Skip to content

GCP-Architecture-Guides/csa-il4-assured-workload

Repository files navigation

This is not an officially supported Google product.
This code creates PoC demo environment for CSA IL4 Assured Workload with VPC service perimeter. This demo code is not built for production workload. 

Deploying IL4 Assured Workloads Architecture Guide

Summary

Assured Workloads helps you comply with different regulatory compliance frameworks by implementing logical controls that segment networks and users from in-scope sensitive data. Many of the US compliance frameworks are built upon NIST SP 800-53 Rev. 5, but add on controls based on the sensitivity of the information and the framework's governing body. For customers who must comply with Department of Defense (DoD) Impact Level 4 ("IL4"), we recommend that you use VPC Service Controls (VPC-SC) to create a strong boundary around the regulated environment.

This guide will provide written instructions and Terraform/Python code for:

  1. Creating an Assured Workloads folder for an IL4 compliance framework
  2. Setting up a VPC-SC perimeter around the Assured Workloads IL4 boundary
  3. Adding new projects to the VPC-SC perimeter, both manually and via automation
  4. Setting up Access Context Manager policy to enforce data residency controls for developers

Architecture

Design Diagram

image

Product and services

Assured Workloads provides Google Cloud customers with the ability to apply security controls to an environment in support of compliance requirements without compromising the quality of their cloud experience. The United States' DoD Defense Information Systems Agency (DISA) uses an IL classification system to classify data and authorize cloud environments. IL4 is among the highest level of authorization granted to environments storing and processing Controlled Unclassified Information (CUI), mission-critical information, and national security systems information. Assured Workloads supports workloads requiring IL4 compliance by adding guardrails that ensure customers:

  1. May only use GCP services granted IL4 Provisional Authorization by the DoD
  2. Store and process data in US-only regions
  3. Receive support from IL4-adjudicated first- and second-level staff who are US Persons located in the US

VPC Service Controls (VPC-SC) provides an extra layer of security defense for Google Cloud services that is independent of Identity and Access Management (IAM). While Identity and Access Management enables granular identity-based access control, VPC-SC enables broader context-based perimeter security, such as controlling data ingress and egress across the perimeter. VPC-SC adds a logical boundary around Google Cloud APIs that are managed at the organization level and applied and enforced at the project level.

Before proceeding with this guide, you should:

Design considerations

Because VPC-SC protection affects cloud services functionality, we recommend that you plan the enablement of VPC-SC in advance, and consider VPC Service Controls during architecture design. It's important to keep VPC-SC design as simple as possible. We recommend that you avoid perimeter designs that use multiple bridges, perimeter network projects or a DMZ perimeter, and complex access levels. Read more about designing and architecting service perimeters here.

Assured Workloads folders modify Google Cloud's inherent global infrastructure to deliver products and services with IL4 compliance requirements by adjusting Google Cloud products' global behavior and access paths. This includes disabling global APIs, including the products' underlying dependencies, to provide data residency in alignment with IL4 requirements. Customers are still responsible for configuring IAM permissions, networking, and GCP services to meet IL4 compliance. Before deploying an IL4 Assured Workload, we recommend you familiarize yourself with IL4 requirements for these levels.

Prerequisites

Assured Workloads

Before proceeding, it is important to understand that IL4 is a Premium Platform Control. Platform Controls are a combination of Google Cloud infrastructure data location and personnel access primitives that support compliance by enforcing and restricting access by customers or Google personnel. To launch a Premium Platform Control, you must:

If you wish to use Assured Workloads Premium Platform Controls but don't currently have a Premium subscription, sign up for a 60-day Premium Free Trial.

Many Google Cloud services send out notifications to share important information with Google Cloud users. With Essential Contacts, you can customize who receives notifications by providing your own list of contacts. This is important because different individuals and teams within your organization care about different types of notifications. To reduce the impact of personnel changes, we recommend adding groups as contacts, then managing the membership of those groups to determine who receives notifications. This practice helps ensure that notifications always go to active employees.

  1. Enable the Essential Contacts API
  2. Visit the Essential Contacts page
  3. Ensure the Google Cloud Organization is selected
  4. Add an Essential Contact for Legal

We recommend adding three Contacts for the Legal category: representatives from your Legal, Compliance, and Security departments. This group will receive notifications of compliance violations, so this will ensure that Legal and Compliance remain informed, and acts as an immediate notification to Security for remediation actions. We also recommend that you enact a plan of action for addressing these alerts.

