More Info:

Ensure that “Restrict Authorized Networks on Cloud SQL instances” policy is enforced for your Google Cloud Platform (GCP) organization to deny IAM members to add authorized networks in order to provide access to your security-critical SQL database instances.

Risk Level

Medium

Address

Security, Operational Maturity

Compliance Standards

CBP

Triage and Remediation

Remediation

To remediate the “Restrict Authorized Networks on Cloud SQL instances” misconfiguration on GCP using the GCP console, please follow these steps:

  1. Login to your GCP Console and navigate to the Cloud SQL Instances page.

  2. Select the Cloud SQL instance that you want to remediate.

  3. Click on the “Edit” button at the top of the page.

  4. Scroll down to the “Authorized networks” section.

  5. Click on the “Add network” button.

  6. In the “Network” field, enter the IP address or CIDR range of the network that you want to authorize.

  7. In the “Name” field, enter a name for the network.

  8. Click the “Done” button.

  9. Repeat steps 5-8 for each network that you want to authorize.

  10. Once you have added all the authorized networks, click on the “Save” button at the bottom of the page.

  11. Verify that the authorized networks are restricted and only authorized IP addresses or CIDR ranges can access the Cloud SQL instance.

By following these steps, you have successfully remediated the “Restrict Authorized Networks on Cloud SQL instances” misconfiguration on GCP using the GCP console.