captjt commited on
Commit
deb6a4a
1 Parent(s): 9eebdea

sort controls

Browse files
Files changed (1) hide show
  1. frameworks/cis-3.0-gcp/framework.json +272 -272
frameworks/cis-3.0-gcp/framework.json CHANGED
@@ -248,22 +248,6 @@
248
  }
249
  ]
250
  },
251
- {
252
- "controlId": "CSQL-6.1.1",
253
- "title": "Ensure That a MySQL Database Instance Does Not Allow Anyone To Connect With Administrative Privileges (Manual)",
254
- "description": "It is recommended to set a password for the administrative user (root by default) to prevent unauthorized access to the SQL database instances. This recommendation is applicable only for MySQL Instances. PostgreSQL does not offer any setting for No Password from the cloud console.",
255
- "controlCategory": "Identity and Access Management",
256
- "readableControlId": "CSQL-6.1.1",
257
- "severity": "medium",
258
- "automationPlatforms": ["GCP"],
259
- "criteria": [
260
- {
261
- "criteriaId": "CSQL-6.1.1.1",
262
- "title": "Implementation of Ensure That a MySQL Database Instance Does Not Allow Anyone To Connect With Administrative Privileges (Manual)",
263
- "description": "It is recommended to set a password for the administrative user (root by default) to prevent unauthorized access to the SQL database instances. This recommendation is applicable only for MySQL Instances. PostgreSQL does not offer any setting for No Password from the cloud console."
264
- }
265
- ]
266
- },
267
  {
268
  "controlId": "IAM-1.2",
269
  "title": "Ensure that Multi-Factor Authentication is 'Enabled' for All Non-Service Accounts (Manual)",
@@ -280,22 +264,6 @@
280
  }
281
  ]
282
  },
283
- {
284
- "controlId": "CSQL-6.1.2",
285
- "title": "Ensure Skip_show_database Database Flag for Cloud SQL MySQL Instance Is Set to On (Automated)",
286
- "description": "It is recommended to set skip_show_database database flag for Cloud SQL Mysql instance to on",
287
- "controlCategory": "Identity and Access Management",
288
- "readableControlId": "CSQL-6.1.2",
289
- "severity": "medium",
290
- "automationPlatforms": ["GCP"],
291
- "criteria": [
292
- {
293
- "criteriaId": "CSQL-6.1.2.1",
294
- "title": "Implementation of Ensure Skip_show_database Database Flag for Cloud SQL MySQL Instance Is Set to On (Automated)",
295
- "description": "It is recommended to set skip_show_database database flag for Cloud SQL Mysql instance to on"
296
- }
297
- ]
298
- },
299
  {
300
  "controlId": "IAM-1.3",
301
  "title": "Ensure that Security Key Enforcement is Enabled for All Admin Accounts (Manual)",
@@ -312,22 +280,6 @@
312
  }
313
  ]
314
  },
315
- {
316
- "controlId": "CSQL-6.1.3",
317
- "title": "Ensure That the Local_infile Database Flag for a Cloud SQL MySQL Instance Is Set to Off (Automated)",
318
- "description": "It is recommended to set the local_infile database flag for a Cloud SQL MySQL instance to off.",
319
- "controlCategory": "Identity and Access Management",
320
- "readableControlId": "CSQL-6.1.3",
321
- "severity": "medium",
322
- "automationPlatforms": ["GCP"],
323
- "criteria": [
324
- {
325
- "criteriaId": "CSQL-6.1.3.1",
326
- "title": "Implementation of Ensure That the Local_infile Database Flag for a Cloud SQL MySQL Instance Is Set to Off (Automated)",
327
- "description": "It is recommended to set the local_infile database flag for a Cloud SQL MySQL instance to off."
328
- }
329
- ]
330
- },
331
  {
332
  "controlId": "IAM-1.4",
333
  "title": "Ensure That There Are Only GCP-Managed Service Account Keys for Each Service Account (Automated)",
@@ -600,22 +552,6 @@
600
  }
601
  ]
602
  },
603
- {
604
- "controlId": "CSQL-6.2.2",
605
- "title": "Ensure That the Log_connections Database Flag for Cloud SQL PostgreSQL Instance Is Set to On (Automated)",
606
- "description": "Enabling the log_connections setting causes each attempted connection to the server to be logged, along with successful completion of client authentication. This parameter cannot be changed after the session starts.",
607
- "controlCategory": "Logging and Monitoring",
608
- "readableControlId": "CSQL-6.2.2",
609
- "severity": "medium",
610
- "automationPlatforms": ["GCP"],
611
- "criteria": [
612
- {
613
- "criteriaId": "CSQL-6.2.2.1",
614
- "title": "Implementation of Ensure That the Log_connections Database Flag for Cloud SQL PostgreSQL Instance Is Set to On (Automated)",
615
- "description": "Enabling the log_connections setting causes each attempted connection to the server to be logged, along with successful completion of client authentication. This parameter cannot be changed after the session starts."
616
- }
617
- ]
618
- },
619
  {
620
  "controlId": "LAM-2.3",
621
  "title": "Ensure That Retention Policies on Cloud Storage Buckets Used for Exporting Logs Are Configured Using Bucket Lock (Automated)",
@@ -632,22 +568,6 @@
632
  }
633
  ]
634
  },
635
- {
636
- "controlId": "CSQL-6.2.3",
637
- "title": "Ensure That the Log_disconnections Database Flag for Cloud SQL PostgreSQL Instance Is Set to On (Automated)",
638
- "description": "Enabling the log_disconnections setting logs the end of each session, including the session duration.",
639
- "controlCategory": "Logging and Monitoring",
640
- "readableControlId": "CSQL-6.2.3",
641
- "severity": "medium",
642
- "automationPlatforms": ["GCP"],
643
- "criteria": [
644
- {
645
- "criteriaId": "CSQL-6.2.3.1",
646
- "title": "Implementation of Ensure That the Log_disconnections Database Flag for Cloud SQL PostgreSQL Instance Is Set to On (Automated)",
