Skip to main content

GCPOffendingFirewallRule

This Script is part of the GCP Enrichment and Remediation Pack.#

Supported versions

Supported Cortex XSOAR versions: 6.8.0 and later.

Determine potential offending firewall rules in GCP based on port, protocol and possibly target tags (network tags).

Considerations:

  • At this time this automation only find potential offending rules and not necessarily the rule that is matching traffic.

Script Data#


NameDescription
Script Typepython3
Cortex XSOAR Version6.8.0

Used In#


This script is used in the following playbooks and scripts.

  • GCP - Enrichment - EXPANDR-3608
  • GCP - Enrichment

Inputs#


Argument NameDescription
project_idThe project to look up firewall rules in. The project ID instead of the project number. No need to supply `projects/` before the ID (i.e., use `project-name` instead of `projects/project-name` or `projects/111111111111`).
network_urlThe url of the network objects to lookup firewall rules in. This will be the url of the network and not just the name (i.e. https://www.googleapis.com/compute/v1/projects/<project_name>/global/networks/<network_name>\).
portPort to match traffic on for firewall rules.
protocolProtocol to match traffic on for firewall rules.
network_tagsNetwork tags on GCP VM instance to match rules based on target tag (optional).

Outputs#


PathDescriptionType
GCPOffendingFirewallRuleOne or more potential offending firewall rules in GCP based on port, protocol and possibly target tags (network tags).Unknown