Overview
Weak TLS versions expose workloads to known cryptographic downgrade and interception risks.
Remediation guidance
Google Cloud Remediation
Service-wide fix (recommended): standardize a small set of approved SSL policies and attach them to every external HTTPS proxy and proxy Network Load Balancer that should not accept legacy TLS.
When to use service-wide remediation
Use the service-wide path when the same SSL policy can be shared across many proxies.
Google Cloud console
- Open
Network security->SSL policies. - Edit the affected policy or create a new approved policy.
- Set the minimum TLS version to
TLS 1.2. - Prefer the
MODERNprofile unless you have a documented compatibility requirement. - Attach the policy to the affected target HTTPS or target SSL proxies.
Google Cloud CLI
Update the SSL policy:
gcloud compute ssl-policies update <policy-name> \
--min-tls-version=1.2 \
--profile=MODERN
Attach it to a target HTTPS proxy:
gcloud compute target-https-proxies update <proxy-name> \
--ssl-policy=<policy-name>
Validate the policy:
gcloud compute ssl-policies describe <policy-name>
Operational notes
- This control also flags the
COMPATIBLEprofile because it usually keeps older cipher support for broad backward compatibility. Only keep it if you have a documented client compatibility requirement. - Updating the policy alone is not enough if the affected proxy is still attached to a different SSL policy.
References
- https://cloud.google.com/load-balancing/docs/use-ssl-policies
- https://cloud.google.com/sdk/gcloud/reference/compute/ssl-policies/update
- https://docs.cloud.google.com/sdk/gcloud/reference/compute/target-https-proxies/update
- https://docs.cloud.google.com/compute/docs/reference/rest/v1/sslPolicies
Query logic
These are the stored checks tied to this control.
SSL policies with legacy TLS
Connectors
Covered asset types
Expected check: eq []
{ sslPolicies(where: { OR: [ { minTlsVersion_IN: ["TLS_1_0", "TLS_1_1"] }, { profile: "COMPATIBLE" } ] }) { ...AssetFragment } }
Google Cloud