CCSS (Common Configuration Scoring System) is a set of measures used to determine the severity of the rule.
Each rule is associated with a high-level category. For example IAM, Container, Monitoring, Logging, Network, etc.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsGoogle will store your keys on its servers and could access the data without your authorization.
Set the disk_encryption_key_raw
or kms_key_self_link
attribute on boot_disk
and attached_disk
to a customer-supplied encryption key.
Example configuration:
# Example with disk_encryption_key_raw
resource "google_compute_instance" "boot_disk_allow_1" {
name = "test"
machine_type = "e2-medium"
zone = "us-central1-a"
network_interface {
network = "default"
}
boot_disk {
disk_encryption_key_raw = "test_dummy_key"
}
}
resource "google_compute_instance" "boot_disk_with_attached_disk_allow_1" {
name = "test"
machine_type = "e2-medium"
zone = "us-central1-a"
network_interface {
network = "default"
}
boot_disk {
disk_encryption_key_raw = "test_dummy_key"
}
attached_disk {
disk_encryption_key_raw = "test_dummy_key"
}
}
# Example with kms_key_self_link
resource "google_compute_instance" "boot_disk_allow_2" {
name = "test"
machine_type = "e2-medium"
zone = "us-central1-a"
network_interface {
network = "default"
}
boot_disk {
kms_key_self_link = "test_dummy_key"
}
}
resource "google_compute_instance" "boot_disk_with_attached_disk_allow_2" {
name = "test"
machine_type = "e2-medium"
zone = "us-central1-a"
network_interface {
network = "default"
}
boot_disk {
kms_key_self_link = "test_dummy_key"
}
attached_disk {
kms_key_self_link = "test_dummy_key"
}
}