A RetroSearch Logo

Home - News ( United States | United Kingdom | Italy | Germany ) - Football scores

Search Query:

Showing content from https://cloud.google.com/storage/docs/org-policy-constraints below:

Organization policy constraints for Cloud Storage

This page provides supplemental information about organization policy constraints that apply to Cloud Storage. Use constraints to enforce bucket and object behaviors across an entire project or organization. Organization policy constraints can either be boolean constraints or list constraints.

Note that enforcing or disabling any constraints might take up to 10 minutes to go into effect.

Cloud Storage constraints

The following constraints can be applied to an organization policy and relate to Cloud Storage:

Enforce public access prevention

Constraint Name: constraints/storage.publicAccessPrevention Constraint Type: boolean

When you apply the publicAccessPrevention constraint on a resource, public access is restricted for all buckets and objects, both new and existing, under that resource.

Soft delete retention duration

Constraint Name: constraints/storage.softDeletePolicySeconds Constraint Type: list

When you apply the softDeletePolicySeconds constraint, you specify one or more durations as part of the constraint. Once set, the bucket soft delete policy must include one of the specified durations. softDeletePolicySeconds is required when creating a new bucket and when adding or updating the soft delete retention duration (softDeletePolicy.retentionDuration) of a pre-existing bucket; however, it does not otherwise affect pre-existing buckets.

If you set multiple softDeletePolicySeconds constraints at different resource levels, they are enforced hierarchically. For this reason, it's recommended that you set the inheritFromParent field to true, which ensures that policies at higher layers are also considered.

Bucket retention policy duration in seconds

Constraint Name: constraints/storage.retentionPolicySeconds Constraint Type: list

When you apply the retentionPolicySeconds constraint, you specify one or more durations as part of the constraint. Once set, bucket retention policies must include one of the specified durations. retentionPolicySeconds is required when creating a new bucket and when adding or updating the retention period of a pre-existing bucket; however, it's not otherwise required on pre-existing buckets.

If you set multiple retentionPolicySeconds constraints at different resource levels, they are enforced hierarchically. For this reason, it's recommended that you set the inheritFromParent field to true, which ensures that policies at higher layers are also considered.

Require uniform bucket-level access

Constraint Name: constraints/storage.uniformBucketLevelAccess Constraint Type: boolean

When you apply the uniformBucketLevelAccess constraint, new buckets must enable the uniform bucket-level access feature, and pre-existing buckets with this feature enabled cannot disable it. Pre-existing buckets with uniform bucket-level access disabled are not required to enable it.

Note: Some organizations have the uniformBucketLevelAccess constraint enabled by default. To find out whether your organization has the uniformBucketLevelAccess constraint enabled or disabled, contact your organization administrator. Detailed audit logging mode

Constraint Name: constraints/gcp.detailedAuditLoggingMode Constraint Type: boolean

When you apply the detailedAuditLoggingMode constraint, Cloud Audit Logs logs associated with Cloud Storage operations contain detailed request and response information. This constraint is recommended to be used in conjunction with Bucket Lock and Object Retention Lock when seeking various compliances such as SEC Rule 17a-4(f), CFTC Rule 1.31(c)-(d), and FINRA Rule 4511(c).

Logged information includes query parameters, path parameters, and request body parameters. Logs exclude certain parts of requests and responses that are associated with sensitive information. For example, logs exclude:

When using this constraint, note the following:

Restrict authentication types

Constraint Name: constraints/storage.restrictAuthTypes Constraint Type: list

When you apply the restrictAuthTypes constraint, requests to access Cloud Storage resources using the restricted authentication type fail, regardless of the validity of the request. You can use the restrictAuthTypes constraint to restrict HMAC keys to meet regulatory requirements or increase the security of your data.

The list constraint explicitly denies specific authentication types while permitting all others. To do so, you must list the restricted authentication types in the deniedValues key within the rules of the restrictAuthTypes constraint. An error occurs if you try to list the restricted authentication types in the allowedValues key.

You can restrict the following authentication types:

When you enable this constraint, the following occurs:

When using the restrictAuthTypes constraint, be aware of existing resources that depend on HMAC authentication. For example, if you migrated from Amazon Simple Storage Service (Amazon S3), your application likely uses HMAC keys to authenticate requests to Cloud Storage. You can use the Cloud Monitoring metric storage.googleapis.com/authn/authentication_count to track the number of times HMAC keys have been used to authenticate requests.

Restrict unencrypted HTTP requests

Constraint Name: constraints/storage.secureHttpTransport Constraint Type: boolean

When you apply the secureHttpTransport constraint, all unencrypted HTTP access to Cloud Storage resources is denied.

Additional constraints

The following organization policy constraints apply more generally throughout Google Cloud, but are often applied to the Cloud Storage service:

Conditionally allow or deny organization policy constraints

Tags provides a way to conditionally allow or deny organization policies based on whether a Cloud Storage bucket has a specific tag. See setting an organization policy with tags for detailed instructions.

What's next

RetroSearch is an open source project built by @garambo | Open a GitHub Issue

Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo

HTML: 3.2 | Encoding: UTF-8 | Version: 0.7.5