Other Articles
- Cloud SQL – Configure Private IP
- Cloud SQL – Monitor CPU Utilization
- Cloud SQL – Enable Deletion Protection
- Cloud SQL – Enable Disk Encryption
- Cloud SQL – Enable Automated Backups
- Cloud SQL – Enable Log Export
- Cloud SQL – Enforce Password Validation
- Cloud SQL – Protect From Internet Access
- Compute Engine – Block Project-Wide SSH Keys
- Compute Engine – Disable IP Forwarding
- Compute Engine – Disable Public IP Addresses
- Compute Engine – Disable Serial Port Access
- Compute Engine – Enable Confidential Computing
- Compute Engine – Enable OS Login
- Compute Engine – Enable Shielded VM
- Compute Engine – Restrict Default Service Account
- General – Deny Public Access to KMS Keys
- General – Enforce Duties Separation
- General – Enforce KMS Key Rotation
- General – Restrict Admin Roles on Service Accounts
- Cloud Run – Configure Timeout Settings
- Cloud Storage – Enable Bucket Encryption
- Cloud Storage – Enable Bucket Logging
- Cloud Storage – Enable Bucket Versioning
- Cloud Storage – Enforce Uniform Bucket-Level Access
- Cloud Storage – Restrict Public Access
- IAM Users – Enforce GCP-Managed Keys
- IAM Users – Rotate External User-Managed Service Account Keys
Cloud SQL – Enforce Secure Transport
This check ensures that secure transport (HTTPS / SSL) is enforced for Cloud SQL instances. Enforcing secure transport protects sensitive data from interception and man-in-the-middle attacks during transmission.
Check Details
- Resource: Cloud SQL
- Check: Enforce secure transport
- Risk: If secure transport is not enforced, database connections may occur over unencrypted channels, exposing sensitive data to interception and unauthorized access.
Remediation via Google Cloud Console
-
Log in to the Google Cloud Console and navigate to
Cloud SQL.
- Click on the affected Cloud SQL instance.
-
Click Edit to modify the instance configuration.
- Scroll to the Connections -> Security section.
-
Enable Require SSL / Enforce secure transport
for incoming database connections.
- Click Save to apply the changes.
Remediation via Google Cloud CLI
-
Open the Google Cloud Console and launch
Cloud Shell.
-
Update the Cloud SQL instance to require secure transport:
gcloud sql instances patch <INSTANCE_NAME> \ --require-ssl
Replace <INSTANCE_NAME> with your Cloud SQL instance name.
Enforcing secure transport ensures all database connections use encrypted
communication.
Default Value
By default, secure transport may not be enforced for Cloud SQL instances. Unencrypted connections can be allowed unless SSL is explicitly required.