647
- "description": "Enabling the log_disconnections setting logs the end of each session, including the session duration."
648
- }
649
- ]
650
- },
651
  {
652
  "controlId": "LAM-2.4",
653
  "title": "Ensure Log Metric Filter and Alerts Exist for Project Ownership Assignments/Changes (Automated)",
@@ -664,22 +584,6 @@
664
  }
665
  ]
666
  },
667
- {
668
- "controlId": "CSQL-6.2.4",
669
- "title": "Ensure Log_statement Database Flag for Cloud SQL PostgreSQL Instance Is Set Appropriately (Automated)",
670
- "description": "The value of log_statement flag determined the SQL statements that are logged. Valid values are: none ddl mod all The value ddl logs all data definition statements. The value mod logs all ddl statements, plus data-modifying statements. The statements are logged after a basic parsing is done and statement type is determined, thus this does not logs statements with errors. When using extended query protocol, logging occurs after an Execute message is received and values of the Bind parameters are included. A value of 'ddl' is recommended unless otherwise directed by your organization's logging policy.",
671
- "controlCategory": "Logging and Monitoring",
672
- "readableControlId": "CSQL-6.2.4",
673
- "severity": "medium",
674
- "automationPlatforms": ["GCP"],
675
- "criteria": [
676
- {
677
- "criteriaId": "CSQL-6.2.4.1",
678
- "title": "Implementation of Ensure Log_statement Database Flag for Cloud SQL PostgreSQL Instance Is Set Appropriately (Automated)",
679
- "description": "The value of log_statement flag determined the SQL statements that are logged. Valid values are: none ddl mod all The value ddl logs all data definition statements. The value mod logs all ddl statements, plus data-modifying statements. The statements are logged after a basic parsing is done and statement type is determined, thus this does not logs statements with errors. When using extended query protocol, logging occurs after an Execute message is received and values of the Bind parameters are included. A value of 'ddl' is recommended unless otherwise directed by your organization's logging policy."
680
- }
681
- ]
682
- },
683
  {
684
  "controlId": "LAM-2.5",
685
  "title": "Ensure That the Log Metric Filter and Alerts Exist for Audit Configuration Changes (Automated)",
@@ -696,22 +600,6 @@
696
  }
697
  ]
698
  },
699
- {
700
- "controlId": "CSQL-6.2.5",
701
- "title": "Ensure that the Log_min_messages Flag for a Cloud SQL PostgreSQL Instance is set at minimum to 'Warning' (Automated)",
702
- "description": "The log_min_messages flag defines the minimum message severity level that is considered as an error statement. Messages for error statements are logged with the SQL statement. Valid values include (from lowest to highest severity) DEBUG5, DEBUG4, DEBUG3, DEBUG2, DEBUG1, INFO, NOTICE, WARNING, ERROR, LOG, FATAL, and PANIC. Each severity level includes the subsequent levels mentioned above. ERROR is considered the best practice setting. Changes should only be made in accordance with the organization's logging policy.",
703
- "controlCategory": "Logging and Monitoring",
704
- "readableControlId": "CSQL-6.2.5",
705
- "severity": "medium",
706
- "automationPlatforms": ["GCP"],
707
- "criteria": [
708
- {
709
- "criteriaId": "CSQL-6.2.5.1",
710
- "title": "Implementation of Ensure that the Log_min_messages Flag for a Cloud SQL PostgreSQL Instance is set at minimum to 'Warning' (Automated)",
711
- "description": "The log_min_messages flag defines the minimum message severity level that is considered as an error statement. Messages for error statements are logged with the SQL statement. Valid values include (from lowest to highest severity) DEBUG5, DEBUG4, DEBUG3, DEBUG2, DEBUG1, INFO, NOTICE, WARNING, ERROR, LOG, FATAL, and PANIC. Each severity level includes the subsequent levels mentioned above. ERROR is considered the best practice setting. Changes should only be made in accordance with the organization's logging policy."
712
- }
713
- ]
714
- },
715
  {
716
  "controlId": "LAM-2.6",
717
  "title": "Ensure That the Log Metric Filter and Alerts Exist for Custom Role Changes (Automated)",
@@ -728,22 +616,6 @@
728
  }
729
  ]
730
  },
731
- {
732
- "controlId": "CSQL-6.2.6",
733
- "title": "Ensure Log_min_error_statement Database Flag for Cloud SQL PostgreSQL Instance Is Set to Error or Stricter (Automated)",
734
- "description": "The log_min_error_statement flag defines the minimum message severity level that are considered as an error statement. Messages for error statements are logged with the SQL statement. Valid values include (from lowest to highest severity) DEBUG5, DEBUG4, DEBUG3, DEBUG2, DEBUG1, INFO, NOTICE, WARNING, ERROR, LOG, FATAL, and PANIC. Each severity level includes the subsequent levels mentioned above. Ensure a value of ERROR or stricter is set.",
735
- "controlCategory": "Logging and Monitoring",
736
- "readableControlId": "CSQL-6.2.6",
737
- "severity": "medium",
738
- "automationPlatforms": ["GCP"],
739
- "criteria": [
740
- {
741
- "criteriaId": "CSQL-6.2.6.1",
742
- "title": "Implementation of Ensure Log_min_error_statement Database Flag for Cloud SQL PostgreSQL Instance Is Set to Error or Stricter (Automated)",
743
- "description": "The log_min_error_statement flag defines the minimum message severity level that are considered as an error statement. Messages for error statements are logged with the SQL statement. Valid values include (from lowest to highest severity) DEBUG5, DEBUG4, DEBUG3, DEBUG2, DEBUG1, INFO, NOTICE, WARNING, ERROR, LOG, FATAL, and PANIC. Each severity level includes the subsequent levels mentioned above. Ensure a value of ERROR or stricter is set."
744
- }
745
- ]
746
- },
747
  {
748
  "controlId": "LAM-2.7",
749
  "title": "Ensure That the Log Metric Filter and Alerts Exist for VPC Network Firewall Rule Changes (Automated)",
@@ -760,22 +632,6 @@
760
  }
761
  ]
762
  },
763
- {
764
- "controlId": "CSQL-6.2.7",
765
- "title": "Ensure That the Log_min_duration_statement Database Flag for Cloud SQL PostgreSQL Instance Is Set to '-1' (Disabled) (Automated)",
766
- "description": "The log_min_duration_statement flag defines the minimum amount of execution time of a statement in milliseconds where the total duration of the statement is logged. Ensure that log_min_duration_statement is disabled, i.e., a value of -1 is set.",
767
- "controlCategory": "Logging and Monitoring",
768
- "readableControlId": "CSQL-6.2.7",
769
- "severity": "medium",
770
- "automationPlatforms": ["GCP"],
771
- "criteria": [
772
- {
773
- "criteriaId": "CSQL-6.2.7.1",
774
- "title": "Implementation of Ensure That the Log_min_duration_statement Database Flag for Cloud SQL PostgreSQL Instance Is Set to '-1' (Disabled) (Automated)",
775
- "description": "The log_min_duration_statement flag defines the minimum amount of execution time of a statement in milliseconds where the total duration of the statement is logged. Ensure that log_min_duration_statement is disabled, i.e., a value of -1 is set."
776
- }
777
- ]
778
- },
779
  {
780
  "controlId": "LAM-2.8",
781
  "title": "Ensure That the Log Metric Filter and Alerts Exist for VPC Network Route Changes (Automated)",
@@ -792,22 +648,6 @@
792
  }
793
  ]
794
  },
795
- {
796
- "controlId": "CSQL-6.2.8",
797
- "title": "Ensure That 'cloudsql.enable_pgaudit' Database Flag for each Cloud Sql Postgresql Instance Is Set to 'on' For Centralized Logging (Automated)",
798
- "description": "Ensure cloudsql.enable_pgaudit database flag for Cloud SQL PostgreSQL instance is set to on to allow for centralized logging.",
799
- "controlCategory": "Logging and Monitoring",
800
- "readableControlId": "CSQL-6.2.8",
801
- "severity": "medium",
802
- "automationPlatforms": ["GCP"],
803
- "criteria": [
804
- {
805
- "criteriaId": "CSQL-6.2.8.1",
806
- "title": "Implementation of Ensure That 'cloudsql.enable_pgaudit' Database Flag for each Cloud Sql Postgresql Instance Is Set to 'on' For Centralized Logging (Automated)",
807
- "description": "Ensure cloudsql.enable_pgaudit database flag for Cloud SQL PostgreSQL instance is set to on to allow for centralized logging."
808
- }
809
- ]
810
- },
811
  {
812
  "controlId": "LAM-2.9",
813
  "title": "Ensure That the Log Metric Filter and Alerts Exist for VPC Network Changes (Automated)",
@@ -952,22 +792,6 @@
952
  }
953
  ]
954
  },
955
- {
956
- "controlId": "CSQL-6.3.1",
957
- "title": "Ensure 'external scripts enabled' database flag for Cloud SQL SQL Server instance is set to 'off' (Automated)",
958
- "description": "It is recommended to set external scripts enabled database flag for Cloud SQL SQL Server instance to off",
959
- "controlCategory": "Networking",
960
- "readableControlId": "CSQL-6.3.1",
961
- "severity": "medium",
962
- "automationPlatforms": ["GCP"],
963
- "criteria": [
964
- {
965
- "criteriaId": "CSQL-6.3.1.1",
966
- "title": "Implementation of Ensure 'external scripts enabled' database flag for Cloud SQL SQL Server instance is set to 'off' (Automated)",
967
- "description": "It is recommended to set external scripts enabled database flag for Cloud SQL SQL Server instance to off"
968
- }
969
- ]
970
- },
971
  {
972
  "controlId": "NET-3.2",
973
  "title": "Ensure Legacy Networks Do Not Exist for Older Projects (Automated)",
@@ -984,22 +808,6 @@
984
  }
985
  ]
986
  },
987
- {
988
- "controlId": "CSQL-6.3.2",
989
- "title": "Ensure that the 'cross db ownership chaining' database flag for Cloud SQL SQL Server instance is set to 'off' (Automated)",
990
- "description": "It is recommended to set cross db ownership chaining database flag for Cloud SQL SQL Server instance to off. This flag is deprecated for all SQL Server versions in CGP. Going forward, you can't set its value to on. However, if you have this flag enabled, we strongly recommend that you either remove the flag from your database or set it to off. For cross-database access, use the Microsoft tutorial for signing stored procedures with a certificate.",
991
- "controlCategory": "Networking",
992
- "readableControlId": "CSQL-6.3.2",
993
- "severity": "medium",
994
- "automationPlatforms": ["GCP"],
995
- "criteria": [
996
- {
997
- "criteriaId": "CSQL-6.3.2.1",
998
- "title": "Implementation of Ensure that the 'cross db ownership chaining' database flag for Cloud SQL SQL Server instance is set to 'off' (Automated)",
999
- "description": "It is recommended to set cross db ownership chaining database flag for Cloud SQL SQL Server instance to off. This flag is deprecated for all SQL Server versions in CGP. Going forward, you can't set its value to on. However, if you have this flag enabled, we strongly recommend that you either remove the flag from your database or set it to off. For cross-database access, use the Microsoft tutorial for signing stored procedures with a certificate."
1000
- }
1001
- ]
1002
- },
1003
  {
1004
  "controlId": "NET-3.3",
1005
