Policy: GCP > Project > Organization Policy > Enforce Public Access Prevention
Manage the GCP Organization Policy "Enforce Public Access Prevention" for the project.
Secure your Cloud Storage data from public exposure by enforcing public access prevention.
This governance policy prevents existing and future resources from being accessed via the public internet by disabling and blocking ACLs and IAM permissions that grant access to allUsers and allAuthenticatedUsers. Enforce this policy on the entire organization (recommended), specific projects, or specific folders to ensure no data is publicly exposed.
This policy overrides existing public permissions. Public access will be revoked for existing buckets and objects after this policy is enabled.
Resource Types
This policy targets the following resource types:
Primary Policy
This policy is used with the following primary policy:
Controls
- GCP > Project > Organization Policy
- GCP > Project > Organization Policy > Enforce Public Access Prevention
Policy Specification
Schema Type |
|
---|---|
Default |
|
Valid Values [YAML] |
|
Examples [YAML] |
|
Category
In Your Workspace
Developers
- tmod:@turbot/turbot#/control/categories/policy
- tmod:@turbot/gcp-orgpolicy#/policy/types/storagePublicAccessPrevention
- turbot graphql policy-type --id "tmod:@turbot/gcp-orgpolicy#/policy/types/storagePublicAccessPrevention"
- turbot graphql policy-settings --filter "policyTypeId:tmod:@turbot/gcp-orgpolicy#/policy/types/storagePublicAccessPrevention"
Get Policy TypeGet Policy Settings