This document includes the best practices and guidelines for Google Cloud services such as Pub/Sub, Dataflow, and Cloud Run functions when running generative AI workloads on Google Cloud.
Define VM instances that can enable IP forwarding
| Google control ID | VPC-CO-6.3 |
|---|---|
| Implementation | Required |
| Description | The compute.vmCanIpForward constraint defines the VM instances that can enable IP forwarding. By default, any VM can enable IP forwarding in any virtual network. Specify VM instances using one of the following formats:
|
| Applicable products |
|
| Path | constraints/compute.vmCanIpForward |
| Operator | = |
| Value |
|
| Type | List |
| Related NIST-800-53 controls |
|
| Related CRI profile controls |
|
| Related information |
Disable VM-nested virtualization
| Google control ID | VPC-CO-6.6 |
|---|---|
| Implementation | Required |
| Description | The compute.disableNestedVirtualization boolean constraint disables hardware-accelerated nested virtualization for Compute Engine VMs. |
| Applicable products |
|
| Path | constraints/compute.disableNestedVirtualization |
| Operator | Is |
| Value |
|
| Type | Boolean |
| Related NIST-800-53 controls |
|
| Related CRI profile controls |
|
| Related information |
Restrict external IP addresses on VMs
| Google control ID | VPC-CO-6.2 |
|---|---|
| Implementation | Required |
| Description | Unless needed, prevent the creation of Compute Engine instances with public IP addresses. The Prevent Compute Engine instances from having external IP addresses to drastically reduce their exposure to the internet. Any instance with an external IP address is immediately discoverable and becomes a direct target for automated scans, brute-force attacks, and attempts to exploit vulnerabilities. Instead, require instances to use private IP addresses and manage access through controlled, authenticated, and logged pathways like the Identity-Aware Proxy (IAP) tunnel or a bastion host. Adopting this deny-by-default posture is a foundational security best practice that helps minimize your attack surface and enforces a zero-trust approach to your network. This constraint isn't retroactive. |
| Applicable products |
|
| Path | constraints/compute.vmExternalIpAccess |
| Operator | = |
| Value |
|
| Type | List |
| Related NIST-800-53 controls |
|
| Related CRI profile controls |
|
| Related information |
Define permitted external IP addresses for VM instances
| Google control ID | CBD-CO-6.3 |
|---|---|
| Implementation | Required |
| Description | The |
| Applicable products |
|
| Path | compute.vmExternalIpAccess |
| Operator | = |
| Value |
|
| Type | List |
| Related NIST-800-53 controls |
|
| Related CRI profile controls |
|
| Related information |
Require VPC connector for Cloud Run functions
| Google control ID | CF-CO-4.4 |
|---|---|
| Implementation | Required |
| Description | The |
| Applicable products |
|
| Path | constraints/cloudfunctions.requireVPCConnector |
| Operator | = |
| Value |
|
| Type | Boolean |
| Related NIST-800-53 controls |
|
| Related CRI profile controls |
|
| Related information |
Configure message storage policies
| Google control ID | PS-CO-4.1 |
|---|---|
| Implementation | Optional |
| Description | If you publish messages to the global Pub/Sub endpoint, Pub/Sub automatically stores the messages in the nearest Google Cloud region. To control which regions your messages are stored in, configure a message storage policy on your topic.
Use one of the following ways to configure message storage policies for topics:
|
| Applicable products |
|
| Related NIST-800-53 controls |
|
| Related CRI profile controls |
|
| Related information |
Turn off external IP addresses for Dataflow jobs
| Google control ID | DF-CO-6.1 |
|---|---|
| Implementation | Optional |
| Description | Turn off external IP addresses for administrative and monitoring tasks that are related to Dataflow jobs. Instead, configure access to your Dataflow worker VMs using SSH. Enable Private Google Access and specify one of the following options in your Dataflow job:
Where:
|
| Applicable products |
|
| Related NIST-800-53 controls |
|
| Related CRI profile controls |
|
| Related information |
Use network tags for firewall rules
| Google control ID | DF-CO-6.2 |
|---|---|
| Implementation | Optional |
| Description | Network tags are text attributes that attach to Compute Engine VMs such as Dataflow worker VMs. Network tags let you make VPC network firewall rules and some custom static routes applicable to specific VM instances. Dataflow supports adding network tags to all worker VMs that run a particular Dataflow job. |
| Applicable products |
|
| Related NIST-800-53 controls |
|
| Related CRI profile controls |
|
| Related information |
What's next
Review data management controls.
See more Google Cloud security best practices and guidelines for generative AI workloads.