  "title": "Ensure That DNSSEC Is Enabled for Cloud DNS (Automated)",
@@ -1016,22 +824,6 @@
1016
  }
1017
  ]
1018
  },
1019
- {
1020
- "controlId": "CSQL-6.3.3",
1021
- "title": "Ensure 'user Connections' Database Flag for Cloud Sql Sql Server Instance Is Set to a Non-limiting Value (Automated)",
1022
- "description": "It is recommended to check the user connections for a Cloud SQL SQL Server instance to ensure that it is not artificially limiting connections.",
1023
- "controlCategory": "Networking",
1024
- "readableControlId": "CSQL-6.3.3",
1025
- "severity": "medium",
1026
- "automationPlatforms": ["GCP"],
1027
- "criteria": [
1028
- {
1029
- "criteriaId": "CSQL-6.3.3.1",
1030
- "title": "Implementation of Ensure 'user Connections' Database Flag for Cloud Sql Sql Server Instance Is Set to a Non-limiting Value (Automated)",
1031
- "description": "It is recommended to check the user connections for a Cloud SQL SQL Server instance to ensure that it is not artificially limiting connections."
1032
- }
1033
- ]
1034
- },
1035
  {
1036
  "controlId": "NET-3.4",
1037
  "title": "Ensure That RSASHA1 Is Not Used for the Key-Signing Key in Cloud DNS DNSSEC (Automated)",
@@ -1048,22 +840,6 @@
1048
  }
1049
  ]
1050
  },
1051
- {
1052
- "controlId": "CSQL-6.3.4",
1053
- "title": "Ensure 'user options' database flag for Cloud SQL SQL Server instance is not configured (Automated)",
1054
- "description": "It is recommended that, user options database flag for Cloud SQL SQL Server instance should not be configured.",
1055
- "controlCategory": "Networking",
1056
- "readableControlId": "CSQL-6.3.4",
1057
- "severity": "medium",
1058
- "automationPlatforms": ["GCP"],
1059
- "criteria": [
1060
- {
1061
- "criteriaId": "CSQL-6.3.4.1",
1062
- "title": "Implementation of Ensure 'user options' database flag for Cloud SQL SQL Server instance is not configured (Automated)",
1063
- "description": "It is recommended that, user options database flag for Cloud SQL SQL Server instance should not be configured."
1064
- }
1065
- ]
1066
- },
1067
  {
1068
  "controlId": "NET-3.5",
1069
  "title": "Ensure That RSASHA1 Is Not Used for the Zone-Signing Key in Cloud DNS DNSSEC (Automated)",
@@ -1080,22 +856,6 @@
1080
  }
1081
  ]
1082
  },
1083
- {
1084
- "controlId": "CSQL-6.3.5",
1085
- "title": "Ensure 'remote access' database flag for Cloud SQL SQL Server instance is set to 'off' (Automated)",
1086
- "description": "It is recommended to set remote access database flag for Cloud SQL SQL Server instance to off.",
1087
- "controlCategory": "Networking",
1088
- "readableControlId": "CSQL-6.3.5",
1089
- "severity": "medium",
1090
- "automationPlatforms": ["GCP"],
1091
- "criteria": [
1092
- {
1093
- "criteriaId": "CSQL-6.3.5.1",
1094
- "title": "Implementation of Ensure 'remote access' database flag for Cloud SQL SQL Server instance is set to 'off' (Automated)",
1095
- "description": "It is recommended to set remote access database flag for Cloud SQL SQL Server instance to off."
1096
- }
1097
- ]
1098
- },
1099
  {
1100
  "controlId": "NET-3.6",
1101
  "title": "Ensure That SSH Access Is Restricted From the Internet (Automated)",
@@ -1112,22 +872,6 @@
1112
  }
1113
  ]
1114
  },
1115
- {
1116
- "controlId": "CSQL-6.3.6",
1117
- "title": "Ensure '3625 (trace flag)' database flag for all Cloud SQL Server instances is set to 'on' (Automated)",
1118
- "description": "It is recommended to set 3625 (trace flag) database flag for Cloud SQL SQL Server instance to on.",
1119
- "controlCategory": "Networking",
1120
- "readableControlId": "CSQL-6.3.6",
1121
- "severity": "medium",
1122
- "automationPlatforms": ["GCP"],
1123
- "criteria": [
1124
- {
1125
- "criteriaId": "CSQL-6.3.6.1",
1126
- "title": "Implementation of Ensure '3625 (trace flag)' database flag for all Cloud SQL Server instances is set to 'on' (Automated)",
1127
- "description": "It is recommended to set 3625 (trace flag) database flag for Cloud SQL SQL Server instance to on."
1128
- }
1129
- ]
1130
- },
1131
  {
1132
  "controlId": "NET-3.7",
1133
  "title": "Ensure That RDP Access Is Restricted From the Internet (Automated)",
@@ -1144,22 +888,6 @@
1144
  }
1145
  ]
1146
  },
1147
- {
1148
- "controlId": "CSQL-6.3.7",
1149
- "title": "Ensure that the 'contained database authentication' database flag for Cloud SQL on the SQL Server instance is not set to 'on' (Automated)",
1150
- "description": "It is recommended not to set contained database authentication database flag for Cloud SQL on the SQL Server instance to on.",
1151
- "controlCategory": "Networking",
1152
- "readableControlId": "CSQL-6.3.7",
1153
- "severity": "medium",
1154
- "automationPlatforms": ["GCP"],
1155
- "criteria": [
1156
- {
1157
- "criteriaId": "CSQL-6.3.7.1",
1158
- "title": "Implementation of Ensure that the 'contained database authentication' database flag for Cloud SQL on the SQL Server instance is not set to 'on' (Automated)",
1159
- "description": "It is recommended not to set contained database authentication database flag for Cloud SQL on the SQL Server instance to on."
1160
- }
1161
- ]
1162
- },
1163
  {
1164
  "controlId": "NET-3.8",
1165
  "title": "Ensure that VPC Flow Logs is Enabled for Every Subnet in a VPC Network (Automated)",
@@ -1432,6 +1160,278 @@
1432
  }
1433
  ]
1434
  },
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1435
  {
1436
  "controlId": "CSQL-6.4",
1437
  "title": "Ensure That the Cloud SQL Database Instance Requires All Incoming Connections To Use SSL (Automated)",
 
248
  }
249
  ]
250
  },
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
251
  {
252
  "controlId": "IAM-1.2",
253
  "title": "Ensure that Multi-Factor Authentication is 'Enabled' for All Non-Service Accounts (Manual)",
 
264
  }
265
  ]
266
  },
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
267
  {
268
  "controlId": "IAM-1.3",
269
  "title": "Ensure that Security Key Enforcement is Enabled for All Admin Accounts (Manual)",
 
280
  }
281
  ]
282
  },
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
283
  {
284
  "controlId": "IAM-1.4",
285
  "title": "Ensure That There Are Only GCP-Managed Service Account Keys for Each Service Account (Automated)",
 
552
  }
553
  ]
554
  },
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
555
  {
556
  "controlId": "LAM-2.3",
557
  "title": "Ensure That Retention Policies on Cloud Storage Buckets Used for Exporting Logs Are Configured Using Bucket Lock (Automated)",
 
568
  }
569
  ]
570
  },
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
571
  {
572
  "controlId": "LAM-2.4",
573
  "title": "Ensure Log Metric Filter and Alerts Exist for Project Ownership Assignments/Changes (Automated)",
 
584
  }
585
  ]
586
  },
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
587
  {
588
  "controlId": "LAM-2.5",
589
  "title": "Ensure That the Log Metric Filter and Alerts Exist for Audit Configuration Changes (Automated)",
 
600
  }
601
  ]
602
  },
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
603
  {
604
  "controlId": "LAM-2.6",
605
  "title": "Ensure That the Log Metric Filter and Alerts Exist for Custom Role Changes (Automated)",
 
616
  }
617
  ]
618
  },
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
619
  {
620
  "controlId": "LAM-2.7",
621
  "title": "Ensure That the Log Metric Filter and Alerts Exist for VPC Network Firewall Rule Changes (Automated)",
 
632
  }
633
  ]
634
  },
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
635
  {
636
  "controlId": "LAM-2.8",
637
  "title": "Ensure That the Log Metric Filter and Alerts Exist for VPC Network Route Changes (Automated)",
 
648
  }
649
  ]
650
  },
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
651
  {
652
  "controlId": "LAM-2.9",
653
  "title": "Ensure That the Log Metric Filter and Alerts Exist for VPC Network Changes (Automated)",
 
792
  }
793
  ]
794
  },
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
795
  {
796
  "controlId": "NET-3.2",
797
  "title": "Ensure Legacy Networks Do Not Exist for Older Projects (Automated)",
 
808
  }
809
  ]
810
  },
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
811
  {
812
  "controlId": "NET-3.3",
813
  "title": "Ensure That DNSSEC Is Enabled for Cloud DNS (Automated)",
 
824
  }
825
  ]
826
  },
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
827
  {
828
  "controlId": "NET-3.4",
829
  "title": "Ensure That RSASHA1 Is Not Used for the Key-Signing Key in Cloud DNS DNSSEC (Automated)",
 
840
  }
841
  ]
842
  },
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
843
  {
844
  "controlId": "NET-3.5",
845
  "title": "Ensure That RSASHA1 Is Not Used for the Zone-Signing Key in Cloud DNS DNSSEC (Automated)",
 
856
  }
857
  ]
858
  },
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
859
  {
860
  "controlId": "NET-3.6",
861
  "title": "Ensure That SSH Access Is Restricted From the Internet (Automated)",
 
872
  }
873
  ]
874
  },
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
875
  {
876
  "controlId": "NET-3.7",
877
  "title": "Ensure That RDP Access Is Restricted From the Internet (Automated)",
 
888
  }
889
  ]
890
  },
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
891
  {
892
  "controlId": "NET-3.8",
893
  "title": "Ensure that VPC Flow Logs is Enabled for Every Subnet in a VPC Network (Automated)",
 
1160
  }
1161
  ]
1162
  },
1163
+ {
1164
+ "controlId": "CSQL-6.1.1",
1165
+ "title": "Ensure That a MySQL Database Instance Does Not Allow Anyone To Connect With Administrative Privileges (Manual)",
1166
+ "description": "It is recommended to set a password for the administrative user (root by default) to prevent unauthorized access to the SQL database instances. This recommendation is applicable only for MySQL Instances. PostgreSQL does not offer any setting for No Password from the cloud console.",
1167
+ "controlCategory": "Identity and Access Management",
1168
+ "readableControlId": "CSQL-6.1.1",
1169
+ "severity": "medium",
1170
+ "automationPlatforms": ["GCP"],
1171
+ "criteria": [
1172
+ {
1173
+ "criteriaId": "CSQL-6.1.1.1",
1174
+ "title": "Implementation of Ensure That a MySQL Database Instance Does Not Allow Anyone To Connect With Administrative Privileges (Manual)",
1175
+ "description": "It is recommended to set a password for the administrative user (root by default) to prevent unauthorized access to the SQL database instances. This recommendation is applicable only for MySQL Instances. PostgreSQL does not offer any setting for No Password from the cloud console."
1176
+ }
1177
+ ]
1178
+ },
1179
+ {
1180
+ "controlId": "CSQL-6.1.2",
1181
+ "title": "Ensure Skip_show_database Database Flag for Cloud SQL MySQL Instance Is Set to On (Automated)",
1182
+ "description": "It is recommended to set skip_show_database database flag for Cloud SQL Mysql instance to on",
1183
+ "controlCategory": "Identity and Access Management",
1184
+ "readableControlId": "CSQL-6.1.2",
1185
+ "severity": "medium",
1186
+ "automationPlatforms": ["GCP"],
1187
+ "criteria": [
1188
+ {
1189
+ "criteriaId": "CSQL-6.1.2.1",
1190
+ "title": "Implementation of Ensure Skip_show_database Database Flag for Cloud SQL MySQL Instance Is Set to On (Automated)",
1191
+ "description": "It is recommended to set skip_show_database database flag for Cloud SQL Mysql instance to on"
1192
+ }
1193
+ ]
1194
+ },
1195
+ {
1196
+ "controlId": "CSQL-6.1.3",
1197
+ "title": "Ensure That the Local_infile Database Flag for a Cloud SQL MySQL Instance Is Set to Off (Automated)",
1198
+ "description": "It is recommended to set the local_infile database flag for a Cloud SQL MySQL instance to off.",
1199
+ "controlCategory": "Identity and Access Management",
1200
+ "readableControlId": "CSQL-6.1.3",
1201
+ "severity": "medium",
1202
+ "automationPlatforms": ["GCP"],
1203
+ "criteria": [
1204
+ {
1205
+ "criteriaId": "CSQL-6.1.3.1",
1206
+ "title": "Implementation of Ensure That the Local_infile Database Flag for a Cloud SQL MySQL Instance Is Set to Off (Automated)",
1207
+ "description": "It is recommended to set the local_infile database flag for a Cloud SQL MySQL instance to off."
1208
+ }
1209
+ ]
1210
+ },
1211
+ {
1212
+ "controlId": "CSQL-6.2.2",
1213
+ "title": "Ensure That the Log_connections Database Flag for Cloud SQL PostgreSQL Instance Is Set to On (Automated)",
1214
+ "description": "Enabling the log_connections setting causes each attempted connection to the server to be logged, along with successful completion of client authentication. This parameter cannot be changed after the session starts.",
1215
+ "controlCategory": "Logging and Monitoring",
1216
+ "readableControlId": "CSQL-6.2.2",
1217
+ "severity": "medium",
1218
+ "automationPlatforms": ["GCP"],
1219
+ "criteria": [
1220
+ {
1221
+ "criteriaId": "CSQL-6.2.2.1",
1222
+ "title": "Implementation of Ensure That the Log_connections Database Flag for Cloud SQL PostgreSQL Instance Is Set to On (Automated)",
1223
+ "description": "Enabling the log_connections setting causes each attempted connection to the server to be logged, along with successful completion of client authentication. This parameter cannot be changed after the session starts."
1224
+ }
1225
+ ]
1226
+ },
1227
+ {
1228
+ "controlId": "CSQL-6.2.3",
1229
+ "title": "Ensure That the Log_disconnections Database Flag for Cloud SQL PostgreSQL Instance Is Set to On (Automated)",
1230
+ "description": "Enabling the log_disconnections setting logs the end of each session, including the session duration.",
1231
+ "controlCategory": "Logging and Monitoring",
1232
+ "readableControlId": "CSQL-6.2.3",
1233
+ "severity": "medium",
1234
+ "automationPlatforms": ["GCP"],
1235
+ "criteria": [
1236
+ {
1237
+ "criteriaId": "CSQL-6.2.3.1",
1238
+ "title": "Implementation of Ensure That the Log_disconnections Database Flag for Cloud SQL PostgreSQL Instance Is Set to On (Automated)",
1239
+ "description": "Enabling the log_disconnections setting logs the end of each session, including the session duration."
1240
+ }
1241
+ ]
1242
+ },
1243
+ {
1244
+ "controlId": "CSQL-6.2.4",
1245
+ "title": "Ensure Log_statement Database Flag for Cloud SQL PostgreSQL Instance Is Set Appropriately (Automated)",
1246
+ "description": "The value of log_statement flag determined the SQL statements that are logged. Valid values are: none ddl mod all The value ddl logs all data definition statements. The value mod logs all ddl statements, plus data-modifying statements. The statements are logged after a basic parsing is done and statement type is determined, thus this does not logs statements with errors. When using extended query protocol, logging occurs after an Execute message is received and values of the Bind parameters are included. A value of 'ddl' is recommended unless otherwise directed by your organization's logging policy.",
1247
+ "controlCategory": "Logging and Monitoring",
1248
+ "readableControlId": "CSQL-6.2.4",
1249
+ "severity": "medium",
1250
+ "automationPlatforms": ["GCP"],
1251
+ "criteria": [
1252
+ {
1253
+ "criteriaId": "CSQL-6.2.4.1",
1254
+ "title": "Implementation of Ensure Log_statement Database Flag for Cloud SQL PostgreSQL Instance Is Set Appropriately (Automated)",
1255
+ "description": "The value of log_statement flag determined the SQL statements that are logged. Valid values are: none ddl mod all The value ddl logs all data definition statements. The value mod logs all ddl statements, plus data-modifying statements. The statements are logged after a basic parsing is done and statement type is determined, thus this does not logs statements with errors. When using extended query protocol, logging occurs after an Execute message is received and values of the Bind parameters are included. A value of 'ddl' is recommended unless otherwise directed by your organization's logging policy."
