diff --git a/en/google/resourcemanager/compute-allowed-external-ips.md b/en/google/resourcemanager/compute-allowed-external-ips.md
new file mode 100644
index 000000000..2a9b1ef4a
--- /dev/null
+++ b/en/google/resourcemanager/compute-allowed-external-ips.md
@@ -0,0 +1,25 @@
+[![CloudSploit](https://cloudsploit.com/img/logo-new-big-text-100.png "CloudSploit")](https://cloudsploit.com)
+
+# GOOGLE / Resource Manager / Compute Allowed External IPs
+
+## Quick Info
+
+| | |
+|-|-|
+| **Plugin Title** | Compute Allowed External IPs |
+| **Cloud** | GOOGLE |
+| **Category** | Resource Manager |
+| **Description** | Determine if \"Define Allowed External IPs for VM Instances\" constraint policy is enabled at the GCP organization level. |
+| **More Info** | To reduce exposure to the internet, make sure that not all VM instances are allowed to use external IP addresses. |
+| **GOOGLE Link** | https://cloud.google.com/resource-manager/docs/organization-policy/org-policy-constraints |
+| **Recommended Action** | Ensure that \"Define Allowed External IPs for VM Instances\" constraint is enforced to allow you to define the VM instances that are allowed to use external IP addresses. |
+
+## Detailed Remediation Steps
+1. Sign in to Google Cloud Management Console with the organizational unit credentials.
+2. Click the deployment selector in the upper navigation bar,slect ALL to view a summary of all current deployments, and then pick the Google Cloud organisation you want to look at.
+3. Navigate to Cloud Identity and Access Management (IAM) [dashboard](#https://console.cloud.google.com/iam-admin/iam).
+4. In the navigation panel, select Organization Policies to view the list of the constraint policies available for your GCP organization.
+5. Click inside Filter box, select *Name* and *Define allowed external IPs for VM instances* to return the \"Define Allowed External IPs for VM Instances\" policy.
+6. Click on the GCP organization policy returned at step 5.
+7. On the Policy details page, under Effective policy, check the **Allowed** configuration attribute value. If the **Allowed** attribute value is set to **All**, then all the virtual machine instances created within the selected Google Cloud Platform (GCP) organization are allowed to use external IP addresses.
+8. Click on Manage Policy to \"Define Allowed External IPs for VM Instances\" constraint policy.
\ No newline at end of file
diff --git a/resources/google/resourcemanager/.DS_Store b/resources/google/resourcemanager/.DS_Store
new file mode 100644
index 000000000..85c87cd56
Binary files /dev/null and b/resources/google/resourcemanager/.DS_Store differ
diff --git a/resources/google/resourcemanager/compute-allowed-external-ips/step4.png b/resources/google/resourcemanager/compute-allowed-external-ips/step4.png
new file mode 100644
index 000000000..c7239f46d
Binary files /dev/null and b/resources/google/resourcemanager/compute-allowed-external-ips/step4.png differ
diff --git a/resources/google/resourcemanager/compute-allowed-external-ips/step5.png b/resources/google/resourcemanager/compute-allowed-external-ips/step5.png
new file mode 100644
index 000000000..2ed8990be
Binary files /dev/null and b/resources/google/resourcemanager/compute-allowed-external-ips/step5.png differ
diff --git a/resources/google/resourcemanager/compute-allowed-external-ips/step8.png b/resources/google/resourcemanager/compute-allowed-external-ips/step8.png
new file mode 100644
index 000000000..4df8f120f
Binary files /dev/null and b/resources/google/resourcemanager/compute-allowed-external-ips/step8.png differ