Ensure that your Google Cloud NAT gateways are mapped only to specific VPC subnets to maintain controlled and secure outbound Internet access, minimize unintended traffic exposure, and optimize resource usage within your network design. This promotes network isolation and ensures adherence to your organization's stringent compliance requirements. The VPC subnets authorized to use Cloud NAT must be defined in the rule settings, in your TrendAI Vision One™ Cloud Risk Management account.
Limiting Cloud NAT gateways to specific VPC subnets enhances security by restricting Internet access to only necessary resources. This prevents unauthorized outbound traffic and reduces the attack surface. Additionally, it optimizes resource utilization and cost-efficiency by allocating NAT gateway capacity based on subnet-specific needs.
Audit
To determine if your Google Cloud NAT gateways are mapped to specific, compliant VPC subnets only, perform the following operations:
Remediation / Resolution
To ensure that your Google Cloud NAT gateways are mapped to specific, compliant VPC subnets only, perform the following operations:
References
- Google Cloud Platform (GCP) Documentation
- Cloud NAT overview
- Public NAT
- Set up and manage network address translation with Public NAT
- GCP Command Line Interface (CLI) Documentation
- gcloud projects list
- gcloud compute networks list
- gcloud compute routers list
- gcloud compute routers nats list
- gcloud compute routers nats describe
- gcloud compute routers nats update