1256
+ }
1257
+ ]
1258
+ },
1259
+ {
1260
+ "controlId": "CSQL-6.2.5",
1261
+ "title": "Ensure that the Log_min_messages Flag for a Cloud SQL PostgreSQL Instance is set at minimum to 'Warning' (Automated)",
1262
+ "description": "The log_min_messages flag defines the minimum message severity level that is considered as an error statement. Messages for error statements are logged with the SQL statement. Valid values include (from lowest to highest severity) DEBUG5, DEBUG4, DEBUG3, DEBUG2, DEBUG1, INFO, NOTICE, WARNING, ERROR, LOG, FATAL, and PANIC. Each severity level includes the subsequent levels mentioned above. ERROR is considered the best practice setting. Changes should only be made in accordance with the organization's logging policy.",
1263
+ "controlCategory": "Logging and Monitoring",
1264
+ "readableControlId": "CSQL-6.2.5",
1265
+ "severity": "medium",
1266
+ "automationPlatforms": ["GCP"],
1267
+ "criteria": [
1268
+ {
1269
+ "criteriaId": "CSQL-6.2.5.1",
1270
+ "title": "Implementation of Ensure that the Log_min_messages Flag for a Cloud SQL PostgreSQL Instance is set at minimum to 'Warning' (Automated)",
1271
+ "description": "The log_min_messages flag defines the minimum message severity level that is considered as an error statement. Messages for error statements are logged with the SQL statement. Valid values include (from lowest to highest severity) DEBUG5, DEBUG4, DEBUG3, DEBUG2, DEBUG1, INFO, NOTICE, WARNING, ERROR, LOG, FATAL, and PANIC. Each severity level includes the subsequent levels mentioned above. ERROR is considered the best practice setting. Changes should only be made in accordance with the organization's logging policy."
1272
+ }
1273
+ ]
1274
+ },
1275
+ {
1276
+ "controlId": "CSQL-6.2.6",
1277
+ "title": "Ensure Log_min_error_statement Database Flag for Cloud SQL PostgreSQL Instance Is Set to Error or Stricter (Automated)",
1278
+ "description": "The log_min_error_statement flag defines the minimum message severity level that are considered as an error statement. Messages for error statements are logged with the SQL statement. Valid values include (from lowest to highest severity) DEBUG5, DEBUG4, DEBUG3, DEBUG2, DEBUG1, INFO, NOTICE, WARNING, ERROR, LOG, FATAL, and PANIC. Each severity level includes the subsequent levels mentioned above. Ensure a value of ERROR or stricter is set.",
1279
+ "controlCategory": "Logging and Monitoring",
1280
+ "readableControlId": "CSQL-6.2.6",
1281
+ "severity": "medium",
1282
+ "automationPlatforms": ["GCP"],
1283
+ "criteria": [
1284
+ {
1285
+ "criteriaId": "CSQL-6.2.6.1",
1286
+ "title": "Implementation of Ensure Log_min_error_statement Database Flag for Cloud SQL PostgreSQL Instance Is Set to Error or Stricter (Automated)",
1287
+ "description": "The log_min_error_statement flag defines the minimum message severity level that are considered as an error statement. Messages for error statements are logged with the SQL statement. Valid values include (from lowest to highest severity) DEBUG5, DEBUG4, DEBUG3, DEBUG2, DEBUG1, INFO, NOTICE, WARNING, ERROR, LOG, FATAL, and PANIC. Each severity level includes the subsequent levels mentioned above. Ensure a value of ERROR or stricter is set."
1288
+ }
1289
+ ]
1290
+ },
1291
+ {
1292
+ "controlId": "CSQL-6.2.7",
1293
+ "title": "Ensure That the Log_min_duration_statement Database Flag for Cloud SQL PostgreSQL Instance Is Set to '-1' (Disabled) (Automated)",
1294
+ "description": "The log_min_duration_statement flag defines the minimum amount of execution time of a statement in milliseconds where the total duration of the statement is logged. Ensure that log_min_duration_statement is disabled, i.e., a value of -1 is set.",
1295
+ "controlCategory": "Logging and Monitoring",
1296
+ "readableControlId": "CSQL-6.2.7",
1297
+ "severity": "medium",
1298
+ "automationPlatforms": ["GCP"],
1299
+ "criteria": [
1300
+ {
1301
+ "criteriaId": "CSQL-6.2.7.1",
1302
+ "title": "Implementation of Ensure That the Log_min_duration_statement Database Flag for Cloud SQL PostgreSQL Instance Is Set to '-1' (Disabled) (Automated)",
1303
+ "description": "The log_min_duration_statement flag defines the minimum amount of execution time of a statement in milliseconds where the total duration of the statement is logged. Ensure that log_min_duration_statement is disabled, i.e., a value of -1 is set."
1304
+ }
1305
+ ]
1306
+ },
1307
+ {
1308
+ "controlId": "CSQL-6.2.8",
1309
+ "title": "Ensure That 'cloudsql.enable_pgaudit' Database Flag for each Cloud Sql Postgresql Instance Is Set to 'on' For Centralized Logging (Automated)",
1310
+ "description": "Ensure cloudsql.enable_pgaudit database flag for Cloud SQL PostgreSQL instance is set to on to allow for centralized logging.",
1311
+ "controlCategory": "Logging and Monitoring",
1312
+ "readableControlId": "CSQL-6.2.8",
1313
+ "severity": "medium",
1314
+ "automationPlatforms": ["GCP"],
1315
+ "criteria": [
1316
+ {
1317
+ "criteriaId": "CSQL-6.2.8.1",
1318
+ "title": "Implementation of Ensure That 'cloudsql.enable_pgaudit' Database Flag for each Cloud Sql Postgresql Instance Is Set to 'on' For Centralized Logging (Automated)",
1319
+ "description": "Ensure cloudsql.enable_pgaudit database flag for Cloud SQL PostgreSQL instance is set to on to allow for centralized logging."
1320
+ }
1321
+ ]
1322
+ },
1323
+ {
1324
+ "controlId": "CSQL-6.3.1",
1325
+ "title": "Ensure 'external scripts enabled' database flag for Cloud SQL SQL Server instance is set to 'off' (Automated)",
1326
+ "description": "It is recommended to set external scripts enabled database flag for Cloud SQL SQL Server instance to off",
1327
+ "controlCategory": "Networking",
1328
+ "readableControlId": "CSQL-6.3.1",
1329
+ "severity": "medium",
1330
+ "automationPlatforms": ["GCP"],
1331
+ "criteria": [
1332
+ {
1333
+ "criteriaId": "CSQL-6.3.1.1",
1334
