gcloud-vm 漏洞列表
共找到 8 个与 gcloud-vm 相关的漏洞
📅 加载漏洞趋势中...
-
gcloud-vm-disk-autodelete-enabled: Auto-Delete Not Disabled for VM Instance Persistent Disks POC
Ensure that the Auto-Delete behavior rule is disabled for the persistent disks attached to your Google Cloud virtual machine (VM) instances in order to protect the VM data from being deleted and meet security and compliance requirements. When Auto-Delete is on, the persistent disks are deleted when the associated VM instance is deleted. -
gcloud-vm-disk-csek-disabled: VM Disk Encryption with Customer-Supplied Keys Disabled POC
Ensure that the disks attached to your production Google Compute Engine instances are encrypted with Customer-Supplied Encryption Keys (CSEKs) in order to have complete control over the data-at-rest encryption and decryption process, and meet strict compliance requirements. -
gcloud-vm-ip-forwarding-enabled: IP Forwarding Not Disabled for VM Instances POC
Ensure that IP Forwarding feature is not enabled at the Google Compute Engine instance level for security and compliance reasons, as instances with IP Forwarding enabled act as routers/packet forwarders. Because IP forwarding is rarely required, except when the virtual machine (VM) is used as a network virtual appliance, each Google Cloud VM instance should be reviewed to decide whether IP forwarding is really needed. -
gcloud-vm-maintenance-terminate: VM Instance Maintenance Policy Set to Terminate POC
Ensure that Google Cloud Compute Engine performs live migration of your virtual machine instances during periodic infrastructure maintenance. The virtual machine maintenance behavior determines whether the VM instances are live migrated or terminated during a maintenance event. To ensure that your Google Cloud VM instances are migrated to new hardware, set "On Host Maintenance" configuration setting to "Migrate". -
gcloud-vm-preemptible-enabled: VM Instance Preemptibility Not Disabled POC
Ensure that your Google Cloud Platform (GCP) projects are not using preemptible virtual machine instances for production and business-critical applications. A preemptible virtual machine (VM) is an instance that you can create and run at a much lower price than normal instances but it can be terminated sooner due to system demands. -
gcloud-vm-project-ssh-keys-enabled: Block Project-Wide SSH Keys Not Enabled POC
Ensure that your Google Compute Engine instances are configured to ignore GCP project-wide (shared) public SSH keys and use instance-level SSH keys instead. Project-wide SSH keys can be used to log in to all the VM instances running inside a GCP project. While project-wide SSH keys can ease SSH key management, if compromised, they pose a security risk which can impact all VM instances within the project. -
gcloud-vm-public-ip-enabled: VM Instance Using Public IP Address POC
Ensure that your Google Compute Engine instances are not configured to have external IP addresses in order to minimize their exposure to the Internet. To reduce attack surface, Google Cloud virtual machine (VM) instances should not have public IP addresses attached. Instead, VM instances should be configured to run behind load balancers. -
gcloud-vm-serial-console-enabled: Interactive Serial Console Support Not Disabled POC
Ensure that "Enable connecting to serial ports" configuration setting is disabled for all your production Google Compute Engine instances. The interactive serial console does not support IP-based access restrictions such as IP address whitelists. If enabled, clients can attempt to connect to your instance from any IP address if they know the username, SSH key, project ID, instance name and zone.