ServiceNow CMDB CI relationship sync: faster, more complete →
Mods
GCP

Policy: GCP > Project > Organization Policy > Enforce Public Access Prevention

Manage the GCP Organization Policy "Enforce Public Access Prevention" for the project.

Secure your Cloud Storage data from public exposure by enforcing public access prevention.

This governance policy prevents existing and future resources from being accessed via the public internet by disabling and blocking ACLs and IAM permissions that grant access to allUsers and allAuthenticatedUsers. Enforce this policy on the entire organization (recommended), specific projects, or specific folders to ensure no data is publicly exposed.

This policy overrides existing public permissions. Public access will be revoked for existing buckets and objects after this policy is enabled.

Resource Types

This policy targets the following resource types:

Primary Policy

This policy is used with the following primary policy:

Controls

Policy Specification

Schema Type
string
Default
Skip
Valid Values [YAML]
  • Skip
    
  • Check: Inherited
    
  • Check: Google-managed default
    
  • Check: On, effective value
    
  • Check: Off, effective value
    
  • Check: On, inherited
    
  • Check: Off, inherited
    
  • Check: On, set on project
    
  • Check: Off, set on project
    
Examples [YAML]
  • Skip
    

Category

In Your Workspace

Developers