Set up a service perimeter by using VPC Service Controls

Learn how to set up a service perimeter using VPC Service Controls in the Google Cloud console.

Before you begin

  1. Sign in to your Google Cloud account. If you're new to Google Cloud, create an account to evaluate how our products perform in real-world scenarios. New customers also get $300 in free credits to run, test, and deploy workloads.
  2. In the Google Cloud console, on the project selector page, select or create a Google Cloud project.

    Roles required to select or create a project

    • Select a project : Selecting a project doesn't require a specific IAM role—you can select any project that you've been granted a role on.
    • Create a project : To create a project, you need the Project Creator role ( roles/resourcemanager.projectCreator ), which contains the resourcemanager.projects.create permission. Learn how to grant roles .

    Go to project selector

  3. If you're using an existing project for this guide, verify that you have the permissions required to complete this guide . If you created a new project, then you already have the required permissions.

  4. Verify that billing is enabled for your Google Cloud project .

  5. Enable the Access Context Manager API.

    Roles required to enable APIs

    To enable APIs, you need the Service Usage Admin IAM role ( roles/serviceusage.serviceUsageAdmin ), which contains the serviceusage.services.enable permission. Learn how to grant roles .

    Enable the API

  6. In the Google Cloud console, on the project selector page, select or create a Google Cloud project.

    Roles required to select or create a project

    • Select a project : Selecting a project doesn't require a specific IAM role—you can select any project that you've been granted a role on.
    • Create a project : To create a project, you need the Project Creator role ( roles/resourcemanager.projectCreator ), which contains the resourcemanager.projects.create permission. Learn how to grant roles .

    Go to project selector

  7. If you're using an existing project for this guide, verify that you have the permissions required to complete this guide . If you created a new project, then you already have the required permissions.

  8. Verify that billing is enabled for your Google Cloud project .

  9. Enable the Access Context Manager API.

    Roles required to enable APIs

    To enable APIs, you need the Service Usage Admin IAM role ( roles/serviceusage.serviceUsageAdmin ), which contains the serviceusage.services.enable permission. Learn how to grant roles .

    Enable the API

Required roles

To get the permissions that you need to complete this quickstart, ask your administrator to grant you the Access Context Manager Editor ( roles/accesscontextmanager.policyEditor ) IAM role on your organization. For more information about granting roles, see Manage access to projects, folders, and organizations .

This predefined role contains the permissions required to complete this quickstart. To see the exact permissions that are required, expand the Required permissionssection:

Required permissions

The following permissions are required to complete this quickstart:

  • accesscontextmanager.accessLevels.list
  • accesscontextmanager.policies.create
  • accesscontextmanager.servicePerimeters.create

You might also be able to get these permissions with custom roles or other predefined roles .

Set up a VPC Service Controls perimeter

In the following sections, you specify the perimeter details, add projects and services to protect, and create the perimeter.

Add the VPC Service Controls perimeter details

  1. In the Google Cloud console, go to the VPC Service Controlspage.

    Go to VPC Service Controls

  2. To create a new perimeter by using the default access policy, select your organization from the project selector menu.

    If your organization doesn't have an access policy, follow these steps:

    1. On the VPC Service Controlspage, click Manage policies.

    2. On the Manage VPC Service Controlspage, click Create.

    3. On the Create access policypage, in the Access policy titlefield, enter access_policy_1 .

    4. Click Create access policy.

  3. On the VPC Service Controlspage, click New perimeter.

  4. On the Create a service perimeterpage, in the Titlefield, enter perimeter_storage_services .

  5. For Perimeter typeand Enforcement mode, retain the default selections.

  6. Click Continue.

Add projects to the perimeter

  1. To add projects to the perimeter, click Add projects.

  2. In the Add Projectspane, select the projects that you want to add to the perimeter and then click Add selected projects.

  3. Click Continue.

Secure the BigQuery and Cloud Storage services within the perimeter

  1. In the Restricted servicespane, click Add services.

  2. In the Add servicespane, select the checkboxes for the BigQuery and Cloud Storage APIs.

    To locate the services, you can use the filter query.

  3. Click Add selected services.

  4. Click Create.

You just created a perimeter! You can see your perimeter listed on the VPC Service Controlspage. The perimeter might take up to 30 minutes to propagate and take effect. When the changes have propagated, access to the BigQuery and Cloud Storage services is limited to the projects you added to the perimeter.

Additionally, the Google Cloud console interface for the BigQuery and Cloud Storage services that you protected with the perimeter might become partially or fully inaccessible.

Clean up

To avoid incurring charges to your Google Cloud account for the resources used on this page, follow these steps.

  1. In the Google Cloud console, go to the VPC Service Controlspage.

    Go to VPC Service Controls

  2. On the VPC Service Controlspage, in the row corresponding to the perimeter that you created, click Delete.

  3. In the dialog box, click Deleteto confirm that you want to delete the perimeter.

What's next

Create a Mobile Website
View Site in Mobile | Classic
Share by: