org/licenses/LICENSE-2.0
8 | #
9 | # Unless required by applicable law or agreed to in writing, software
10 | # distributed under the License is distributed on an "AS IS" BASIS,
11 | # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 | # See the License for the specific language governing permissions and
13 | # limitations under the License.
14 |
15 | FROM node:18-alpine
16 |
17 | WORKDIR /app
18 |
19 | COPY ["package.json", "package-lock.json*", "./"]
20 |
21 | RUN npm install
22 |
23 | COPY . .
24 |
25 | CMD [ "node", "index.js" ]
Check: CKV2_DOCKER_1: "Ensure that sudo isn't used"
FAILED for resource: /modules/cloud-config-container/__need_fixing/onprem/docker-images/strongswan/Dockerfile.RUN
File: /modules/cloud-config-container/__need_fixing/onprem/docker-images/strongswan/Dockerfile:19-21
19 | RUN apt-get update \
20 | && DEBIAN_FRONTEND=noninteractive apt-get install -y sudo iptables procps strongswan=${STRONGSWAN_VERSION}* \
21 | && rm -rf /var/lib/apt/lists/*
secrets scan results:
Passed checks: 0, Failed checks: 5, Skipped checks: 0
Check: CKV_SECRET_6: "Base64 High Entropy String"
FAILED for resource: 41ef4fb5227fcffe324aebe771f3fd42694ae673
File: /blueprints/cloud-operations/adfs/ansible/roles/ad-provisioning/files/users.json:6-7
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/secrets-policies/secrets-policy-index/git-secrets-6.html
6 | "password": "Ig********"
Check: CKV_SECRET_6: "Base64 High Entropy String"
FAILED for resource: 2ff2dfe36322448c6953616740a910be57bbd4ca
File: /blueprints/cloud-operations/workload-identity-federation/credential.json:13-14
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/secrets-policies/secrets-policy-index/git-secrets-6.html
13 | "subject_token_field_name": "acc*********"
Check: CKV_SECRET_6: "Base64 High Entropy String"
FAILED for resource: f4f979173b068d5c4a8f28a6e90a3fe02baa9154
File: /tests/modules/alloydb_instance/examples/alloydb_instance.yaml:20-21
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/secrets-policies/secrets-policy-index/git-secrets-6.html
20 | - password: alloyd******************
Check: CKV_SECRET_6: "Base64 High Entropy String"
FAILED for resource: 75e38ad5d682dcae3e8cf74a5b3a7fcad222d8f4
File: /tests/modules/cloud_function_v1/examples/secrets.yaml:25-26
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/secrets-policies/secrets-policy-index/git-secrets-6.html
25 | secret: pa*********
Check: CKV_SECRET_6: "Base64 High Entropy String"
FAILED for resource: 75e38ad5d682dcae3e8cf74a5b3a7fcad222d8f4
File: /tests/modules/cloud_function_v2/examples/secrets.yaml:27-28
Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/secrets-policies/secrets-policy-index/git-secrets-6.html
27 | secret: pa*********
github_actions scan results:
Passed checks: 212, Failed checks: 4, Skipped checks: 0
Check: CKV_GHA_7: "The build output cannot be affected by user parameters other than the build entry point and the top-level source location. GitHub Actions workflow_dispatch inputs MUST be empty. "
FAILED for resource: on(Create a new release
)
File: /.github/workflows/release.yml:21-30
21 | version:
22 | description: "Release version"
23 | required: true
24 | changelog:
25 | description: "I have updated the CHANGELOG"
26 | required: true
27 | type: boolean
28 |
29 | permissions:
30 | contents: write
Check: CKV2_GHA_1: "Ensure top-level permissions are not set to write-all"
FAILED for resource: on(Tests)
File: /.github/workflows/tests.yml:12-13
Check: CKV2_GHA_1: "Ensure top-level permissions are not set to write-all"
FAILED for resource: on(Label Pull Requests)
File: /.github/workflows/labeler.yml:12-13
Check: CKV2_GHA_1: "Ensure top-level permissions are not set to write-all"
FAILED for resource: on(Linting)
File: /.github/workflows/linting.yml:12-13
ansible scan results:
Passed checks: 24, Failed checks: 0, Skipped checks: 0