You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I have a customer for whom referential constraints would drive outsize business value, enabling them to adopt Forseti Config Validator and Terraform Validator to implement detective and protective controls to safeguard their GCP organization.
Use Case
The specific use case identified is:
Ensuring that all Disks created within a GCP organization have an attached Resource Policy (snapshot schedule) with a particularly configured snapshot period and retention cycle. e.g.: "I want to ensure that all Disks in GCP are snapshotted daily with 30 day retention"
At present, we can pull sufficient information from CAI to determine that there is some ResourcePolicy attached to a Disk:
The ability to build policies that consider both of these CAI asset data objects at once would be valuable, and extensible to other security control implementations.
The text was updated successfully, but these errors were encountered:
We previously had referential constraints prior to integrating with Constraint Framework, however, there are some scaling issues for larger organizations. Referential constraints entail having the entire set of resources loaded into memory and Golang experiences roughly 60x increase in memory footprint for parsed JSON (eg, a 1GB CAI export will require 60GB of physical memory).
Enabling referential constraints would require implementing the rego function matching_reviews_and_constraints in pkg/gcptarget/library.go, creating the appropriate unit tests, plumbing through functionality for loading CAI information into Constraint Framework, and invoking the audit. Unfortunately, I have no plans to implement it at this time, however, I am willing to review pull requests.
Summary
I have a customer for whom referential constraints would drive outsize business value, enabling them to adopt Forseti Config Validator and Terraform Validator to implement detective and protective controls to safeguard their GCP organization.
Use Case
The specific use case identified is:
At present, we can pull sufficient information from CAI to determine that there is some ResourcePolicy attached to a Disk:
And subsequently pulling the
ResourcePolicy
CAI data yields information about the snapshot schedule:The ability to build policies that consider both of these CAI asset data objects at once would be valuable, and extensible to other security control implementations.
The text was updated successfully, but these errors were encountered: