Control types for @turbot/gcp-pubsub

GCP > Pub/Sub > API Enabled

Check whether GCP Pub/Sub API is enabled.

API Enabled refers specifically to the API state of a service in a cloud project.
This control determines whether the API state is set as per desired level.

The GCP > Pub/Sub > API Enabled control compares
the API state against the API Enabled policies,
raises an alarm, and takes the defined enforcement action.

URI
tmod:@turbot/gcp-pubsub#/control/types/pubsubApiEnabled

GCP > Pub/Sub > CMDB

Record and synchronize details for the GCP Pub/Sub into the CMDB.

The CMDB control is
responsible for populating and updating all the attributes for that
resource type in the Guardrails CMDB.

Note: If CMDB is set to Skip for a resource, then it will not be added
to the CMDB, and no controls that target it will run.

URI
tmod:@turbot/gcp-pubsub#/control/types/pubsubCmdb
Category

GCP > Pub/Sub > Discovery

Discover GCP Pub/Sub resources and add them to the CMDB.

The Discovery
control is tasked with identifying instances for a particular resource.
The Discovery control will periodically search for new target resources and
save them to the Guardrails CMDB. Once discovered, resources are then
responsible for tracking changes to themselves through the
CMDB control.

URI
tmod:@turbot/gcp-pubsub#/control/types/pubsubDiscovery

GCP > Pub/Sub > Snapshot > Active

Take an action when an GCP Pub/Sub snapshot is not active based on the
GCP > Pub/Sub > Snapshot > Active > * policies.

The Active control determines whether the resource is in active use, and if not, has
the ability to delete / cleanup the resource. When running an automated compliance
environment, it's common to end up with a wide range of alarms that are difficult
and time consuming to clear. The Active control brings automated, well-defined
control to this process.

The Active control checks the status of all defined Active policies for the
resource (GCP > Pub/Sub > Snapshot > Active > *),
raises an alarm, and takes the defined enforcement action. Each Active
sub-policy can calculate a status of active, inactive or skipped. Generally,
if the resource appears to be Active for any reason it will be considered Active.

Note the contrast with Approved, where if the resource appears to be Unapproved
for any reason it will be considered Unapproved.

See Active for more information.

URI
tmod:@turbot/gcp-pubsub#/control/types/snapshotActive

GCP > Pub/Sub > Snapshot > Approved

Take an action when a GCP Pub/Sub snapshot is not approved based on GCP > Pub/Sub > Snapshot > Approved > * policies.

The Approved control checks the status of the defined Approved sub-policies for the resource. If the resource is not approved according to any of these policies, this control raises an alarm and takes the defined enforcement action.

For any enforcement actions that specify if new, e.g., Enforce: Delete unapproved if new, this control will only take the enforcement actions for resources created within the last 60 minutes.

See Approved for more information.

URI
tmod:@turbot/gcp-pubsub#/control/types/snapshotApproved

GCP > Pub/Sub > Snapshot > CMDB

Record and synchronize details for the GCP Pub/Sub snapshot into the CMDB.

The CMDB control is
responsible for populating and updating all the attributes for that
resource type in the Guardrails CMDB.

Note: If CMDB is set to Skip for a resource, then it will not be added
to the CMDB, and no controls that target it will run.

URI
tmod:@turbot/gcp-pubsub#/control/types/snapshotCmdb
Category

GCP > Pub/Sub > Snapshot > Discovery

Discover GCP Pub/Sub snapshot resources and add them to the CMDB.

The Discovery
control is tasked with identifying instances for a particular resource.
The Discovery control will periodically search for new target resources and
save them to the Guardrails CMDB. Once discovered, resources are then
responsible for tracking changes to themselves through the
CMDB control.

URI
tmod:@turbot/gcp-pubsub#/control/types/snapshotDiscovery

GCP > Pub/Sub > Snapshot > Labels

Take an action when an GCP Pub/Sub snapshot labels is not updated based on the GCP > Pub/Sub > Snapshot > Labels > * policies.

If the resource is not updated with the labels defined in GCP > Pub/Sub > Snapshot > Labels > Template, this control raises an alarm and takes the defined enforcement action.

See Labels for more information.

URI
tmod:@turbot/gcp-pubsub#/control/types/snapshotLabels

GCP > Pub/Sub > Snapshot > Usage

The Usage control determines whether the number of GCP Pub/Sub snapshot resources exceeds the configured usage limit for this project.

