Benchmark: 1.3.2 Limit inbound Internet traffic to IP addresses within the DMZ
Description
Customers are responsible for implementing firewall rules and limiting ingress traffic to defined ports and protocols necessary for GCE instances within their DMZ.
Usage
Install the mod:
mkdir dashboardscd dashboardspowerpipe mod initpowerpipe mod install github.com/turbot/steampipe-mod-gcp-complianceStart the Powerpipe server:
steampipe service startpowerpipe serverOpen http://localhost:9033 in your browser and select 1.3.2 Limit inbound Internet traffic to IP addresses within the DMZ.
Run this benchmark in your terminal:
powerpipe benchmark run gcp_compliance.benchmark.pci_dss_v321_requirement_1_3_2Snapshot and share results via Turbot Pipes:
powerpipe benchmark run gcp_compliance.benchmark.pci_dss_v321_requirement_1_3_2 --shareControls
- Verify all GKE clusters are Private Clusters
- Ensure Master authorized networks is set to Enabled on Kubernetes Engine Clusters