feat(gcp): Add VPC Service Controls check for Cloud Storage#9256
Merged
danibarranqueroo merged 11 commits intomasterfrom Nov 26, 2025
Merged
Conversation
Contributor
|
✅ Conflict Markers Resolved All conflict markers have been successfully resolved in this pull request. |
Contributor
|
✅ All necessary |
Codecov Report❌ Patch coverage is Additional details and impacted files@@ Coverage Diff @@
## master #9256 +/- ##
==========================================
+ Coverage 92.54% 92.91% +0.36%
==========================================
Files 154 123 -31
Lines 21231 2963 -18268
==========================================
- Hits 19649 2753 -16896
+ Misses 1582 210 -1372
Flags with carried forward coverage won't be shown. Click here to find out more.
🚀 New features to boost your workflow:
|
...oudstorage_bucket_uses_vpc_service_controls/cloudstorage_bucket_uses_vpc_service_controls.py
Fixed
Show fixed
Hide fixed
prowler/providers/gcp/services/accesscontextmanager/accesscontextmanager_service.py
Fixed
Show fixed
Hide fixed
Contributor
🔒 Container Security ScanImage: 📊 Vulnerability Summary
2 package(s) affected
|
danibarranqueroo
requested changes
Nov 19, 2025
...oudstorage_bucket_uses_vpc_service_controls/cloudstorage_bucket_uses_vpc_service_controls.py
Outdated
Show resolved
Hide resolved
...bucket_uses_vpc_service_controls/cloudstorage_bucket_uses_vpc_service_controls.metadata.json
Outdated
Show resolved
Hide resolved
prowler/providers/gcp/services/accesscontextmanager/accesscontextmanager_service.py
Show resolved
Hide resolved
…c-service-controls-check-for-gcp
…c-service-controls-check-for-gcp
danibarranqueroo
approved these changes
Nov 26, 2025
Member
|
Very great job! 🚀 |
13 tasks
Hamza-abughazaleh
pushed a commit
to Raed-sh/prowler
that referenced
this pull request
Feb 11, 2026
…cloud#9256) Co-authored-by: Daniel Barranquero <danielbo2001@gmail.com>
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Context
This PR implements a new security check for Google Cloud Platform to verify that Cloud Storage buckets are protected by VPC Service Controls.
VPC Service Controls help prevent data exfiltration by creating security perimeters around Google Cloud services. This check ensures buckets are properly protected within these perimeters, reducing the risk of unauthorized data access even with compromised credentials.
(https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/CloudStorage/use-vpc-service-controls.html).
Description
New Service:
accesscontextmanagerNew Check:
cloudstorage_bucket_uses_vpc_service_controlsstorage.googleapis.comis included in the perimeter's restricted servicesSteps to review
Review the new Access Context Manager service:
Review the check logic:
storage.googleapis.comis properly validated in restricted servicesReview the metadata.
Run the tests locally:
Checklist
UI
API
License
By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license.