Cloudanix home page
Search...
⌘K
Ask AI
Community
Login
Login
Search...
Navigation
GCP Misconfigurations
Compute Audit
Overview
AWS
Azure
GCP
GitHub
On-Demand Scan
Kubernetes
Integrations
GCP Introduction
Authenticating your GCP account
GCP Pricing
GCP Services which determine your cost
GCP Threats
Getting Started with gcp Realtime Events
GCP Misconfigurations
Getting Started with GCP Audit
CloudSql Audit
Cloud Tasks Monitoring
Dataflow Monitoring
Function Monitoring
Monitoring Compliance
PubSubLite Monitoring
Spanner Monitoring
NoSQL Monitoring
Compute Audit
IAM Audit
BigQuery Monitoring
CDN Monitoring
DNS Monitoring
KMS Monitoring
Kubernetes Audit
Load Balancer Monitoring
Log Monitoring
Storage Audit
Pub/Sub Monitoring
VPC Audit
IAM Deep Dive
Resources
GCP Services which determine your cost
GCP Threats
Getting Started with gcp Realtime Events
On this page
Checks performed
GCP Misconfigurations
Compute Audit
Checks performed
OS Login Should Be Enabled
IP Forwarding Should Be Disabled
Instances Should Be Multi AZ
Total VMs Should Not Exceed Threshold
SSH Keys Should Be Instance Specific
VM Instances Should Not Use Default Service Accounts With Full Access To Cloud APIs
Customer Supplied Encryption Key Should Be Enabled For Disks
Serial Ports Connection Should Be Disabled
Shielded VM Should Be Enabled For Compute Instances
Compute Instances Should Not Have Public IPs
VM Instances Should Not Use Default Service Account
Total Resources Should Be Under Per Account Limit
Ensure That Compute Instances Have Confidential Computing Enabled
NoSQL Monitoring
IAM Audit
Assistant
Responses are generated using AI and may contain mistakes.