More Info:

Ensure that “Restrict Public IP access on Cloud SQL instances” policy is enforced for your Google Cloud organizations. Due to strict security and compliance regulations, you can’t allow GCP members to configure security-critical database instances with public IPs.

Risk Level

Medium

Address

Security, Operational Maturity

Compliance Standards

CISGCP, CBP

Triage and Remediation

Remediation

To remediate the misconfiguration of Restricting Public IP Access for Cloud SQL Instances at Organization Level in GCP, follow these steps:

  1. Open the GCP console and select the organization that you want to remediate the misconfiguration for.

  2. Go to the Cloud SQL Instances page by clicking on the hamburger menu on the top left corner of the console and selecting SQL under the Storage section.

  3. Click on the instance that you want to remediate the misconfiguration for.

  4. Click on the Edit button at the top of the instance details page.

  5. Scroll down to the Connectivity section and click on the Private IP button.

  6. Under the Private IP section, select the checkbox for “Enable Private IP” to allow the instance to be accessed only through private IP addresses.

  7. Click on the Save button at the bottom of the page to apply the changes.

  8. Repeat steps 3-7 for all the Cloud SQL instances in the organization to ensure that they are only accessible through private IP addresses.

By following these steps, you have successfully remediated the misconfiguration of Restricting Public IP Access for Cloud SQL Instances at Organization Level in GCP.