+ "title": "Implementation of Ensure 'external scripts enabled' database flag for Cloud SQL SQL Server instance is set to 'off' (Automated)",
1335
+ "description": "It is recommended to set external scripts enabled database flag for Cloud SQL SQL Server instance to off"
1336
+ }
1337
+ ]
1338
+ },
1339
+ {
1340
+ "controlId": "CSQL-6.3.2",
1341
+ "title": "Ensure that the 'cross db ownership chaining' database flag for Cloud SQL SQL Server instance is set to 'off' (Automated)",
1342
+ "description": "It is recommended to set cross db ownership chaining database flag for Cloud SQL SQL Server instance to off. This flag is deprecated for all SQL Server versions in CGP. Going forward, you can't set its value to on. However, if you have this flag enabled, we strongly recommend that you either remove the flag from your database or set it to off. For cross-database access, use the Microsoft tutorial for signing stored procedures with a certificate.",
1343
+ "controlCategory": "Networking",
1344
+ "readableControlId": "CSQL-6.3.2",
1345
+ "severity": "medium",
1346
+ "automationPlatforms": ["GCP"],
1347
+ "criteria": [
1348
+ {
1349
+ "criteriaId": "CSQL-6.3.2.1",
1350
+ "title": "Implementation of Ensure that the 'cross db ownership chaining' database flag for Cloud SQL SQL Server instance is set to 'off' (Automated)",
1351
+ "description": "It is recommended to set cross db ownership chaining database flag for Cloud SQL SQL Server instance to off. This flag is deprecated for all SQL Server versions in CGP. Going forward, you can't set its value to on. However, if you have this flag enabled, we strongly recommend that you either remove the flag from your database or set it to off. For cross-database access, use the Microsoft tutorial for signing stored procedures with a certificate."
1352
+ }
1353
+ ]
1354
+ },
1355
+ {
1356
+ "controlId": "CSQL-6.3.3",
1357
+ "title": "Ensure 'user Connections' Database Flag for Cloud Sql Sql Server Instance Is Set to a Non-limiting Value (Automated)",
1358
+ "description": "It is recommended to check the user connections for a Cloud SQL SQL Server instance to ensure that it is not artificially limiting connections.",
1359
+ "controlCategory": "Networking",
1360
+ "readableControlId": "CSQL-6.3.3",
1361
+ "severity": "medium",
1362
+ "automationPlatforms": ["GCP"],
1363
+ "criteria": [
1364
+ {
1365
+ "criteriaId": "CSQL-6.3.3.1",
1366
+ "title": "Implementation of Ensure 'user Connections' Database Flag for Cloud Sql Sql Server Instance Is Set to a Non-limiting Value (Automated)",
1367
+ "description": "It is recommended to check the user connections for a Cloud SQL SQL Server instance to ensure that it is not artificially limiting connections."
1368
+ }
1369
+ ]
1370
+ },
1371
+ {
1372
+ "controlId": "CSQL-6.3.4",
1373
+ "title": "Ensure 'user options' database flag for Cloud SQL SQL Server instance is not configured (Automated)",
1374
+ "description": "It is recommended that, user options database flag for Cloud SQL SQL Server instance should not be configured.",
1375
+ "controlCategory": "Networking",
1376
+ "readableControlId": "CSQL-6.3.4",
1377
+ "severity": "medium",
1378
+ "automationPlatforms": ["GCP"],
1379
+ "criteria": [
1380
+ {
1381
+ "criteriaId": "CSQL-6.3.4.1",
1382
+ "title": "Implementation of Ensure 'user options' database flag for Cloud SQL SQL Server instance is not configured (Automated)",
1383
+ "description": "It is recommended that, user options database flag for Cloud SQL SQL Server instance should not be configured."
1384
+ }
1385
+ ]
1386
+ },
1387
+ {
1388
+ "controlId": "CSQL-6.3.5",
1389
+ "title": "Ensure 'remote access' database flag for Cloud SQL SQL Server instance is set to 'off' (Automated)",
1390
+ "description": "It is recommended to set remote access database flag for Cloud SQL SQL Server instance to off.",
1391
+ "controlCategory": "Networking",
1392
+ "readableControlId": "CSQL-6.3.5",
1393
+ "severity": "medium",
1394
+ "automationPlatforms": ["GCP"],
1395
+ "criteria": [
1396
+ {
1397
+ "criteriaId": "CSQL-6.3.5.1",
1398
+ "title": "Implementation of Ensure 'remote access' database flag for Cloud SQL SQL Server instance is set to 'off' (Automated)",
1399
+ "description": "It is recommended to set remote access database flag for Cloud SQL SQL Server instance to off."
1400
+ }
1401
+ ]
1402
+ },
1403
+ {
1404
+ "controlId": "CSQL-6.3.6",
1405
+ "title": "Ensure '3625 (trace flag)' database flag for all Cloud SQL Server instances is set to 'on' (Automated)",
1406
+ "description": "It is recommended to set 3625 (trace flag) database flag for Cloud SQL SQL Server instance to on.",
1407
+ "controlCategory": "Networking",
1408
+ "readableControlId": "CSQL-6.3.6",
1409
+ "severity": "medium",
1410
+ "automationPlatforms": ["GCP"],
1411
+ "criteria": [
1412
+ {
1413
+ "criteriaId": "CSQL-6.3.6.1",
1414
+ "title": "Implementation of Ensure '3625 (trace flag)' database flag for all Cloud SQL Server instances is set to 'on' (Automated)",
1415
+ "description": "It is recommended to set 3625 (trace flag) database flag for Cloud SQL SQL Server instance to on."
1416
+ }
1417
+ ]
1418
+ },
1419
+ {
1420
+ "controlId": "CSQL-6.3.7",
1421
+ "title": "Ensure that the 'contained database authentication' database flag for Cloud SQL on the SQL Server instance is not set to 'on' (Automated)",
1422
+ "description": "It is recommended not to set contained database authentication database flag for Cloud SQL on the SQL Server instance to on.",
1423
+ "controlCategory": "Networking",
1424
+ "readableControlId": "CSQL-6.3.7",
1425
+ "severity": "medium",
1426
+ "automationPlatforms": ["GCP"],
1427
+ "criteria": [
1428
+ {
1429
+ "criteriaId": "CSQL-6.3.7.1",
1430
+ "title": "Implementation of Ensure that the 'contained database authentication' database flag for Cloud SQL on the SQL Server instance is not set to 'on' (Automated)",
1431
+ "description": "It is recommended not to set contained database authentication database flag for Cloud SQL on the SQL Server instance to on."
1432
+ }
1433
+ ]
1434
+ },
1435
  {
1436
  "controlId": "CSQL-6.4",
1437
  "title": "Ensure That the Cloud SQL Database Instance Requires All Incoming Connections To Use SSL (Automated)",