turbot/steampipe-mod-gcp-compliance

Benchmark: 6.6 For public-facing web applications, address new threats and vulnerabilities on an ongoing basis and ensure these applications are protected against known attacks by methods like reviewing public-facing web applications via manual or installing an automated technical solution that detects and prevents web-based attacks (for example, a web-application firewall) in front of public-facing web applications, to continually check all traffic

Description

Customers are responsible for Web Application Filtering or application security reviews for web applications deployed on customer-managed GCE instances.

Usage

Install the mod:

mkdir dashboards
cd dashboards
powerpipe mod init
powerpipe mod install github.com/turbot/steampipe-mod-gcp-compliance

Start the Powerpipe server:

steampipe service start
powerpipe server

Open http://localhost:9033 in your browser and select 6.6 For public-facing web applications, address new threats and vulnerabilities on an ongoing basis and ensure these applications are protected against known attacks by methods like reviewing public-facing web applications via manual or installing an automated technical solution that detects and prevents web-based attacks (for example, a web-application firewall) in front of public-facing web applications, to continually check all traffic.

Run this benchmark in your terminal:

powerpipe benchmark run gcp_compliance.benchmark.pci_dss_v321_requirement_6_6

Snapshot and share results via Turbot Pipes:

powerpipe benchmark run gcp_compliance.benchmark.pci_dss_v321_requirement_6_6 --share

Controls

Tags