Skip to content
This repository has been archived by the owner on Jan 13, 2023. It is now read-only.

GoogleCloudPlatform/inspec-gcp-pci-profile

Repository files navigation

GCP PCI DSS v3.2.1 Inspec Profile

This repository holds the Google Cloud Platform (GCP) PCI DSS v3.2.1 Inspec Profile.

Required Disclaimer

This is not an officially supported Google product. This code is intended to help users assess their security posture on the Google Cloud against the PCI-DSS requirements. This code is not certified by PCI-DSS.

Coverage

TBD

Usage

Profile Attributes

  • gcp_project_id - (Default: "", type: string) - The target GCP Project that must be specified.
  • fw_change_control_id_regex - (Default: 'CID:', type: string) - Non-GKE Firewall rules should have a description that matches this regex
  • fw_override_control_id_regex - (Default: 'AID:', type: string) - Firewall rules that allow insecure protocols needing an override should have a description that matches this regex
  • cai_inventory_bucket_name - (Default: "", type: string) - GCS Bucket name where the latest CAI export is stored
  • cai_inventory_file_path - (Default: "", type: string) - File path/name where the latest CAI export is stored inside the cai_inventory_bucket_name GCS bucket.
  • gcs_pii_buckets - (Default: "", type: list) - List of GCS buckets where PII is known to be stored.
  • kms_admins_list - (Default: "", type: list) - List of accounts/users/groups that should have KMS admin permissions
  • kms_encrypters_list - (Default: "", type: list) - List of accounts/users/groups that should have KMS encrypters permissions
  • kms_decrypters_list - (Default: "", type: list) - List of accounts/users/groups that should have KMS decrypters permissions
  • kms_encrypterdecrypters_list - (Default: "", type: list) - List of accounts/users/groups that should have KMS encrypter/decrypter permissions
  • kms_regions_list - (Default: "", type: list) - List of GCP regions ("global" is valid) where KMS keyrings can be present.

CLI Example

$ cat attrs.yml 
gcp_project_id: "my-project-id"
fw_change_control_id_regex: 'CID:'
fw_override_control_id_regex: 'AID:'
cai_inventory_bucket_name: "my-inventory-bucket-name"
cai_inventory_file_path: "my-inventory-file-path"
gcs_pii_buckets:
  - "my-pii-bucket-name1"
  - "my-pii-bucket-name2"
kms_admins_list:
  - "serviceAccount:[email protected]"
kms_encrypters_list:
  - "serviceAccount:[email protected]"
kms_decrypters_list:
  - "serviceAccount:[email protected]"
kms_encrypterdecrypters_list:
  - "serviceAccount:[email protected]"
kms_regions_list:
  - "us-central1"
  - "global"

Example run:

$ inspec exec . -t gcp:// --attrs attrs.yml