MEDIUM
Source
CloudSploit
ID
private-access-enabled

Private Access Enabled

Ensures Private Google Access is enabled for all Subnets

Private Google Access allows VM instances on a subnet to reach Google APIs and services without an IP address. This creates a more secure network for the internal communication.

Follow the appropriate remediation steps below to resolve the issue.

  1. Log into the Google Cloud Platform Console.

  2. Scroll down the left navigation panel and choose the “Networking” to select the “VPC networks” option under the “VPC network.”Step

  3. On the VPC network page, select the VPC which needs to be verified. Step

  4. On the “Subnet details” page, scroll down and check the “Private Google access” option. If it’s set to “Off” then the selected VPC don’t have “Google Access” enabled for all the subnets.Step

  5. Repeat steps number 2 - 4 to verifiy other VPC’s in the account.

  6. Navigate to “VPC network” and choose the “VPC networks” option under the “Networking” and select the “VPC network” which needs to enabled “Google Access” for all the subents.Step

  7. On the “Subnet details” page, click on the “Edit” button at the top. Step

  8. On the “Subnet details Edit” page, scroll down the page and click on the “ON” option below the “Private Google access.”Step

  9. Click on the “Save” button at the bottom of the page to make the changes.Step

  10. Repeat steps number 6 - 9 to ensures “Private Google Access” is enabled for all Subnets.