Ensure that only images from trusted Google Cloud Platform (GCP) projects are allowed as the source for boot disks for new virtual machine instances. To enforce this constraint, enable and configure the "Define Trusted Image Projects" policy at the GCP organization level. The allowed list of publisher projects must be configured in the conformity rule settings, on the Trend Cloud One™ – Conformity account console.
By default, the GCP project members can create persistent disks or copy images using any of the public and private images that they can access through their Cloud IAM roles. However, in some situations you might want to restrict access to disk images so that your project members can create boot disks only from images that contain approved software that meets strict security requirements.
Audit
To determine if the virtual machine disk image restriction is enabled within your GCP organizations, perform the following actions:
Remediation / Resolution
By default, virtual machine instances can be created from images in any Google Cloud project that shares images publicly or explicitly with the user. To enforce the creation of instances from images shared within trusted projects only, enable and configure the "Define Trusted Image Projects" organization policy by performing the following actions:
References
- Google Cloud Platform (GCP) Documentation
- Resource Manager
- Organization policy constraints
- Creating and managing organization policies
- Setting up trusted image policies
- GCP Command Line Interface (CLI) Documentation
- gcloud organizations list
- gcloud alpha resource-manager org-policies describe
- gcloud beta resource-manager org-policies set-policy