Benchmark: 2 Logging and Monitoring
Overview
This section covers recommendations addressing Logging and Monitoring on Google Cloud Platform.
Usage
Install the mod:
mkdir dashboardscd dashboardspowerpipe mod initpowerpipe mod install github.com/turbot/steampipe-mod-gcp-compliance
Start the Powerpipe server:
steampipe service startpowerpipe server
Open http://localhost:9033 in your browser and select 2 Logging and Monitoring.
Run this benchmark in your terminal:
powerpipe benchmark run gcp_compliance.benchmark.cis_v300_2
Snapshot and share results via Turbot Pipes:
powerpipe benchmark run gcp_compliance.benchmark.cis_v300_2 --share
Controls
- 2.1 Ensure That Cloud Audit Logging Is Configured Properly
- 2.2 Ensure That Sinks Are Configured for All Log Entries
- 2.3 Ensure That Retention Policies on Cloud Storage Buckets Used for Exporting Logs Are Configured Using Bucket Lock
- 2.4 Ensure Log Metric Filter and Alerts Exist for Project Ownership Assignments/Changes
- 2.5 Ensure That the Log Metric Filter and Alerts Exist for Audit Configuration Changes
- 2.6 Ensure That the Log Metric Filter and Alerts Exist for Custom Role Changes
- 2.7 Ensure That the Log Metric Filter and Alerts Exist for VPC Network Firewall Rule Changes
- 2.8 Ensure That the Log Metric Filter and Alerts Exist for VPC Network Route Changes
- 2.9 Ensure That the Log Metric Filter and Alerts Exist for VPC Network Changes
- 2.10 Ensure That the Log Metric Filter and Alerts Exist for Cloud Storage IAM Permission Changes
- 2.11 Ensure That the Log Metric Filter and Alerts Exist for SQL Instance Configuration Changes
- 2.12 Ensure That Cloud DNS Logging Is Enabled for All VPC Networks
- 2.13 Ensure Cloud Asset Inventory Is Enabled
- 2.14 Ensure 'Access Transparency' is 'Enabled'
- 2.15 Ensure 'Access Approval' is 'Enabled'
- 2.16 Ensure Logging is enabled for HTTP(S) Load Balancer