VPC Service Controls

Deployment

Terraform Deployment Instructions

  1. Sign in to your organization and assign yourself the following roles:

  2. Access Transparency Admin: roles/axt.admin

  3. Assured Workloads Admin: roles/assuredworkloads.admin

  4. Resource Manager Organization Viewer: roles/resourcemanager.organizationViewer

  5. VPC Service Controls: roles/accesscontextmanager.policyAdmin

  6. Create Log Sinks: roles/logging.configWriter

The following steps should be executed in Cloud Shell in the Google Cloud Console.

  1. To deploy the architecture open up Cloud shell and clone the git repository using the command below.
git clone https://github.com/GCP-Architecture-Guides/csa-il4-assured-workload.git
  1. Navigate to the csa-il4-assured-workload folder.
cd csa-il4-assured-workload
  1. In the csa-il4-assured-workload folder navigate to variable.tf file and update variables organization_id, billing_account and members for access in assured workload.
organization_id = "XXXXXXXXXXX"

billing_account = "XXXX-XXXXXX-XXXXX"

Members = ["user:[email protected]"]

Note: All the other variables are given a default value. If you wish to change, update the corresponding variables in the variable.tf file.

  1. To find your organization id and billing_id, run the following command.
gcloud projects get-ancestors [ANY_PROJECT_ID_IN_ORG]

gcloud alpha billing accounts list
  1. While in the csa-il4-assured-workload, run the commands below in order. When prompted for confirmation enter "yes" to proceed.
terraform init

terraform apply -target=data.google_projects.in_perimeter_folder

terraform apply

If prompted, authorize the API call.

  1. Once deployment is finished it will publish the output summary of assets orchestrated. It deploys the resources within 10 minutes.

  2. After completing the demo, navigate to the csa-il4-assured-workload folder and run the command below to destroy all resources.

 terraform destroy

Best Practices

We recommend you familiarize yourself with Google Cloud's recommended process to configure and enforce VPC-SC protection in your Google Cloud organization by reading this document. Careless enablement of VPC-SC can cause problems with existing applications and can cause an outage.

We also strongly recommend that you do not nest an Assured Workloads folder within another Assured Workloads folder - even if they are the same compliance framework - as this will cause errors. You can, however, nest Assured Workloads folders and non-Assured Workloads folders with each other.

We also recommend you set up logging and alerts for any changes to the Assured Workloads folder or according IAM permissions, including Org Admin changes. These alerts should be routed to an appropriate stakeholder other than Org Admin. This is because Org Admin can change the org level policies that are important for continuing compliance.

Operations

Logging

Access Transparency is a part of Google's long-term commitment to transparency and user trust. Access Transparency logs record the actions that Google personnel take when accessing customer content.

Access Transparency logs give you different information than Cloud Audit Logs. Cloud Audit Logs record the actions that members of your Google Cloud organization have taken in your Google Cloud resources, whereas Access Transparency logs record the actions taken by Google personnel. Google personnel are strictly restricted in what is visible to them. All access to customer content requires a valid justification. See Justification Reason Codes for the list of valid business justifications.

Access Transparency log entries include details such as the affected resource and action, the time of the action, the reason for the action, and information about the accessor. For the list of Google services that provide Access Transparency logs, see Google services with Access Transparency logs.

Monitoring, Alerting, and Reporting

Querying Access Transparency Logs

Since Access Transparency logs are sent to Cloud Logging, we'll need to go to the Logs Explorer and build queries using the Logging Query Language. Overall, there are two ways to query for Access Transparency logs:

Project Level

logName="projects/PROJECT-ID/logs/cloudaudit.googleapis.com%2Faccess_transparency"

Organization Level

logName="organizations/ORG-ID/logs/cloudaudit.googleapis.com%2Faccess_transparency"

This generates all of the Access Transparency logs within the time period specified in the query. Now, if you want the good stuff, the specific types of Access Transparency logs, add the specific reason type. For example, a query for the Access Transparency logs generated because of third-party data requests look like so:

image

logName="organizations/ORG-ID/logs/cloudaudit.googleapis.com%2Faccess_transparency"

You can also exclude certain types of reasons. So, for example, if you're looking for every type of log EXCEPT FOR third-party data requests, use the following query:

image

logName="organizations/ORG-ID/logs/cloudaudit.googleapis.com%2Faccess_transparency"

AND NOT

jsonPayload.reason.type="THIRD_PARTY_DATA_REQUEST"

Querying Access Transparency logs with these levels of specificity is particularly useful for Security Operations Centers whose response to the event can vary based on the reason code.

Org Policy Change Notifications

Ensure any changes to your Assured Workloads Org Policies generate alerts that are pushed to your preferred notification channel

Prerequisites

Logging Project

Before starting, please ensure that you have a centralized logging project. If you don't already have one and need to create a logging project within your Assured Workloads folder, please create one before proceeding.

