ServiceNow CMDB CI relationship sync: faster, more complete →
Mods
GCP

Policy: GCP > Project > Organization Policy > Restrict VPC peering usage

Manage the GCP Organization Policy "Restrict VPC peering usage" for the project.

This list constraint defines the set of VPC networks that are allowed to be peered with the VPC networks belonging to this project, folder, or organization. By default, a Network Admin for one network can peer with any other network.

The allowed/denied list of networks must be identified in the form: under:organizations/ORGANIZATION_ID, under:folders/FOLDER_ID, under:projects/PROJECT_ID, or projects/PROJECT_ID/global/networks/NETWORK_NAME. This constraint is retroactive.

Resource Types

This policy targets the following resource types:

Primary Policy

This policy is used with the following primary policy:

Controls

Policy Specification

Schema Type
string
Default
Skip
Valid Values [YAML]
  • Skip
    
  • Check: Inherited
    
  • Check: Google-managed default
    
  • Check: Per Custom Values, effective value
    
  • Check: Per Custom Values, inherited
    
  • Check: Per Custom Values, set on project
    
Examples [YAML]
  • Skip
    

Category

In Your Workspace

Developers