This page describes the set of controls that are applied on Kingdom of Saudi Arabia Data Boundary Advanced by CNTXT folders in Sovereign Controls by Partners. It provides detailed information about supported Google Cloud products and their API endpoints, as well as any applicable restrictions or limitations on those products.
See the CNTXT site Kingdom of Saudi Arabia Data Boundary Advanced by CNTXT for more information about this offering.
Supported products and API endpoints
Restrictions or limitations that affect the features of a supported product, including those that are enforced through organization policy constraint settings, are listed in the following table. If a product is not listed, that product is unsupported and has not met the control requirements for Kingdom of Saudi Arabia Data Boundary Advanced by CNTXT. Unsupported products are not recommended for use without due diligence and a thorough understanding of your responsibilities in the shared responsibility model . Before using an unsupported product, ensure that you are aware of and are willing to accept any associated risks involved, such as negative impacts to data residency or data sovereignty.
Services that interact with Customer Data in their API operations provide regional API endpoints . These must be used instead of the service's global API endpoint in Kingdom of Saudi Arabia Data Boundary Advanced by CNTXT. For services whose API operations don't interact with Customer Data, using global API endpoints is allowed. See the Assured Workloads Data residency page for more information.
Global API endpoints:
-
accesscontextmanager.googleapis.com
Global API endpoints:
-
accessapproval.googleapis.com
-
artifactregistry.me-central2.rep.googleapis.com
Global API endpoints:
-
artifactregistry.googleapis.com
-
bigquery.me-central2.rep.googleapis.com -
bigqueryconnection.me-central2.rep.googleapis.com -
bigqueryreservation.me-central2.rep.googleapis.com -
bigquerystorage.me-central2.rep.googleapis.com
Global API endpoints:
-
bigquery.googleapis.com -
bigqueryconnection.googleapis.com -
bigquerydatapolicy.googleapis.com -
bigqueryreservation.googleapis.com -
bigquerystorage.googleapis.com
-
bigtable.me-central2.rep.googleapis.com
Global API endpoints:
-
bigtable.googleapis.com -
bigtableadmin.googleapis.com
Global API endpoints:
-
privateca.googleapis.com
-
cloudbuild.me-central2.rep.googleapis.com
Global API endpoints:
-
cloudbuild.googleapis.com
-
cloudkms.me-central2.rep.googleapis.com
Global API endpoints:
-
cloudkms.googleapis.com
-
cloudkms.me-central2.rep.googleapis.com
Global API endpoints:
-
cloudkms.googleapis.com
Global API endpoints:
-
compute.googleapis.com
-
cloudkms.me-central2.rep.googleapis.com
Global API endpoints:
-
cloudkms.googleapis.com
Global API endpoints:
-
compute.googleapis.com
-
logging.me-central2.rep.googleapis.com
Global API endpoints:
-
logging.googleapis.com
Global API endpoints:
-
monitoring.googleapis.com
Global API endpoints:
-
networkconnectivity.googleapis.com
Global API endpoints:
-
compute.googleapis.com
Global API endpoints:
-
networkconnectivity.googleapis.com
Global API endpoints:
-
run.googleapis.com
Global API endpoints:
-
sqladmin.googleapis.com
-
storage.me-central2.rep.googleapis.com
Global API endpoints:
-
storage.googleapis.com
Global API endpoints:
-
compute.googleapis.com
Global API endpoints:
-
workstations.googleapis.com
Global API endpoints:
-
compute.googleapis.com
Global API endpoints:
-
gkeconnect.googleapis.com -
connectgateway.googleapis.com
-
dataflow.me-central2.rep.googleapis.com
Global API endpoints:
-
dataflow.googleapis.com -
datapipelines.googleapis.com
-
dataplex.me-central2.rep.googleapis.com
Global API endpoints:
-
dataplex.googleapis.com -
datalineage.googleapis.com
-
dataproc.me-central2.rep.googleapis.com
Global API endpoints:
-
dataproc-control.googleapis.com -
dataproc.googleapis.com
Global API endpoints:
-
essentialcontacts.googleapis.com
Global API endpoints:
-
firebaserules.googleapis.com
Global API endpoints:
-
compute.googleapis.com -
networksecurity.googleapis.com
Global API endpoints:
-
container.googleapis.com -
containersecurity.googleapis.com
Global API endpoints:
-
iam.googleapis.com -
policytroubleshooter.googleapis.com
Global API endpoints:
-
iap.googleapis.com
Global API endpoints:
-
redis.googleapis.com
Global API endpoints:
-
networkconnectivity.googleapis.com
Global API endpoints:
-
orgpolicy.googleapis.com
Global API endpoints:
-
compute.googleapis.com
Global API endpoints:
-
servicehealth.googleapis.com
-
pubsub.me-central2.rep.googleapis.com
Global API endpoints:
-
pubsub.googleapis.com
Global API endpoints:
-
cloudresourcemanager.googleapis.com
-
secretmanager.me-central2.rep.googleapis.com
Global API endpoints:
-
secretmanager.googleapis.com
Global API endpoints:
-
securesourcemanager.googleapis.com
-
dlp.me-central2.rep.googleapis.com
Global API endpoints:
-
dlp.googleapis.com
-
spanner.me-central2.rep.googleapis.com
Global API endpoints:
-
spanner.googleapis.com
Global API endpoints:
-
accesscontextmanager.googleapis.com -
servicenetworking.googleapis.com
Global API endpoints:
-
compute.googleapis.com
Restrictions and limitations
The following sections describe cloud-wide or product-specific restrictions or limitations for features, including any organization policy constraints that are set by default on Kingdom of Saudi Arabia Data Boundary Advanced by CNTXT folders.
