Back to controls

Ensure subnetworks enable Private Google Access and Flow Logs

Subnetwork-level hardening should include private service access and network telemetry for monitoring and forensic use.

Category

Controls

Medium

Applies to

Google Cloud

Coverage

null controls, 1 queries

Asset types

1 covered

Overview

Subnetwork-level hardening should include private service access and network telemetry for monitoring and forensic use.

Remediation guidance

Google Cloud Remediation

Service-Wide (Recommended)

Apply organization standards requiring Private Google Access and VPC Flow Logs on in-scope subnetworks.

Google Cloud Console (Asset-Level)

  1. Open VPC network -> VPC networks -> target subnet.
  2. Enable Private Google Access.
  3. Enable Flow logs and set retention/export policy.

Google Cloud CLI (Asset-Level)

gcloud compute networks subnets update <subnet-name> --region=<region> --enable-private-ip-google-access --enable-flow-logs

References

  • https://cloud.google.com/vpc/docs/private-google-access
  • https://cloud.google.com/vpc/docs/using-flow-logs

Query logic

These are the stored checks tied to this control.

Subnets without Private Google Access or Flow Logs

Connectors

Google Cloud

Covered asset types

Subnetwork

Expected check: eq []

{ subnetworks(where: { OR: [ { privateIpGoogleAccess: false }, { enableFlowLogs: false } ] }) { ...AssetFragment } }
Cyscale Logo
Cyscale is an agentless cloud-native application protection platform (CNAPP) that automates the contextual analysis of cloud misconfigurations, vulnerabilities, access, and data, to provide an accurate and actionable assessment of risk.

Stay connected

Receive new blog posts and product updates from Cyscale

By clicking Subscribe, I agree to Cyscale’s Privacy Policy


© 2026 Cyscale Limited

LinkedIn icon
Twitter icon
Facebook icon
crunch base icon
angel icon