- Step 1: Open the Policy Pack
- Step 2: Modify the policy setting
- Step 3: Enable calculated mode
- Step 4: Launch calculated policy builder
- Step 5: Choose test resource
- Step 6: Build query
- Step 7: View query result
- Step 8: Add the Jinja2 template
- Step 9: Save the calculated policy to the policy pack
- Step 10: Observe controls for bucket access control
- Step 11: Label the bucket
- Step 12: Observe the effect
- Step 13: Review
- Next Steps
- Progress tracker
Create a Calculated Exception to a Guardrails GCP Policy
In this guide you'll learn how to make dynamic policy exceptions based on resource tags. These Calculated Policies enable you to implement business logic when designing your governance controls.
Some typical examples of how to use calculated polices are:
- Dynamic tagging of resources based on resource metadata.
- Creating policy exceptions for different classes of resources.
- Taking enforcement action for based on resource tags.
This guide will walk you through a simple calculated policy based on resource tags.
This is the seventh guide in the Getting started with GCP series.
Prerequisites
- Completion of the previous guides in this series.
- Access to the Guardrails console with administrative privileges.
- Access to the GCP console with permissions to label GCP buckets.
Step 1: Open the Policy Pack
Choose Policies from the top navigation bar. Select the Enforce Uniform Access is Enabled for GCP Storage Buckets Policy Pack from the list on the right.
Step 2: Modify the policy setting
The bucket's access control is currently statically set to Check: Uniform
. Use the pencil icon on the right side of the policy setting to edit the policy.
Step 3: Enable calculated mode
Select the blue Enable calculated mode link.
Step 4: Launch calculated policy builder
Select Launch calculated policy builder.
Step 5: Choose test resource
Calculated policies work across all resources in scope of the policy setting. While building a calc policy it is useful to test the business logic against real resources in your environment. For this guide you will find and select one of the previously-created test buckets by searching in the Test Resource field.
Step 6: Build query
In the Query Input field we will use Select Snippet to prepopulate our GraphQL query. Choose Get bucket from the dropdown.
Step 7: View query result
Guardrails inserts a GraphQL query for bucket tags into the Input pane, and then runs the query against the selected test resource. The result, in the Output pane, shows there are no tags on the bucket.
Step 8: Add the Jinja2 template
Our business logic is created in the Template
section, using Nunjucks syntax.
Copy this template code:
{% if $.bucket.turbot.tags.environment == "development" %}'Skip'{% else %}'Check: Uniform'{% endif %}
And paste it into the template pane.
Guardrails evaluates the template in the context of the chosen Test Resource. The template output, Check: Uniform
, is the calculated policy value that will govern any bucket’s GCP > Storage > Bucket > Access Control policy if the bucket is labeled with environment:development
. Only these labeled buckets will be required to have uniform access enabled. Others will be skipped, whether or not they enable uniform access.
The result confirms that Check: Uniform
is valid for this policy type. Why? Because the test bucket does not have a tag { "environment": "development" }
.
Select Update
Step 9: Save the calculated policy to the policy pack
Select Update.
Step 10: Observe controls for bucket access control
Navigate back to the Controls by State report and set the Type filter to GCP > Storage > Bucket > Access Control. Buckets with uniform access enabled will be in the OK
state. Find a bucket in the Alarm
state to modify, and note its name.
Step 11: Label the bucket
Open the GCP console in another tab, navigate to the bucket identified in the previous step, and assign the tag environment:development
to it.
Step 12: Observe the effect
Return to the Controls by State report in the previous browser tab. Observe that Guardrails notices the change, reevaluates the resource, runs the calculated policy, and changes the status from Alarm
to Skipped
.
Step 13: Review
In this guide you created your first calculated policy and tested it using the control that governs bucket access control.
Next Steps
In the next guide we’ll see how to subscribe to these status alerts via email, Slack, or MS Teams.
Progress tracker
- Prepare a GCP Project for Import to Guardrails
- Connect a GCP Project to Guardrails
- Observe GCP Activity
- Enable Your First Guardrails Policy Pack
- Review Project-Wide Governance
- Create a Static Exception to a Guardrails Policy
- Create a Calculated Exception to a Guardrails GCP Policy
- Send an Alert to Email
- Apply a Quick Action
- Enable Automatic Enforcement