No description
  • HCL 82.9%
  • Makefile 17.1%
Find a file
Vidit Saxena 13f03e027d
Merge pull request #11 from hashicorp/compliance/update-headers
[IND-4227] [COMPLIANCE] Update Copyright Headers
2026-01-13 08:36:53 +05:30
.github Merge pull request #10 from hashicorp/compliance-template 2025-08-13 13:51:12 +10:00
docs/policies Add context to docs and policy descriptions 2022-08-05 15:50:28 +12:00
example [COMPLIANCE] Update Copyright and License Headers 2025-12-09 11:18:25 +00:00
policies [COMPLIANCE] Update Copyright and License Headers 2025-12-09 11:18:25 +00:00
.gitignore Adds standard CI & contributing content (#2) 2022-08-05 10:09:29 -07:00
CONTRIBUTING.md Adds standard CI & contributing content (#2) 2022-08-05 10:09:29 -07:00
LICENSE [COMPLIANCE] Update Copyright and License Headers 2025-12-09 11:18:25 +00:00
Makefile Adds standard CI & contributing content (#2) 2022-08-05 10:09:29 -07:00
readme.md Update readme.md 2022-08-11 11:52:01 -07:00
sentinel.hcl [COMPLIANCE] Update Copyright and License Headers 2025-12-09 11:18:25 +00:00

GCP Compute Sentinel Policies for Terraform

This library, provides prescriptive Terraform policies that can be used to establish secure Terraform configuration for Google Cloud Platform. The policies that are contained in this library are based on the CIS Google Cloud Computing Platform Benchmarks. Terraform Cloud/Enterprise users can use the policies in this library to establish a foundational level of security for the services that they are adopting in Google Cloud Platform.

NOTE:

This Policy Library is not an exhaustive list of all of possible security configurations and architecture that is available in Google Cloud Platform. If you have questions, comments, or have identified ways for us to improve this library, please create a new GitHub issue.

Alternatively, We welcome any contributions that improve the quality of this library! To learn more about contributing and suggesting changes to this library, refer to the contributing guide.


Policies included

  • Ensure VM disks for critical VMs are encrypted with Customer- Supplied Encryption Keys (CSEK) (docs | code)
  • Ensure oslogin is enabled for a Project (docs | code)
  • Ensure 'Enable connecting to serial ports' is not enabled for VM Instance (docs | code)
  • Ensure "Block Project-wide SSH keys" enabled for VM instances (docs | code)
  • Ensure that IP forwarding is not enabled on Instances (docs | code)