Ensure that your Google Cloud VPC network firewall rules don't have high-risk ports configured to allow inbound traffic in order to protect the associated compute resources against Denial-of-Service (DoS) attacks or brute-force attacks. Many ports with elevated risk reside within the 1-1024 range, therefore ports <= 1024 are considered high-risk ports.
In Google Cloud, roles with administrative permissions can incorporate positions that provide elevated access privileges. To minimize security risks, these roles should not be assigned to IAM members (principals) on a regular basis. When IAM members have administrator privileges (Owner and Editor roles, or roles containing "Admin" or "admin" in their names), they can access, create, and manage cloud resources. To adhere to the Principle of Least Privilege (POLP), assign IAM members the minimal set of permissions required for their operations, and remove any administrator roles that grant overly permissive access.
Audit
To determine if your VPC network firewall rules are using high-risk ports to allow unrestricted inbound access (i.e. 0.0.0.0/0), perform the following operations:
Remediation / Resolution
To update your VPC network firewall rules configuration in order to restrict inbound access on high-risk ports to trusted, authorized IP addresses or IP ranges only, perform the following operations:
References
- Google Cloud Platform (GCP) Documentation
- VPC networks
- Create and manage VPC networks
- VPC firewall rules
- Use VPC firewall rules
- GCP Command Line Interface (CLI) Documentation
- gcloud projects list
- gcloud compute networks list
- gcloud compute firewall-rules list
- gcloud compute firewall-rules update