feat(cloud_monitoring): Add Cloud (Stackdriver) Monitoring security policies and documentation#374
feat(cloud_monitoring): Add Cloud (Stackdriver) Monitoring security policies and documentation#374Faris-Alh4rbi wants to merge 13 commits into
Conversation
Policies (5 total, all tests passing, linter clean): - google_monitoring_alert_policy: enabled_required - google_monitoring_notification_channel: sensitive_labels_required, force_delete_false - google_monitoring_uptime_check_config: validate_ssl_required, mask_headers_required_for_auth_headers Docs (10 resources fully documented with argument reference and security justification)
🔍 Policy Check ResultsStatus: ✅ All checks passed Test Output |
|
Very minor comments and changes I have, you are clearly very confident with your policy writing and clearly understand what you are doing, the biggest thing, and yet its a minor concern but important, just make sure your file naming structures are matching exactly to terraform, for example: "mask_headers_required_for_auth_users" just needs to be "mask_headers" the requirements for which users and what they relate to are all explained in your policy.rego file. Again this being the majority of changes is very positive, as I said, clearly you understand policy writing very well as it reflects in your PR. WELL DONE! |
- Renamed mask_headers_required_for_auth_headers to mask_headers to match Terraform attribute naming (review feedback) - Filled in security_impact, rationale, compliant and non-compliant fields in resource JSON files for monitoring_notification_channel, monitoring_uptime_check_config and monitoring_alert_policy
🔍 Policy Check ResultsStatus: ✅ All checks passed Test Output |
|
Thanks for the feedback. I've renamed mask_headers_required_for_auth_headers to mask_headers to match the Terraform attribute name. I've also added security impact documentation to the resource JSON files. All OPA checks still passing. |
🔍 Policy Check ResultsStatus: ✅ All checks passed Test Output |
…for policy attributes
🔍 Policy Check ResultsStatus: ✅ All checks passed Test Output |
…source JSON files
🔍 Policy Check ResultsStatus: ✅ All checks passed Test Output |
🔍 Policy Check ResultsStatus: ✅ All checks passed Test Output |
…ames, remove null from force_delete whitelist, clean up sensitive_labels children compliant examples
🔍 Policy Check ResultsStatus: ✅ All checks passed Test Output |
Summary
Added security policies and documentation for the Cloud (Stackdriver) Monitoring service.
Policies Implemented
Documentation
All 10 resources documented with argument reference tables, security justification for policies written, and rationale for attributes with no policy.
Testing