This page describes the detective policies that are included in the v1.0 version of the predefined posture template for the National Institute of Standards and Technology (NIST) SP 800-53 standard. This template includes a policy set that defines the Security Health Analytics detectors that apply to workloads that must be compliant with the NIST SP 800-53 standard.
You can deploy this posture template without making any changes.
Security Health Analytics detectors
The following table describes the Security Health Analytics detectors that are included in this posture template.
| Detector name | Description |
|---|---|
BIGQUERY_TABLE_CMEK_DISABLED |
This detector checks whether a BigQuery table isn't configured to use a customer-managed encryption key (CMEK). For more information, see Dataset vulnerability findings. |
PUBLIC_DATASET |
This detector checks whether a dataset is configured to be open to public access. For more information, see Dataset vulnerability findings. |
SQL_CROSS_DB_OWNERSHIP_CHAINING |
This detector checks whether the |
INSTANCE_OS_LOGIN_DISABLED |
This detector checks whether OS Login is not turned on. |
SQL_SKIP_SHOW_DATABASE_DISABLED |
This detector checks whether the |
SQL_EXTERNAL_SCRIPTS_ENABLED |
This detector checks whether the |
VPC_FLOW_LOGS_SETTINGS_NOT_RECOMMENDED |
This detector checks whether VPC Flow Logs is not turned on. |
API_KEY_EXISTS |
This detector checks whether a project is using API keys instead of standard authentication. |
SQL_LOG_MIN_ERROR_STATEMENT_SEVERITY |
This detector checks whether the |
COMPUTE_SERIAL_PORTS_ENABLED |
This detector checks whether serial ports are enabled. |
SQL_LOG_DISCONNECTIONS_DISABLED |
This detector checks whether the |
COMPUTE_PROJECT_WIDE_SSH_KEYS_ALLOWED |
This detector checks whether project-wide SSH keys are being used. |
KMS_PROJECT_HAS_OWNER |
This detector checks whether a user has the Owner permission on a project that includes keys. |
KMS_KEY_NOT_ROTATED |
This detector checks whether rotation for the Cloud Key Management Service encryption is not turned on. |
ESSENTIAL_CONTACTS_NOT_CONFIGURED |
This detector checks whether you have at least one Essential Contact. |
AUDIT_LOGGING_DISABLED |
This detector checks whether audit logging is turned off for a resource. |
LOCKED_RETENTION_POLICY_NOT_SET |
This detector checks whether the locked retention policy is set for logs. |
DNS_LOGGING_DISABLED |
This detector checks whether DNS logging is enabled on the VPC network. |
LOG_NOT_EXPORTED |
This detector checks whether a resource doesn't have a log sink configured. |
KMS_ROLE_SEPARATION |
This detector checks for separation of duties for Cloud KMS keys. |
DISK_CSEK_DISABLED |
This detector checks whether customer supplied encryption key (CSEK) support is turned off for a VM. |
SQL_USER_CONNECTIONS_CONFIGURED |
This detector checks whether the |
API_KEY_APIS_UNRESTRICTED |
This detector checks whether API keys are being used too broadly. |
SQL_LOG_MIN_MESSAGES |
This detector checks whether the |
SQL_LOCAL_INFILE |
This detector checks whether the |
SQL_LOG_MIN_DURATION_STATEMENT_ENABLED |
This detector checks whether the |
DATASET_CMEK_DISABLED |
This detector checks whether CMEK support is turned off for a BigQuery dataset. |
OPEN_SSH_PORT |
This detector checks whether a firewall has an open SSH port that allows generic access. For more information, see Firewall vulnerability findings. |
FIREWALL_NOT_MONITORED |
This detector checks whether log metrics and alerts aren't configured to monitor VPC firewall rule changes. |
SQL_LOG_STATEMENT |
This detector checks whether the |
SQL_PUBLIC_IP |
This detector checks whether a Cloud SQL database has an external IP address. |
IP_FORWARDING_ENABLED |
This detector checks whether IP forwarding is turned on. |
DATAPROC_CMEK_DISABLED |
This detector checks whether CMEK support is turned off for a Dataproc cluster. |
CONFIDENTIAL_COMPUTING_DISABLED |
This detector checks whether Confidential Computing is turned off. |
KMS_PUBLIC_KEY |
This detector checks whether a Cloud Key Management Service cryptographic key is publicly accessible. For more information, see KMS vulnerability findings. |
SQL_INSTANCE_NOT_MONITORED |
This detector checks whether logging is turned off for Cloud SQL configuration changes. |
SQL_TRACE_FLAG_3625 |