Google Cloud-wide
Affected Google Cloud-wide features
- console.sa.cloud.google.com
- console.sa.cloud.google for federated identity users
Google Cloud-wide organization policy constraints
The following organization policy constraints apply across Google Cloud.
allowedValues
list: -
me-central2
Changing this value by making it less restrictive potentially undermines data residency by allowing data to be created or stored outside of a compliant data boundary.
-
aiplatform.googleapis.com -
artifactregistry.googleapis.com -
bigquery.googleapis.com -
bigquerydatatransfer.googleapis.com -
bigtable.googleapis.com -
cloudfunctions.googleapis.com -
composer.googleapis.com -
compute.googleapis.com -
container.googleapis.com -
dataflow.googleapis.com -
dataproc.googleapis.com -
documentai.googleapis.com -
integrations.googleapis.com -
logging.googleapis.com -
notebooks.googleapis.com -
pubsub.googleapis.com -
run.googleapis.com -
secretmanager.googleapis.com -
spanner.googleapis.com -
sqladmin.googleapis.com -
storage.googleapis.com -
workstations.googleapis.com
Each listed service requires Customer-managed encryption keys (CMEK) . CMEK encrypts at-rest data with a key managed by you, not Google's default encryption mechanisms.
Changing this value by removing one or more in-scope services from the list may undermine data sovereignty, because new at-rest data will be automatically encrypted using Google's own keys instead of yours. Existing at-rest data will remain encrypted by the key you provided.
Determines which services can be used by restricting runtime access to their resources. For more information, see Restricting resource usage .
-
TLS_1_0 -
TLS_1_1
BigQuery
Affected BigQuery features
- In the Google Cloud console, go to the Assured Workloads page.
- Select your new Assured Workloads folder from the list.
- On the Folder Details page in the Allowed services section, click Review Available Updates .
- In the Allowed services
pane, review the services to be added to the Resource Usage Restriction
organization policy for the folder. If BigQuery services are listed, click Allow Services
to add them.
If BigQuery services are not listed, wait for the internal process to complete. If the services are not listed within 12 hours of folder creation, contact Cloud Customer Care .
After the enablement process is completed, you can use BigQuery in your Assured Workloads folder.
Gemini in BigQuery is not supported by Assured Workloads.
- Interaction with remote data sources
- Externally-trained BQML models are not supported. Internally-trained BQML models are supported.
- Dynamic data masking
- GDrive export
- Remote functions
- Saved queries
- Workflow scheduling
- For BigQuery Studio, notebooks are unsupported.
- Gemini in BigQuery is not supported.
- The
CreateTag,SearchCatalog,Bulk tagging, andBusiness GlossaryAPI methods of the Data Catalog API process and store technical data in a way that is not supported. It's your responsibility not to use those methods for Sovereign Controls by Partners.
gcloud --version
and then gcloud components update
to update to
the newest version.projectname.dataset.table
in the BigQuery
CLI._default
logging buckets or restrict _default
buckets to
in-scope regions to maintain compliance using the following command:gcloud alpha logging settings update --organization=ORGANIZATION_ID --disable-default-sink
For more information, see Regionalize your logs .
