policy-library/policies/templates/gcp_compute_zone_v1.yaml (63 lines of code) (raw):

# Copyright 2021 Google LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # https://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # # This template is for policies restricting the locations # of compute (VM instance / persistent disk) resources to # specific zones in GCP. It supports allowlist or denylist # modes, as well as exempting selected assets from the list. apiVersion: templates.gatekeeper.sh/v1alpha1 kind: ConstraintTemplate metadata: name: gcp-compute-zone-v1 spec: crd: spec: names: kind: GCPComputeZoneConstraintV1 validation: openAPIV3Schema: properties: mode: type: string enum: [denylist, allowlist] description: "String identifying the operational mode, allowlist or denylist. In allowlist mode, resources are only allowed in the zones specified in the 'zones' parameter. In denylist mode, resources are allowed in all zones except those listed in the 'zones' parameter." exemptions: type: array items: type: string description: "Array of compute assets to exempt from zonal restriction. String values in the array should correspond to the full name values of exempted devices." zones: type: array items: type: string description: "Array of zone names to be allowed or denied. Should be the simple form of the zone name, e.g. asia-east1-b." targets: validation.gcp.forsetisecurity.org: rego: | # # Copyright 2021 Google LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # https://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # package templates.gcp.GCPComputeZoneConstraintV1 import data.validator.gcp.lib as lib ##################################### # Find Compute Asset Zone Violations ##################################### deny[{ "msg": message, "details": metadata, }] { constraint := input.constraint lib.get_constraint_params(constraint, params) # Verify that resource is Instance or Disk asset := input.asset {asset.asset_type} == {asset.asset_type} & {"compute.googleapis.com/Instance", "compute.googleapis.com/Disk"} # Check if resource is in exempt list exempt_list := params.exemptions matches := {asset.name} & cast_set(exempt_list) count(matches) == 0 # Check that zone is in allowlist/denylist target_zones := params.zones asset_zone_tokens := split(asset.resource.data.zone, "/") asset_zone := asset_zone_tokens[minus(count(asset_zone_tokens), 1)] zone_matches := {asset_zone} & cast_set(target_zones) target_zone_match_count(params.mode, desired_count) count(zone_matches) == desired_count message := sprintf("%v is in a disallowed zone.", [asset.name]) metadata := {"zone": asset_zone} } ################# # Rule Utilities ################# # Determine the overlap between zones under test and constraint # By default (allowlist), we violate if there isn't overlap target_zone_match_count(mode) = 0 { mode != "denylist" } target_zone_match_count(mode) = 1 { mode == "denylist" } #ENDINLINE