This detector checks whether the |
DEFAULT_NETWORK |
This detector checks whether the default network exists in a project. |
DNSSEC_DISABLED |
This detector checks whether DNS security (DNSSEC) is turned off for Cloud DNS. For more information, see DNS vulnerability findings. |
API_KEY_NOT_ROTATED |
This detector checks whether an API key has been rotated within the last 90 days. |
SQL_LOG_CONNECTIONS_DISABLED |
This detector checks whether the |
LEGACY_NETWORK |
This detector checks whether a legacy network exists in a project. |
IAM_ROOT_ACCESS_KEY_CHECK |
This detector checks whether IAM root access key is accessible. |
PUBLIC_IP_ADDRESS |
This detector checks whether an instance has an external IP address. |
OPEN_RDP_PORT |
This detector checks whether a firewall has an open RDP port. |
INSTANCE_OS_LOGIN_DISABLED |
This detector checks whether OS Login is not turned on. |
ADMIN_SERVICE_ACCOUNT |
This detector checks whether a service account has Admin, Owner, or Editor privileges. |
SQL_USER_OPTIONS_CONFIGURED |
This detector checks whether the |
FULL_API_ACCESS |
This detector checks whether an instance is using a default service account with full access to all Google Cloud APIs. |
DEFAULT_SERVICE_ACCOUNT_USED |
This detector checks whether the default service account is being used. |
NETWORK_NOT_MONITORED |
This detector checks whether log metrics and alerts aren't configured to monitor VPC network changes. |
SQL_CONTAINED_DATABASE_AUTHENTICATION |
This detector checks whether the |
PUBLIC_BUCKET_ACL |
This detector checks whether a bucket is publicly accessible. |
LOAD_BALANCER_LOGGING_DISABLED |
This detector checks whether logging is turned off for the load balancer. |
OVER_PRIVILEGED_SERVICE_ACCOUNT_USER |
This detector checks whether a user has service account roles at the project level, instead of for a specific service account. |
SQL_REMOTE_ACCESS_ENABLED |
This detector checks whether the |
CUSTOM_ROLE_NOT_MONITORED |
This detector checks whether logging is turned off for custom role changes. |
AUTO_BACKUP_DISABLED |
This detector checks whether a Cloud SQL database doesn't have automatic backups turned on. |
RSASHA1_FOR_SIGNING |
This detector checks whether RSASHA1 is used for key signing in Cloud DNS zones. |
CLOUD_ASSET_API_DISABLED |
This detector checks whether Cloud Asset Inventory is turned off. |
SQL_LOG_ERROR_VERBOSITY |
This detector checks whether the |
ROUTE_NOT_MONITORED |
This detector checks whether log metrics and alerts aren't configured to monitor VPC network route changes. |
BUCKET_POLICY_ONLY_DISABLED |
This detector checks whether uniform bucket-level access is configured. |
BUCKET_IAM_NOT_MONITORED |
This detector checks whether logging is turned off for IAM permission changes in Cloud Storage. |
PUBLIC_SQL_INSTANCE |
This detector checks whether a Cloud SQL allows connections from all IP addresses. |
SERVICE_ACCOUNT_ROLE_SEPARATION |
This detector checks for separation of duties for service account keys. |
AUDIT_CONFIG_NOT_MONITORED |
This detector checks whether audit configuration changes are being monitored. |
OWNER_NOT_MONITORED |
This detector checks whether logging is turned off for project ownership assignments and changes. |
View the posture template
To view the posture template for NIST 800-53, do the following:
gcloud
Before using any of the command data below, make the following replacements:
-
ORGANIZATION_ID: the numeric ID of the organization
Execute the
gcloud scc posture-templates
describe
command:
Linux, macOS, or Cloud Shell
gcloud scc posture-templates describe \ organizations/ORGANIZATION_ID/locations/global/postureTemplates/nist_800_53
Windows (PowerShell)
gcloud scc posture-templates describe ` organizations/ORGANIZATION_ID/locations/global/postureTemplates/nist_800_53
Windows (cmd.exe)
gcloud scc posture-templates describe ^ organizations/ORGANIZATION_ID/locations/global/postureTemplates/nist_800_53
The response contains the posture template.
REST
Before using any of the request data, make the following replacements:
-
ORGANIZATION_ID: the numeric ID of the organization
HTTP method and URL:
GET https://securityposture.googleapis.com/v1/organizations/ORGANIZATION_ID/locations/global/postureTemplates/nist_800_53
To send your request, expand one of these options:
The response contains the posture template.