For the purposes of this guide, I've created a project and named it "IL4-Logging Project"

image

Log Bucket

Within your logging project, create a log bucket. I've named my bucket "folder-logs" and selected "US" as the region:

image

Note the Log Bucket Path

Take a note of your project name, the bucket location, and the bucket name as later on we will use the following path:

logging.googleapis.com/projects/locations//buckets/

Based on my project ID, bucket location, and bucket name, my path will be:

logging.googleapis.com/projects/il4-logging-project/locations/us/buckets/folder-logs

Querying Org Policy Changes

Customers can query all policy changes affecting their Assured Workloads folder by including the following query in the Cloud Logging Explorer:

protoPayload.request.@type="type.googleapis.com/google.cloud.orgpolicy.v1.SetOrgPolicyRequest"

OR

protoPayload.request.@type="type.googleapis.com/google.cloud.orgpolicy.v1.clearOrgPolicyRequest"

OR

protoPayload.methodName="google.cloud.orgpolicy.v2.OrgPolicy.UpdatePolicy"

OR

protoPayload.methodName="google.cloud.orgpolicy.v2.OrgPolicy.DeletePolicy"

image

Notice that I am logged in at the Folder level (as indicated by the "IL4" selection next to the Google Cloud logo). If you are not conducting this query under the folder itself, you won't be able to see any results.

Pushing Folder Logs to the Logging Project
  1. Create a Log Sink based on this query - you can do so by clicking on "More Actions" and then "Create sink"

image

You should now be on a page named "Create logs routing sink".

  1. Add your sink name, a description, and click "Next".

image

  1. For the sink service, select "Logging Bucket". Include the bucket path from the Note the Log Bucket Path section. Click "Next".

  2. Choose the logs to include in the sink. I chose to "Include only logs ingested by this folder".

  3. Click "Done" and "Create Sink".

Verify the Sink Works

After a few minutes your folder logs should be visible in your logging project's log explorer.

  1. Click on "Refine Scope"

image

  1. Select "Scope by storage" and select all of the options. Note that this includes the log bucket we previously created - "FOLDER-LOGS" in the screenshot below. Click "Apply".

image

  1. You can then run a query - for completeness, I suggest running the same query in the first screenshot of the Querying Org Policy Changes section.

Generating Alerts

Now that we have all of our logs in a central place, we can create alerts to receive notifications of any org policy changes affecting our Assured Workloads folders.

  1. Click "Create Alert"

image

  1. Add your Alert Details and click next
  2. Step 2 - Choose logs to include in the alert - should already have the query. If not, recreate it: "folders/FOLDER_ID/policies". Then click next.
  3. Define the notification frequency and autoclose duration
  4. Add notification channels.
  5. Click save

Check out Configuring Log-Based Alerts as configuring alerts based on particular log entries can help SOC teams engage the appropriate personnel in the incident response process. Manage incidents for log-based alerts can also assist in completing this cycle.

Governance, Risk Management, and Compliance

Discover Compliance Violations

Assured Workloads monitors a compliance framework's organization policy constraints, and highlights a violation if a change to a resource is non-compliant. You can then resolve these violations, or create exceptions for them where appropriate.

Monitor the organization policy constraints, and highlight violations if a change to a resource is non-compliant. Violations may be viewed by navigating to the Assured Workloads Monitoring page and clicking the **Violation ID **to view the status of your compliance violations

Act and remediate these violations by following the remediation steps in the **Violation Details. **Please visit this page for the complete list of Monitored Violations.

Exceptions to the Restrict Resource Usage Organization Policy

We recommend maintaining Organization Policy Restrictions in place, as they help restrict access to unauthorized services and regions. However, you may selectively disable restrictions that prevent the usage of resources that aren't compliant with certain compliance frameworks. This is not recommended because it makes the Assured Workloads folder less restrictive and puts your environment in non-compliant scope. However, it is available to customers who accept the risk of using non-compliant products. Customers may proceed with this by:

For an introduction on Organization Policy Restrictions, please watch this video. For more information on Restriction Resource Usage for Assured Workloads, including limitations, please read this guide.

Restrict TLS Versions

Google Cloud supports multiple TLS protocol versions. To meet compliance requirements, you may want to deny handshake requests from clients that use older TLS versions.

Cost

GCP Service Type Total Cost USD
Assured Workloads Premium Subscription, IL4 20% uplift based on spend within the Assured Workloads folder
VPC Service Controls Free

The cost estimate may change with time and may vary per region, please review the cost of each resource at Google Cloud Pricing Calculator.

Related Resources

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published