-
Notifications
You must be signed in to change notification settings - Fork 916
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
DNS Logging #2020
Comments
* Add DNS query logging to FAST net stages Fixes #2020 * Update readmes * Add variable to toggle DNS logging * Extend DNS logging toggle to other net stages
The error derives from enabling inbound DNS at the VPC level via the ne-vpc module. Wasn't all the e2e testing supposed to catch this? :) I see two ways to handle this
My strong preference is for the second, since we care about VPCs in DNS policies not zones, which is what the DNS module handles. DNS policy should be handled at the module level and not as a FAST resource, to prevent this kind of conflicts. FAST is currently broken, so this needs to be fixed ASAP. |
Well, DNS logging is already in the net-vpc module |
Closing as #2041 addressed this. |
@ludoo They did catch this, though mail notification failed :-( |
Describe the bug
None of the auto-generated Shared VPCs have a DNS Policy with DNS logging in place. To activate DNS logging is considered a security best practice to discover and investigate security events.
Rational
Cloud DNS logging records the queries coming from Compute Engine VMs, GKE containers, or other GCP resources provisioned within the VPC to Cloud Logging.
DNS logs can be used to investigate attacks and detect threats. Security Command Center Event Threat Detection requires Cloud DNS logs to detect some threats.
Recommendation
Cloud DNS logging is one of the sources for the Event Threat Detection. If you activate Security Command Center Premium tier at the organization level, Event Threat Detection consumes logs for your projects as they are created. Enable Cloud DNS logging by attaching a DNS policy with logging enabled to all VPC networks. To capture public DNS queries, logging must be enabled on public zones.
Expected behavior
The default configuration should have a DNS Policy configured to log DNS requests. There can be an option to opt-out to reduce costs.
The text was updated successfully, but these errors were encountered: