Turbot Guardrails Hub 
Hub
  • Mods
  • Policy Packs
  • Docs
  • Home
ModsPolicy PacksDocsHome
Mods
GCP
Loading policies...

Policy: GCP > Network > Firewall > Approved > Custom

Determine whether the GCP Network firewall is allowed to exist. This policy will be evaluated by the Approved control. If a GCP Network firewall is not approved, it will be subject to the action specified in the GCP > Network > Firewall > Approved policy. See Approved for more information.

Note: The policy value must be a string with a value of Approved, Not approved or Skip, or in the form of YAML objects. The object(s) must contain the key result with its value as Approved or Not approved. A custom title and message can also be added using the keys title and message respectively.

Targets

This policy targets the following resource types:

  • GCP > Network > Firewall

Primary Policy

This policy is used with the following primary policy:

  • GCP > Network > Firewall > Approved

Controls

Setting this policy configures this control:

  • GCP > Network > Firewall > Approved

Policy Packs

This policy setting is used by the following policy packs:

  • GCP CIS v2.0.0 - Section 3 - Networking
  • Enforce GCP Network Firewall to Block All Egress Access

Policy Specification

Default
Skip
Examples [YAML]
  • Approved
    
  • Not approved
    
  • Skip
    
  • result: Approved
    
  • title: string
    result: Not approved
    
  • title: string
    result: Approved
    message: string
    
  • - title: string
      result: Approved
      message: string
    - title: string
      result: Not approved
      message: string
    

Category

  • Resource > Approved

In Your Workspace

  • Policy Settings by Type report

Developers

    Category URI
    • tmod:@turbot/turbot#/control/categories/resourceApproved
  • Policy Type URI
    • tmod:@turbot/gcp-network#/policy/types/firewallApprovedCustom
  • GraphQL
    • query policyType(id: "tmod:@turbot/gcp-network#/policy/types/firewallApprovedCustom") { … }
    • query policySettings(filter: "policyTypeId:'tmod:@turbot/gcp-network#/policy/types/firewallApprovedCustom'") { … }
    • query policyValues(filter: "policyTypeId:'tmod:@turbot/gcp-network#/policy/types/firewallApprovedCustom'") { … }
  • CLI
    • Get Policy Type
    • turbot graphql policy-type --id "tmod:@turbot/gcp-network#/policy/types/firewallApprovedCustom"
    • Get Policy Settings
    • turbot graphql policy-settings --filter "policyTypeId:tmod:@turbot/gcp-network#/policy/types/firewallApprovedCustom"
Guardrails
Guardrails Hub
  • Hub
  • Docs
  • Blog
  • Changelog
Products
  • GuardrailsGuardrails
  • PipesPipes
  • SteampipeSteampipe
  • PowerpipePowerpipe
  • FlowpipeFlowpipe
  • TailpipeTailpipe
Turbot
  • Home
  • About us
  • We're hiring!
  • Contact us
Community

Our community of practitioners love to discuss cloud governance & security.

Slack logoJoin us on Slack →

System StatusLegalSecurity
Terms of UseSecurityPrivacy
39
Mods
130
Resource Types
2,226
Policies
1,100
Controls
35
Quick Actions
83
IAM