More Info:

Security monitoring and forensics cannot depend solely on IP addresses from VPC flow logs, especially when considering the dynamic IP usage of cloud resources, HTTP virtual host routing, and other technology that can obscure the DNS name used by a client from the IP address. Monitoring of Cloud DNS logs provides visibility to DNS names requested by the clients within the VPC. These logs can be monitored for anomalous domain names, evaluated against threat intelligence, and Note: For full capture of DNS, firewall must block egress UDP/53 (DNS) and TCP/443 (DNS over HTTPS) to prevent client from using external DNS name server for resolution.

Risk Level

Medium

Address

Security

Compliance Standards

CISGCP

Triage and Remediation

Remediation

To remediate the misconfiguration “Ensure Cloud DNS Logging Is Enabled For All VPC Networks” for GCP using GCP console, follow these steps:

  1. Open the GCP Console and select the project where you want to enable DNS logging.

  2. In the left-hand navigation menu, click on “Network services” and then click on “Cloud DNS”.

  3. Click on the checkbox next to the DNS zone for which you want to enable logging.

  4. Click on the “Edit” button at the top of the page.

  5. Scroll down to the “Logging” section and click on the “Enable” button.

  6. Select the “Logs” tab and choose the logs you want to enable.

  7. Click on the “Save” button to save your changes.

  8. Repeat steps 3-7 for each DNS zone in your project.

By following these steps, you will enable Cloud DNS logging for all VPC networks in your GCP project.

Additional Reading: