01 Run projects list command (Windows/macOS/Linux) with custom query filters to list the ID of each GCP project available within your Google Cloud account:
123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899
gcloud projects list
--format="table(projectId)"
02 The command output should return the requested GCP project identifier(s):
123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899
PROJECT_ID
cc-web-app-project-112233
cc-bigdata-project-123123
03 Run compute url-maps list command (Windows/macOS/Linux) using the ID of the GCP project that you want to examine as the identifier parameter and custom filtering to list the name of each load balancer (and the associated CDN origin) provisioned for the selected project:
123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899
gcloud compute url-maps list
--project cc-web-app-project-112233
--format="table(name,defaultService)"
04 The command output should return the requested information. If DEFAULT_SERVICE is set to backendBuckets/[resource-name], the load balancer listed by the compute url-maps list command output is associated with a backend bucket resource and the Audit process continues with the next step. Otherwise, the Audit process stops here:
123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899
NAME: cc-external-load-balancer
DEFAULT_SERVICE: backendBuckets/cc-cdn-bucket-origin
05 Run compute forwarding-rules list command (Windows/macOS/Linux) to list all the Google Compute Engine forwarding rules within the selected GCP project in order to identify the forwarding rules used by your load balancer (i.e. target resource):
123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899
gcloud compute forwarding-rules list
--project cc-web-app-project-112233
06 The command output should return the requested configuration information:
123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899
NAME: cc-external-load-balancer-forwarding-rule
REGION:
IP_ADDRESS: 10.0.15.20
IP_PROTOCOL: TCP
TARGET: cc-external-load-balancer-target-proxy
07 Run compute forwarding-rules describe command (Windows/macOS/Linux) to describe the port range configured for the forwarding rule used by your load balancer in order to determine if the resource allows traffic via port 443 (HTTPS):
123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899
gcloud compute forwarding-rules describe cc-external-load-balancer-forwarding-rule
--global
--format="value(portRange)"
08 The command output should return the requested configuration information:
123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899
80-80
If the
compute forwarding-rules describe command output returns
80-80, as shown in the output example above, the resource allows traffic via port 80 (HTTP), therefore the associated Cloud CDN backend bucket origin does not enforce HTTPS using SSL/TLS certificates.
09 Repeat steps no. 3 – 8 for each project created within your Google Cloud Platform (GCP) account.