You can configure the behavior of this control with the GCP > Pub/Sub > Snapshot > Usage policy, and set the limit with the GCP > Pub/Sub > Snapshot > Usage > Limit policy.

URI
tmod:@turbot/gcp-pubsub#/control/types/snapshotUsage

GCP > Pub/Sub > Subscription > Active

Take an action when an GCP Pub/Sub subscription is not active based on the
GCP > Pub/Sub > Subscription > Active > * policies.

The Active control determines whether the resource is in active use, and if not, has
the ability to delete / cleanup the resource. When running an automated compliance
environment, it's common to end up with a wide range of alarms that are difficult
and time consuming to clear. The Active control brings automated, well-defined
control to this process.

The Active control checks the status of all defined Active policies for the
resource (GCP > Pub/Sub > Subscription > Active > *),
raises an alarm, and takes the defined enforcement action. Each Active
sub-policy can calculate a status of active, inactive or skipped. Generally,
if the resource appears to be Active for any reason it will be considered Active.

Note the contrast with Approved, where if the resource appears to be Unapproved
for any reason it will be considered Unapproved.

See Active for more information.

URI
tmod:@turbot/gcp-pubsub#/control/types/subscriptionActive

GCP > Pub/Sub > Subscription > Approved

Take an action when a GCP Pub/Sub subscription is not approved based on GCP > Pub/Sub > Subscription > Approved > * policies.

The Approved control checks the status of the defined Approved sub-policies for the resource. If the resource is not approved according to any of these policies, this control raises an alarm and takes the defined enforcement action.

For any enforcement actions that specify if new, e.g., Enforce: Delete unapproved if new, this control will only take the enforcement actions for resources created within the last 60 minutes.

See Approved for more information.

URI
tmod:@turbot/gcp-pubsub#/control/types/subscriptionApproved

GCP > Pub/Sub > Subscription > CMDB

Record and synchronize details for the GCP Pub/Sub subscription into the CMDB.

The CMDB control is
responsible for populating and updating all the attributes for that
resource type in the Guardrails CMDB.

Note: If CMDB is set to Skip for a resource, then it will not be added
to the CMDB, and no controls that target it will run.

URI
tmod:@turbot/gcp-pubsub#/control/types/subscriptionCmdb
Category

GCP > Pub/Sub > Subscription > Configured

Maintain pub/sub subscription configuration

URI
tmod:@turbot/gcp-pubsub#/control/types/subscriptionConfigured

GCP > Pub/Sub > Subscription > Discovery

Discover GCP Pub/Sub subscription resources and add them to the CMDB.

The Discovery
control is tasked with identifying instances for a particular resource.
The Discovery control will periodically search for new target resources and
save them to the Guardrails CMDB. Once discovered, resources are then
responsible for tracking changes to themselves through the
CMDB control.

URI
tmod:@turbot/gcp-pubsub#/control/types/subscriptionDiscovery

GCP > Pub/Sub > Subscription > Labels

Take an action when an GCP Pub/Sub subscription labels is not updated based on the GCP > Pub/Sub > Subscription > Labels > * policies.

If the resource is not updated with the labels defined in GCP > Pub/Sub > Subscription > Labels > Template, this control raises an alarm and takes the defined enforcement action.

See Labels for more information.

URI
tmod:@turbot/gcp-pubsub#/control/types/subscriptionLabels

GCP > Pub/Sub > Subscription > Policy

URI
tmod:@turbot/gcp-pubsub#/control/types/subscriptionPolicy

GCP > Pub/Sub > Subscription > Policy > Trusted Access

Take an action when GCP Pub/Sub Subscription policy is not trusted based on the
GCP > Pub/Sub > Subscription > Trusted Access > * policies.

The Trusted Access control evaluates the IAM policy against the list of allowed
members in each of the Trusted Access sub-policies (Trusted Access > Domains,
Trusted Access > Groups, etc)., this control raises an alarm and takes the
defined enforcement action.

If set to "Enforce: Trusted Access > *", access to non-trusted
members will be removed.

URI
tmod:@turbot/gcp-pubsub#/control/types/subscriptionPolicyTrustedAccess

GCP > Pub/Sub > Subscription > Usage

The Usage control determines whether the number of GCP Pub/Sub subscription resources exceeds the configured usage limit for this topic.

You can configure the behavior of this control with the GCP > Pub/Sub > Subscription > Usage policy, and set the limit with the GCP > Pub/Sub > Subscription > Usage > Limit policy.

