google-cloud-platformgoogle-iamgoogle-bucket

Deny creation of publically accessible GCP buckets at project level?


How to deny the creation of public accessible GCP buckets using Organization policies using at the project level using policies?

Also, how could I provide exemptions for Organization policies?


Solution

  • Public Access Prevention Organianization Policy enforce restrictions to prevent unauthorized public access to Cloud Storage resources. By enabling this constraint, you can ensure that no storage buckets or objects in your organization are accessible publicly, enhancing your security posture.

    GCP Tags can be used for giving exceptions