Control: GCP > Project > Organization Policy > Restrict VPC peering usage
Manage the GCP Organization Policy "Restrict VPC peering usage" for the project.
This list constraint defines the set of VPC networks that are allowed to be peered with the VPC networks belonging to this project, folder, or organization. By default, a Network Admin for one network can peer with any other network.
The allowed/denied list of networks must be identified in the form: under:organizations/ORGANIZATION_ID, under:folders/FOLDER_ID, under:projects/PROJECT_ID, or projects/PROJECT_ID/global/networks/NETWORK_NAME. This constraint is retroactive.
Resource Types
This control targets the following resource types:
Primary Policies
The following policies can be used to configure this control:
- Restrict VPC peering usage
- Restrict VPC peering usage > Action
- Restrict VPC peering usage > Custom Values
Category
In Your Workspace
Developers
- tmod:@turbot/gcp-orgpolicy#/control/types/computeRestrictVpcPeering
- tmod:@turbot/turbot#/control/categories/policy
- turbot graphql controls --filter "controlTypeId:tmod:@turbot/gcp-orgpolicy#/control/types/computeRestrictVpcPeering"
Get Controls
Control Type URI
Category URI
GraphQL
CLI