Skip to content

Commit

Permalink
gcp-hotfixes-remediation (#712)
Browse files Browse the repository at this point in the history
  • Loading branch information
alphadev4 authored May 28, 2024
1 parent 7f5bf0a commit 5381802
Show file tree
Hide file tree
Showing 11 changed files with 8 additions and 7 deletions.
9 changes: 5 additions & 4 deletions en/google/storage/bucket-logging.md
Original file line number Diff line number Diff line change
Expand Up @@ -16,9 +16,10 @@

## Detailed Remediation Steps
1. Log into the Google Cloud Platform Console.
2. Scroll down the left navigation panel and choose "Cloud Storage" to select the "Buckets" option. </br> <img src="/cloud-security-remediation-guides/resources/google/storage/bucket-logging/step2.png">
3. On the "Buckets" page, create the log bucket if you dont have one.</br> <img src="/cloud-security-remediation-guides/resources/google/storage/bucket-logging/step3.png"/>
4. Click on the 'cloud shell' icon on the top left of navigation bar ,as bucket logging can only be enabled by using the Command Line Interface.</br> <img src="/cloud-security-remediation-guides/resources/google/storage/bucket-logging/step4.png>
5. Enter the command gsutil logging set on -b gs://[LOG_BUCKET_NAME] -o AccessLog gs://[BUCKET_NAME] </br> <img src="/cloud-security-remediation-guides/resources/google/storage/bucket-logging/step5.png>
2. Scroll down the left navigation panel and choose "Cloud Storage" to select the "Buckets" option. </br> <img src="/resources/google/storage/bucket-logging/step2.png">
3. On the "Buckets" page, create the log bucket if you dont have one.</br> <img src="/resources/google/storage/bucket-logging/step3.png"/>
4. Click on the 'cloud shell' icon on the top left of navigation bar ,as bucket logging can only be enabled by using the Command Line Interface.
</br> <img src="/resources/google/storage/bucket-logging/step4.png"/>
5. Enter the command gsutil logging set on -b gs://[LOG_BUCKET_NAME] -o AccessLog gs://[BUCKET_NAME] </br> <img src="/resources/google/storage/bucket-logging/step5.png"/>
7. Repeat steps number 4-5 to enable logging to all other buckets in the project.

4 changes: 2 additions & 2 deletions en/google/storage/bucket-versioning.md
Original file line number Diff line number Diff line change
Expand Up @@ -16,6 +16,6 @@

## Detailed Remediation Steps
1. Log into the Google Cloud Platform Console.
2. Click on the 'cloud shell' icon on the top left of navigation bar ,as Bucket Versioning can only be enabled by using the CLI (Command Line Interface) .</br> <img src="/cloud-security-remediation-guides/resources/google/storage/bucket-versioning/step2.png>
3. Enter the command gsutil versioning set on gs://[BUCKET_NAME] </br> <img src="/cloud-security-remediation-guides/resources/google/storage/bucket-versioning/step3.png>
2. Click on the 'cloud shell' icon on the top left of navigation bar ,as Bucket Versioning can only be enabled by using the CLI (Command Line Interface) .</br> <img src="/resources/google/storage/bucket-versioning/step2.png"/>
3. Enter the command gsutil versioning set on gs://[BUCKET_NAME] </br> <img src="/resources/google/storage/bucket-versioning/step3.png"/>
4. Repeat steps 3 to enable versioning to all other buckets in the project.
2 changes: 1 addition & 1 deletion en/google/storage/storage-bucket-all-users-policy.md
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@
## Detailed Remediation Steps
1. Log into the Google Cloud Platform Console.
2. Scroll down the left navigation panel and choose "Cloud Storage" to select the "Buckets" option. </br> <img src="/resources/google/storage/storage-bucket-all-users-policy/step2.png">
3. On the "Buckets" page, select the bucket which you want to configure by clicking on its name.</br> <img src="/resources/google/storage/bstorage-bucket-all-users-policy/step3.png"/>
3. On the "Buckets" page, select the bucket which you want to configure by clicking on its name.</br> <img src="/resources/google/storage/storage-bucket-all-users-policy/step3.png"/>
4. Select the "PERMISSIONS" tab to access the permissions defined for selected bucket.</br> <img src="/resources/google/storage/storage-bucket-all-users-policy/step4.png"/>
5. Select the "VIEW BY PRINCIPALS" tab to display all IAM members (principals) that have access to the selected resource. </br> <img src="/resources/google/storage/storage-bucket-all-users-policy/step5.png"/>
6. Select all the allUsers and allAuthenticatedUsers principals available and choose REMOVE ACCESS to initiate the removal action for the selected bindings.</br><img src="/resources/google/storage/storage-bucket-all-users-policy/step6.png"/>
Expand Down
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.

0 comments on commit 5381802

Please sign in to comment.