π Google Identity Aware Proxy (IAP) is not used to enforce access controls π’
- Contextual name: π Identity Aware Proxy (IAP) is not used to enforce access controls π’
- ID:
/ce/ca/google/iam/identity-aware-proxy
- Located in: π Google IAM
Flagsβ
- π’ Impossible policy
- π’ Policy with categories
- π’ Policy with type
Our Metadataβ
- Policy Type:
COMPLIANCE_POLICY
- Policy Category:
SECURITY
Descriptionβ
Descriptionβ
IAP authenticates the user requests to your apps via a Google single sign in. You can then manage these users with permissions to control access. It is recommended to use both IAP permissions and firewalls to restrict this access to your apps with sensitive information.
Rationaleβ
IAP ensure that access to VMs is controlled by authenticating incoming requests. Access to your apps and the VMs should be restricted by firewall rules that allow only the proxy IAP IP addresses contained in the 35.235.240.0/20 subnet. Otherwise, unauthenticated requests can be made to your apps. To ensure that load balancing works correctly health checks should also be allowed.
Impactβ
If firewall rules are not configured correctly, legitimate business services could be negatively impacted. It is recommended to make these changes during a time of low usage.
Auditβ
From Google Cloud Consoleβ
- For each of your apps that have IAP enabled go to the Cloud Console VPC network > Firewall rules.
- Verify that the only rules correspond to the following values:
... see more
Remediationβ
Remediationβ
From Google Cloud Consoleβ
Go to the Cloud Console VPC network > Firewall rules.
Select the checkbox next to the following rules:
o default-allow-http
o default-allow-https
o default-allow-internal
Click
Delete
.Click
Create firewall rule
and set the following values:o Name: allow-iap-traffic
o Targets: All instances in the network
o Source IP ranges (press Enter after you paste each value in the box, copy each full CIDR IP address):
βͺ IAP Proxy Addresses 35.235.240.0/20
βͺ Google Health Check 130.211.0.0/22
βͺ Google Health Check 35.191.0.0/16o Protocols and ports:
βͺ Specified protocols and ports required for access and management of your app. For example most health check connection protocols would be covered by;
βͺ tcp:80 (Default HTTP Health Check port)
βͺ tcp:443 (Default HTTPS Health Check port)
Note: if you have custom ports used by your load balancers, you will need to list them hereWhen you're finished updating values, click
Create
.
policy.yamlβ
Linked Framework Sectionsβ
Section | Sub Sections | Internal Rules | Policies | Flags |
---|---|---|---|---|
πΌ CIS GCP v3.0.0 β πΌ 3.10 Use Identity Aware Proxy (IAP) to Ensure Only Traffic From Google IP Addresses are 'Allowed' - Level 2 (Manual) | 1 | |||
πΌ Cloudaware Framework β πΌ Secure Access | 43 |