More Info:

Ensures that SQL instances are not publicly accessible. Public IP associated with these SQL DB Instances should be removed.

Risk Level

Critical

Address

Security

Compliance Standards

CISGCP, CBP, HITRUST, SOC2, GDPR, NISTCSF, PCIDSS, FedRAMP

Triage and Remediation

Remediation

Sure, here are the step by step instructions to remediate the misconfiguration “DB Instances Should Not Be Publicly Accessible” for GCP using GCP console:

  1. Open the GCP Console and select the project where the misconfiguration exists.
  2. Navigate to the Cloud SQL instances page.
  3. Select the instance that you want to remediate.
  4. Click on the “Edit” button at the top of the page.
  5. Scroll down to the “Public IP” section and select “No” for the “Public IP” option.
  6. Click on the “Save” button at the bottom of the page to apply the changes.

After following these steps, the public IP address of the instance will be removed and the instance will no longer be publicly accessible.

Additional Reading: