200 lines
4.7 KiB
HCL
200 lines
4.7 KiB
HCL
module "cs-org-policy-storage_publicAccessPrevention" {
|
|
source = "terraform-google-modules/org-policy/google//modules/org_policy_v2"
|
|
version = "~> 5.2"
|
|
|
|
policy_root = "organization"
|
|
policy_root_id = var.org_id
|
|
constraint = "storage.publicAccessPrevention"
|
|
policy_type = "boolean"
|
|
exclude_folders = []
|
|
exclude_projects = []
|
|
|
|
rules = [
|
|
{
|
|
enforcement = true
|
|
allow = []
|
|
deny = []
|
|
conditions = []
|
|
}, ]
|
|
}
|
|
|
|
module "cs-org-policy-compute_requireOsLogin" {
|
|
source = "terraform-google-modules/org-policy/google//modules/org_policy_v2"
|
|
version = "~> 5.2"
|
|
|
|
policy_root = "organization"
|
|
policy_root_id = var.org_id
|
|
constraint = "compute.requireOsLogin"
|
|
policy_type = "boolean"
|
|
exclude_folders = []
|
|
exclude_projects = []
|
|
|
|
rules = [
|
|
{
|
|
enforcement = true
|
|
allow = []
|
|
deny = []
|
|
conditions = []
|
|
}, ]
|
|
}
|
|
|
|
module "cs-org-policy-compute_vmExternalIpAccess" {
|
|
source = "terraform-google-modules/org-policy/google//modules/org_policy_v2"
|
|
version = "~> 5.2"
|
|
|
|
policy_root = "organization"
|
|
policy_root_id = var.org_id
|
|
constraint = "compute.vmExternalIpAccess"
|
|
policy_type = "list"
|
|
exclude_folders = []
|
|
exclude_projects = []
|
|
|
|
rules = [
|
|
{
|
|
enforcement = true
|
|
allow = []
|
|
deny = []
|
|
conditions = []
|
|
}, ]
|
|
}
|
|
|
|
module "cs-org-policy-compute_disableNestedVirtualization" {
|
|
source = "terraform-google-modules/org-policy/google//modules/org_policy_v2"
|
|
version = "~> 5.2"
|
|
|
|
policy_root = "organization"
|
|
policy_root_id = var.org_id
|
|
constraint = "compute.disableNestedVirtualization"
|
|
policy_type = "boolean"
|
|
exclude_folders = []
|
|
exclude_projects = []
|
|
|
|
rules = [
|
|
{
|
|
enforcement = true
|
|
allow = []
|
|
deny = []
|
|
conditions = []
|
|
}, ]
|
|
}
|
|
|
|
module "cs-org-policy-compute_disableSerialPortAccess" {
|
|
source = "terraform-google-modules/org-policy/google//modules/org_policy_v2"
|
|
version = "~> 5.2"
|
|
|
|
policy_root = "organization"
|
|
policy_root_id = var.org_id
|
|
constraint = "compute.disableSerialPortAccess"
|
|
policy_type = "boolean"
|
|
exclude_folders = []
|
|
exclude_projects = []
|
|
|
|
rules = [
|
|
{
|
|
enforcement = true
|
|
allow = []
|
|
deny = []
|
|
conditions = []
|
|
}, ]
|
|
}
|
|
|
|
module "cs-org-policy-sql_restrictAuthorizedNetworks" {
|
|
source = "terraform-google-modules/org-policy/google//modules/org_policy_v2"
|
|
version = "~> 5.2"
|
|
|
|
policy_root = "organization"
|
|
policy_root_id = var.org_id
|
|
constraint = "sql.restrictAuthorizedNetworks"
|
|
policy_type = "boolean"
|
|
exclude_folders = []
|
|
exclude_projects = []
|
|
|
|
rules = [
|
|
{
|
|
enforcement = true
|
|
allow = []
|
|
deny = []
|
|
conditions = []
|
|
}, ]
|
|
}
|
|
|
|
module "cs-org-policy-sql_restrictPublicIp" {
|
|
source = "terraform-google-modules/org-policy/google//modules/org_policy_v2"
|
|
version = "~> 5.2"
|
|
|
|
policy_root = "organization"
|
|
policy_root_id = var.org_id
|
|
constraint = "sql.restrictPublicIp"
|
|
policy_type = "boolean"
|
|
exclude_folders = []
|
|
exclude_projects = []
|
|
|
|
rules = [
|
|
{
|
|
enforcement = true
|
|
allow = []
|
|
deny = []
|
|
conditions = []
|
|
}, ]
|
|
}
|
|
|
|
module "cs-org-policy-compute_restrictXpnProjectLienRemoval" {
|
|
source = "terraform-google-modules/org-policy/google//modules/org_policy_v2"
|
|
version = "~> 5.2"
|
|
|
|
policy_root = "organization"
|
|
policy_root_id = var.org_id
|
|
constraint = "compute.restrictXpnProjectLienRemoval"
|
|
policy_type = "boolean"
|
|
exclude_folders = []
|
|
exclude_projects = []
|
|
|
|
rules = [
|
|
{
|
|
enforcement = true
|
|
allow = []
|
|
deny = []
|
|
conditions = []
|
|
}, ]
|
|
}
|
|
|
|
module "cs-org-policy-compute_skipDefaultNetworkCreation" {
|
|
source = "terraform-google-modules/org-policy/google//modules/org_policy_v2"
|
|
version = "~> 5.2"
|
|
|
|
policy_root = "organization"
|
|
policy_root_id = var.org_id
|
|
constraint = "compute.skipDefaultNetworkCreation"
|
|
policy_type = "boolean"
|
|
exclude_folders = []
|
|
exclude_projects = []
|
|
|
|
rules = [
|
|
{
|
|
enforcement = true
|
|
allow = []
|
|
deny = []
|
|
conditions = []
|
|
}, ]
|
|
}
|
|
|
|
module "cs-org-policy-compute_disableVpcExternalIpv6" {
|
|
source = "terraform-google-modules/org-policy/google//modules/org_policy_v2"
|
|
version = "~> 5.2"
|
|
|
|
policy_root = "organization"
|
|
policy_root_id = var.org_id
|
|
constraint = "compute.disableVpcExternalIpv6"
|
|
policy_type = "boolean"
|
|
exclude_folders = []
|
|
exclude_projects = []
|
|
|
|
rules = [
|
|
{
|
|
enforcement = true
|
|
allow = []
|
|
deny = []
|
|
conditions = []
|
|
}, ]
|
|
}
|