Network Security Services
Objective
Establish external and internal network perimeters and monitor network traffic.
Key Considerations
- [ ] Ensure that egress/ingress points to and from GC cloud-based environments are managed and monitored. Use centrally provisioned network security services where available.
- [ ] Implement network boundary protection mechanisms for all external facing interfaces that enforce a deny-all or allow-by-exception policy.
- [ ] Perimeter security services such as boundary protection, intrusion prevention services, proxy services, TLS traffic inspection, etc. must be enabled based on risk profile, in alignment with GC Secure Connectivity Requirements and ITSG-22 and ITSG-38..
- [ ] Ensure that access to cloud storage services is protected and restricted to authorized users and services.
Validation
- [ ] Confirm policy for network boundary protection.
- [ ] Confirm policy for limiting number of public IPs.
- [ ] Confirm policy for limiting to authorized source IP addresses (e.g. GC IP addresses).
Applicable Service Models
- IaaS, PaaS, SaaS
References
- SPIN 2017-01, subsection 6.2.4
- Refer to the network security zoning guidance in ITSG-22 and ITSG-38.
- CSE Top 10 #1
- Related security controls: AC-3, AC‑4, SC-5, SC‑7, SC‑7(5), SI-3, SI-3(7), SI-4