GCP security checklist
A concise, opinionated checklist you can print or save as PDF. Start with org & IAM, then network and data.
- Org & Folders: separate prod/non‑prod; restrict project creation.
- Org Policies: restrict external service accounts; require CMEK where fit; disallow legacy APIs.
- Billing: alerts; per‑env budgets; anomaly detection.
- IAM: inventory service accounts; remove owners; adopt WIF; rotate keys; break‑glass with alerts.
- Logging: centralise to BQ/SIEM; enable Data Access logs for sensitive services.
- Network: Private Access/PSC; egress via NAT with logging; Cloud Armor/WAF for public endpoints.
- Data: Secret Manager; KMS hierarchy; rotation playbook; DLP detectors where sensible.
- SCC: enable; tune; alert routes; monthly review.
- Backups/DR: test restores; document RTO/RPO; quarterly drill.
- IR: runbook; comms; evidence workflow; tabletop.
Tip: capture decisions in a living doc; link evidence to your compliance tool (Vanta/Drata/etc.).