The following guidelines for the minimum viable security platform align with the data protection pillar.
Basic level guidelines
Implement the following data protection guidelines first.
| Item | Use uniform bucket-level access |
|---|---|
| Description | The Using two different and conflicting systems to manage permissions on storage buckets is complex and a common cause of accidental data leaks. This setting turns off the legacy system (access control lists, or ACLs) and makes the modern, centralized system (IAM) the single source of truth for all permissions. |
| Related information | |
| Item ID | MVSP-CO-1.42 |
| Mapping |
Related NIST-800-53 controls:
Related CRI profile controls:
Compliance Manager control: |
| Item | Restrict Cloud SQL public IP addresses |
|---|---|
| Description | Prevent Cloud SQL from having a public IP address and being directly exposed to the internet by setting the Preventing public IP addresses helps prevent your databases from getting public IP addresses, ensuring that they are private and only accessible from trusted, internal applications. |
| Related information | |
| Item ID | MVSP-CO-1.45 |
| Mapping |
Related NIST-800-53 controls:
Related CRI profile controls:
Compliance Manager control: |
Intermediate level guidelines
After you implemented the basic guidelines, implement the following data protection guidelines.
| Item | Block public access to Cloud Storage buckets |
|---|---|
| Description | The |
| Related information | |
| Item ID | MVSP-CO-1-43 |
| Mapping |
Related NIST-800-53 controls:
Related CRI profile controls:
Compliance Manager control: |
| Item | Review BigQuery dataset access |
|---|---|
| Description | Ensure that BigQuery doesn't have datasets that are open to public access unless the datasets are intended to be public. Datasets in BigQuery often contain sensitive data. Reviewing dataset access helps you ensure that you don't accidentally or unintentionally expose data to the internet. |
| Related information | |
| Item ID | MVSP-CO-1.46 |
| Mapping |
Related NIST-800-53 controls:
Related CRI profile controls:
Compliance Manager control: |
Advanced level guidelines
After you implemented the intermediate guidelines, implement the following data protection guidelines.
| Item | Create a managed encryption strategy |
|---|---|
| Description | Create an encryption management strategy using Cloud Key Management Service (Cloud KMS) with Autokey, Cloud External Key Manager (Cloud EKM), or both. This strategy lets your organization use and manage its own encryption keys to meet your specific requirements. Using your own encryption keys provides granular, auditable control over data access, including the ability to immediately block access to data by disabling the key. |
| Related information | |
| Item ID | MVSP-CO-1.44 |
| Mapping |
Related NIST-800-53 controls:
Related CRI profile controls:
|