Control: GCP > Project > Organization Policy > Restrict VPC peering usage
Manage the GCP Organization Policy "Restrict VPC peering usage" for the project.
This list constraint defines the set of VPC networks that are allowed to be peered with the VPC networks belonging to this project, folder, or organization. By default, a Network Admin for one network can peer with any other network.
The allowed/denied list of networks must be identified in the form: under:organizations/ORGANIZATION_ID, under:folders/FOLDER_ID, under:projects/PROJECT_ID, or projects/PROJECT_ID/global/networks/NETWORK_NAME. This constraint is retroactive.
Resource Types
This control targets the following resource types:
Category
In Your Workspace
Developers
- tmod:@turbot/gcp-orgpolicy#/control/types/computeRestrictVpcPeering
- tmod:@turbot/turbot#/control/categories/policy
- turbot graphql controls --filter "controlTypeId:tmod:@turbot/gcp-orgpolicy#/control/types/computeRestrictVpcPeering"
Get Controls
Control Type URI
Category URI
GraphQL
CLI