diff --git a/en/google/resourcemanager/compute-allowed-external-ips.md b/en/google/resourcemanager/compute-allowed-external-ips.md new file mode 100644 index 000000000..2a9b1ef4a --- /dev/null +++ b/en/google/resourcemanager/compute-allowed-external-ips.md @@ -0,0 +1,25 @@ +[![CloudSploit](https://cloudsploit.com/img/logo-new-big-text-100.png "CloudSploit")](https://cloudsploit.com) + +# GOOGLE / Resource Manager / Compute Allowed External IPs + +## Quick Info + +| | | +|-|-| +| **Plugin Title** | Compute Allowed External IPs | +| **Cloud** | GOOGLE | +| **Category** | Resource Manager | +| **Description** | Determine if \"Define Allowed External IPs for VM Instances\" constraint policy is enabled at the GCP organization level. | +| **More Info** | To reduce exposure to the internet, make sure that not all VM instances are allowed to use external IP addresses. | +| **GOOGLE Link** | https://cloud.google.com/resource-manager/docs/organization-policy/org-policy-constraints | +| **Recommended Action** | Ensure that \"Define Allowed External IPs for VM Instances\" constraint is enforced to allow you to define the VM instances that are allowed to use external IP addresses. | + +## Detailed Remediation Steps +1. Sign in to Google Cloud Management Console with the organizational unit credentials. +2. Click the deployment selector in the upper navigation bar,slect ALL to view a summary of all current deployments, and then pick the Google Cloud organisation you want to look at. +3. Navigate to Cloud Identity and Access Management (IAM) [dashboard](#https://console.cloud.google.com/iam-admin/iam). +4. In the navigation panel, select Organization Policies to view the list of the constraint policies available for your GCP organization.

+5. Click inside Filter box, select *Name* and *Define allowed external IPs for VM instances* to return the \"Define Allowed External IPs for VM Instances\" policy.

+6. Click on the GCP organization policy returned at step 5. +7. On the Policy details page, under Effective policy, check the **Allowed** configuration attribute value. If the **Allowed** attribute value is set to **All**, then all the virtual machine instances created within the selected Google Cloud Platform (GCP) organization are allowed to use external IP addresses. +8. Click on Manage Policy to \"Define Allowed External IPs for VM Instances\" constraint policy.

\ No newline at end of file diff --git a/resources/google/resourcemanager/.DS_Store b/resources/google/resourcemanager/.DS_Store new file mode 100644 index 000000000..85c87cd56 Binary files /dev/null and b/resources/google/resourcemanager/.DS_Store differ diff --git a/resources/google/resourcemanager/compute-allowed-external-ips/step4.png b/resources/google/resourcemanager/compute-allowed-external-ips/step4.png new file mode 100644 index 000000000..c7239f46d Binary files /dev/null and b/resources/google/resourcemanager/compute-allowed-external-ips/step4.png differ diff --git a/resources/google/resourcemanager/compute-allowed-external-ips/step5.png b/resources/google/resourcemanager/compute-allowed-external-ips/step5.png new file mode 100644 index 000000000..2ed8990be Binary files /dev/null and b/resources/google/resourcemanager/compute-allowed-external-ips/step5.png differ diff --git a/resources/google/resourcemanager/compute-allowed-external-ips/step8.png b/resources/google/resourcemanager/compute-allowed-external-ips/step8.png new file mode 100644 index 000000000..4df8f120f Binary files /dev/null and b/resources/google/resourcemanager/compute-allowed-external-ips/step8.png differ