URI
tmod:@turbot/gcp-pubsub#/control/types/subscriptionUsage

GCP > Pub/Sub > Topic > Active

Take an action when an GCP Pub/Sub topic is not active based on the
GCP > Pub/Sub > Topic > Active > * policies.

The Active control determines whether the resource is in active use, and if not, has
the ability to delete / cleanup the resource. When running an automated compliance
environment, it's common to end up with a wide range of alarms that are difficult
and time consuming to clear. The Active control brings automated, well-defined
control to this process.

The Active control checks the status of all defined Active policies for the
resource (GCP > Pub/Sub > Topic > Active > *),
raises an alarm, and takes the defined enforcement action. Each Active
sub-policy can calculate a status of active, inactive or skipped. Generally,
if the resource appears to be Active for any reason it will be considered Active.

Note the contrast with Approved, where if the resource appears to be Unapproved
for any reason it will be considered Unapproved.

See Active for more information.

URI
tmod:@turbot/gcp-pubsub#/control/types/topicActive

GCP > Pub/Sub > Topic > Approved

Take an action when a GCP Pub/Sub topic is not approved based on GCP > Pub/Sub > Topic > Approved > * policies.

The Approved control checks the status of the defined Approved sub-policies for the resource. If the resource is not approved according to any of these policies, this control raises an alarm and takes the defined enforcement action.

For any enforcement actions that specify if new, e.g., Enforce: Delete unapproved if new, this control will only take the enforcement actions for resources created within the last 60 minutes.

See Approved for more information.

URI
tmod:@turbot/gcp-pubsub#/control/types/topicApproved

GCP > Pub/Sub > Topic > CMDB

Record and synchronize details for the GCP Pub/Sub topic into the CMDB.

The CMDB control is
responsible for populating and updating all the attributes for that
resource type in the Guardrails CMDB.

Note: If CMDB is set to Skip for a resource, then it will not be added
to the CMDB, and no controls that target it will run.

URI
tmod:@turbot/gcp-pubsub#/control/types/topicCmdb
Category

GCP > Pub/Sub > Topic > Configured

Maintain pub/sub topic configuration

URI
tmod:@turbot/gcp-pubsub#/control/types/topicConfigured

GCP > Pub/Sub > Topic > Discovery

Discover GCP Pub/Sub topic resources and add them to the CMDB.

The Discovery
control is tasked with identifying instances for a particular resource.
The Discovery control will periodically search for new target resources and
save them to the Guardrails CMDB. Once discovered, resources are then
responsible for tracking changes to themselves through the
CMDB control.

URI
tmod:@turbot/gcp-pubsub#/control/types/topicDiscovery

GCP > Pub/Sub > Topic > Labels

Take an action when an GCP Pub/Sub topic labels is not updated based on the GCP > Pub/Sub > Topic > Labels > * policies.

If the resource is not updated with the labels defined in GCP > Pub/Sub > Topic > Labels > Template, this control raises an alarm and takes the defined enforcement action.

See Labels for more information.

URI
tmod:@turbot/gcp-pubsub#/control/types/topicLabels

GCP > Pub/Sub > Topic > Policy

URI
tmod:@turbot/gcp-pubsub#/control/types/topicPolicy

GCP > Pub/Sub > Topic > Policy > Trusted Access

Take an action when GCP Pub/Sub Topic policy is not trusted based on the
GCP > Pub/Sub > Topic > Trusted Access > * policies.

The Trusted Access control evaluates the IAM policy against the list of allowed
members in each of the Trusted Access sub-policies (Trusted Access > Domains,
Trusted Access > Groups, etc)., this control raises an alarm and takes the
defined enforcement action.

If set to "Enforce: Trusted Access > *", access to non-trusted
members will be removed.

URI
tmod:@turbot/gcp-pubsub#/control/types/topicPolicyTrustedAccess

GCP > Pub/Sub > Topic > Usage

The Usage control determines whether the number of GCP Pub/Sub topic resources exceeds the configured usage limit for this project.

You can configure the behavior of this control with the GCP > Pub/Sub > Topic > Usage policy, and set the limit with the GCP > Pub/Sub > Topic > Usage > Limit policy.

URI
tmod:@turbot/gcp-pubsub#/control/types/topicUsage

GCP > Pub/Sub > Topic IAM Member > Configured

Maintain pub/sub topicIamMember configuration

URI
tmod:@turbot/gcp-pubsub#/control/types/topicIamMemberConfigured