Skip to content

Latest commit

 

History

History
28 lines (22 loc) · 2.05 KB

File metadata and controls

28 lines (22 loc) · 2.05 KB

CloudSploit

GOOGLE / VPC Network / Open DNS

Quick Info

Plugin Title Open DNS
Cloud GOOGLE
Category VPC Network
Description Determines if TCP or UDP port 53 for DNS is open to the public
More Info While some ports such as HTTP and HTTPS are required to be open to the public to function properly, more sensitive services such as DNS should be restricted to known IP addresses.
GOOGLE Link https://cloud.google.com/vpc/docs/using-firewalls
Recommended Action Restrict TCP and UDP port 53 to known IP addresses.

Detailed Remediation Steps

  1. Log into the Google Cloud Platform Console.
  2. Scroll down the left navigation panel and choose the "Networking" to select the "Firewall rules" option under the "VPC network."
  3. On the "Firewall rules" page, select the "Firewall rule" which needs to be verified.
  4. On the selected "Firewall rules", if "TCP or UDP port 53 for DNS" are open to the public then the selected "Firewall rule" is not as per the best standards.
  5. Repeat steps number 2 - 4 to verify another "Firewall rule" in the network.
  6. Navigate to "VPC network" and choose the "Firewall rules" option under the "Networking" and select the "Firewall rule" which needs to be restricted to known IP addresses.
  7. On the "Firewall rules" page, click on the "Edit" button at the top and enter the "Source IP ranges" as per the requirements.
  8. Click on the "Save" button at the bottom to make the changes.
  9. Repeat steps number 6 - 8 to restrict TCP and UDP port 53 to known IP addresses.