More Info:

Determines whether the default VPC is being used for launching new services or artifacts. The default VPC should not be used in order to avoid launching multiple services in the same network which may not require connectivity. Each application, or network tier, should use its own VPC.

Risk Level

High

Address

Security

Compliance Standards

CISGCP, CBP, ISO27001, GDPR, SOC2, NISTCSF

Triage and Remediation

Remediation

To remediate the misconfiguration “Default VPC should not be used” for GCP using the GCP console, follow these steps:

  1. Login to the GCP console at https://console.cloud.google.com/
  2. Select the project that is using the default VPC.
  3. In the left navigation pane, select “VPC network” and then select “VPC network”.
  4. Click on the name of the default VPC.
  5. Click on “Edit” at the top of the screen.
  6. In the “Edit VPC network” screen, uncheck the “Default” checkbox.
  7. Click “Save” to apply the changes.

This will remove the default VPC from the project, which is a best practice for security and network segmentation. You can then create custom VPCs with specific configurations to meet your project’s needs.

Additional Reading: