Turbot Guardrails Hub 
Hub
  • Mods
  • Policy Packs
  • Docs
  • Home
ModsPolicy PacksDocsHome
Policy Packs
GCP CIS v2.0.0 - Section 3 - Networking
  • GCP > DNS > Managed Zone > Approved
  • GCP > DNS > Managed Zone > Approved > Custom
  • GCP > DNS > Managed Zone > DNSSEC Configuration
  • GCP > Network > Firewall > Approved
  • GCP > Network > Firewall > Approved > Custom
  • GCP > Network > Firewall > Ingress Rules > Approved
  • GCP > Network > Firewall > Ingress Rules > Approved > Rules
  • GCP > Network > Network > Approved
  • GCP > Network > Network > Approved > Custom
  • GCP > Network > SSL Policy > Minimum TLS Version
  • GCP > Network > SSL Policy > Profile
  • GCP > Network > Subnetwork > Flow Log
Get Involved
Discuss on Slack

Policy Setting: GCP > DNS > Managed Zone > DNSSEC Configuration

Policies

This policy setting is dependent on the following policy types:

  • GCP > DNS > Managed Zone > DNSSEC Configuration

Source

resource "turbot_policy_setting" "gcp_dns_managed_zone_dnssec_configuration" {
resource = turbot_policy_pack.main.id
type = "tmod:@turbot/gcp-dns#/policy/types/managedZoneDnssecConfiguration"
note = "GCP CIS v2.0.0 - Control: 3.3"
value = "Check: Enabled"
# value = "Enforce: Enabled"
}
Guardrails
Guardrails Hub
  • Hub
  • Docs
  • Blog
  • Changelog
Products
  • GuardrailsGuardrails
  • PipesPipes
  • SteampipeSteampipe
  • PowerpipePowerpipe
  • FlowpipeFlowpipe
  • TailpipeTailpipe
Turbot
  • Home
  • About us
  • We're hiring!
  • Contact us
Community

Our community of practitioners love to discuss cloud governance & security.

Slack logoJoin us on Slack →

System StatusLegalSecurity
Terms of UseSecurityPrivacy