More Info:

Ensure that Function endpoint is not open to the internet 0.0.0.0/0

Risk Level

Medium

Address

Security

Compliance Standards

SOC2, ISO27001, HITRUST, NISTCSF, PCIDSS

Triage and Remediation

Remediation

Sure, here are the step-by-step instructions to remediate the “Cloud Functions Endpoint Should Not Be Publicly Accessible” misconfiguration for GCP using the GCP console:

  1. Open the Google Cloud Console and select the project that contains the Cloud Function you want to remediate.

  2. In the navigation menu, go to “Cloud Functions” under the “Compute” section.

  3. Select the Cloud Function that you want to remediate.

  4. Click on the “Permissions” tab in the Cloud Function details page.

  5. Under the “Ingress settings” section, click on the “Allow internal traffic only” radio button.

  6. Click on the “Save” button to apply the changes.

  7. Verify that the Cloud Function is no longer publicly accessible by attempting to access the function’s endpoint URL from a browser or using a tool like curl. You should receive an error message stating that access is denied.

By following these steps, you have successfully remediated the “Cloud Functions Endpoint Should Not Be Publicly Accessible” misconfiguration for GCP using the GCP console.

Additional Reading: