When external IP addresses are assigned to Dataproc clusters, the cluster instances are exposed directly to the Internet. This increases the attack surface and risks accidental data exposure if firewall rules are misconfigured. By using private, internal IP addresses only for your Dataproc instances, you limit access and force traffic through secure channels.
When external IP addresses are assigned to Dataproc clusters, the cluster instances are exposed directly to the Internet. This increases the attack surface and risks accidental data exposure if firewall rules are misconfigured. By using private, internal IP addresses only for your Dataproc instances, you limit access and force traffic through secure channels.
Audit
To determine if your Google Cloud Dataproc cluster instances are accessible from the Internet, perform the following operations:
Remediation / Resolution
To ensure that your Dataproc cluster instances are not accessible from the Internet, you must re-create your Dataproc clusters with internal IP addresses only. To redeploy your clusters, perform the following operations:
References
- Google Cloud Platform (GCP) Documentation
- Cloud Key Management
- Private Google Access
- VPC firewall rules
- Dataproc Cluster network configuration
- GCP Command Line Interface (CLI) Documentation
- gcloud projects list
- gcloud dataproc clusters list
- gcloud dataproc clusters describe
- gcloud dataproc clusters create
- gcloud dataproc clusters delete