π‘οΈ Google GCE External Forwarding Rule is configured to use a Target HTTP Proxyπ’
- Contextual name: π‘οΈ External Forwarding Rule is configured to use a Target HTTP Proxyπ’
- ID:
/ce/ca/google/load-balancing/external-forwarding-rule-http-proxy - Tags:
- π’ Policy with categories
- π’ Policy with type
- π’ Production policy
- Policy Type:
COMPLIANCE_POLICY - Policy Categories:
SECURITY
Logicβ
- π§ prod.logic.yamlπ’
Descriptionβ
Descriptionβ
This policy identifies Google GCE External Forwarding Rules that are configured to use a Target HTTP Proxy instead of a Target HTTPS Proxy.
Rationaleβ
Using a Target HTTP Proxy transmits data in cleartext, which exposes sensitive information to potential eavesdropping or man-in-the-middle attacks. Enforcing the use of a Target HTTPS Proxy ensures that all traffic to the load balancer is encrypted via HTTPS, thereby maintaining data confidentiality and integrity.
Auditβ
This policy flags an external Google GCE Forwarding Rule as
INCOMPLIANTif theTarget HTTP Proxy Unique IDfield is not empty.A Forwarding Rule is marked as
INAPPLICABLEif itsLoad Balancing Schemeis not EXTERNAL or EXTERNAL_MANAGED.
Remediationβ
Remediationβ
Replace the Target HTTP Proxy with a Target HTTPS Proxyβ
This process involves creating an SSL certificate, configuring a new HTTPS proxy, and updating the forwarding rule to use the secure proxy.
From gcloud CLIβ
Create an SSL Certificate (if one does not already exist)
gcloud compute ssl-certificates create {{certificate-name}} \
--private-key {{path-to-private-key}} \
--certificate {{path-to-certificate}} \Create a new Target HTTPS Proxy
gcloud compute target-https-proxies create {{new-https-proxies-name}} \
--ssl-certificates {{ssl-certificate}} \
--url-map {{url-map-name}} \Update the Forwarding Rule to use the new Target HTTPS Proxy
gcloud compute forwarding-rules set-target {{rule-name}} \
--target-https-proxy {{new-https-proxy-name}}Delete the old Target HTTP Proxy
gcloud compute target-http-proxies delete {{old-http-proxy-name}}
policy.yamlβ
Linked Framework Sectionsβ
| Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
|---|---|---|---|---|---|
| πΌ Cloudaware Framework β πΌ Data Encryption | 44 | no data | |||
| πΌ PCI DSS v3.2.1 β πΌ 2.3 Encrypt all non-console administrative access using strong cryptography. | 3 | 9 | no data | ||
| πΌ PCI DSS v4.0.1 β πΌ 2.2.7 All non-console administrative access is encrypted using strong cryptography. | 9 | no data | |||
| πΌ PCI DSS v4.0 β πΌ 2.2.7 All non-console administrative access is encrypted using strong cryptography. | 4 | 9 | no data |