Bigtable
Affected Bigtable features
| Feature | Description |
|---|---|
| Data Boost | This feature is disabled. |
| Split boundaries | Bigtable uses a small subset of row keys to define split boundaries, which may
include customer data and metadata. A split boundary in Bigtable denotes the
location where contiguous ranges of rows in a table are split into tablets. These split boundaries are accessible by Google personnel for technical support and debugging purposes, and are not subject to administrative access data controls in Sovereign Controls by Partners. |
Cloud Interconnect
Affected Cloud Interconnect features
| Feature | Description |
|---|---|
| High-availability (HA) VPN | You must enable high-availability (HA) VPN functionality when using Cloud Interconnect with Cloud VPN. Additionally, you must adhere to the encryption and regionalization requirements listed in the Affected Cloud VPN features section. |
Cloud KMS
Cloud KMS organization policy constraints
cloudkms.allowedProtectionLevels
-
EXTERNAL -
EXTERNAL_VPC
Cloud Load Balancing
Affected Cloud Load Balancing features
Cloud Logging
Affected Cloud Logging features
| Feature | Description |
|---|---|
| Log sinks | Filters shouldn't contain Customer Data. Log sinks include filters which are stored as configuration. Don't create filters that contain Customer Data. |
| Live tailing log entries | Filters shouldn't contain Customer Data. A live tailing session includes a filter which is stored as configuration. Tailing logs doesn't store any log entry data itself, but can query and transmit data across regions. Don't create filters that contain Customer Data. |
| Log-based alerts | This feature is disabled. You cannot create log-based alerts in the Google Cloud console. |
| Shortened URLs for Logs Explorer queries | This feature is disabled. You cannot create shortened URLs of queries in the Google Cloud console. |
| Saving queries in Logs Explorer | This feature is disabled. You cannot save any queries in the Google Cloud console. |
| Log Analytics using BigQuery | This feature is disabled. You cannot use the Log Analytics feature. |
| SQL-based alerting policies | This feature is disabled. You cannot use the SQL-based alerting policies feature. |
Cloud Monitoring
Affected Cloud Monitoring features
| Feature | Description |
|---|---|
| Synthetic Monitor | This feature is disabled. |
| Uptime checks | This feature is disabled. |
| Log panel widgets in Dashboards | This feature is disabled. You cannot add a log panel to a dashboard. |
| Error reporting panel widgets in Dashboards | This feature is disabled. You cannot add an error reporting panel to a dashboard. |
Filter in EventAnnotation
for Dashboards
|
This feature is disabled. Filter of EventAnnotation
cannot be set in a dashboard. |
SqlCondition
in alertPolicies
|
This feature is disabled. You cannot add a SqlCondition
to an alertPolicy
. |
Cloud Run
Affected Cloud Run features
Cloud SQL
Affected Cloud SQL features
| Feature | Description |
|---|---|
| Query insights | When deploying a Cloud SQL instance, Query insights can only be used if application tags are not enabled. If application tags are enabled, you will receive an error message when attempting to use Query insights. |
Cloud SQL organization policy constraints
| Organization policy constraint | Description |
|---|---|
sql.restrictNoncompliantDiagnosticDataAccess
|
Set to True
. Applies additional data sovereignty and supportability controls to Cloud SQL resources. Changing this value might affect your workload's data residency or data sovereignty. |
sql.restrictNoncompliantResourceCreation
|
Set to True
. Applies additional data sovereignty controls to prevent creation of non-compliant Cloud SQL resources. Changing this value might affect your workload's data residency or data sovereignty. |
Cloud Storage
Affected Cloud Storage features
| Feature | Description |
|---|---|
| Google Cloud console | It is your responsibility to use the Jurisdictional Google Cloud console for Kingdom of Saudi Arabia Data Boundary Advanced by CNTXT. The Jurisdictional console prevents uploading and downloading Cloud Storage objects. To upload and download Cloud Storage objects, see the following Compliant API endpoints row. |
| Compliant API endpoints | It is your responsibility to use one of the in-scope regional endpoints with Cloud Storage. For more information, see Cloud Storage locations . |
Cloud Storage organization policy constraints
storage.restrictAuthTypes
Set to prevent authentication using hash-based message authentication code (HMAC). The following types are specified in this constraint value:
-
USER_ACCOUNT_HMAC_SIGNED_REQUESTS -
SERVICE_ACCOUNT_HMAC_SIGNED_REQUESTS
Changing this value may affect data sovereignty in your workload; we highly recommend keeping the set value.
storage.uniformBucketLevelAccess
Access to new buckets is managed using IAM policies instead of Cloud Storage Access control lists (ACLs) . This constraint provides fine-grained permissions for buckets and their contents.
If a bucket is created while this constraint is enabled, access to it can never be managed by using ACLs. In other words, the access control method for a bucket is permanently set to using IAM policies instead of Cloud Storage ACLs.
Compute Engine
Affected Compute Engine features
Suspending and resuming a VM instance requires persistent disk storage, and persistent disk storage used for storing the suspended VM state cannot currently be encrypted by using CMEK. See the
gcp.restrictNonCmekServices
organization policy
constraint in the section above to understand the data sovereignty and data residency
implications of enabling this feature.You will be unable to create an instance with Local SSDs because they cannot be encrypted by using CMEK. See the
gcp.restrictNonCmekServices
organization policy
constraint in the section above to understand the data sovereignty and data residency
implications of enabling this feature.The following Compute Engine features are not available in the Google Cloud console. Use the API or Google Cloud CLI instead:
This feature is disabled by the
compute.disableGlobalLoadBalancing
organization
policy constraint.These components help you meet data sovereignty through internal security controls and processes. However, if you want additional control, you can also curate your own images or agents and optionally use the
compute.trustedImageProjects
organization policy
constraint.For more information, see Building a custom image .
If you want to restrict the creation or modification of OS policy resources that use inline scripts or binary output files, enable the
constraints/osconfig.restrictInlineScriptAndOutputFileUsage
organization policy
constraint.For more information, see Constraints for OS Config .
Change the
compute.disableInstanceDataAccessApis
organization policy constraint
value to False
to enable this API. You can also enable and use the interactive serial
port by following the instructions in Enabling access for a project
.Change the
compute.disableInstanceDataAccessApis
organization policy constraint
value to False
to enable this API. You can also enable and use the interactive serial
port by following the instructions in Enabling access for a project
.Compute Engine organization policy constraints
compute.enableComplianceMemoryProtection
Disables some internal diagnostic features to provide additional protection of memory contents when an infrastructure fault occurs.
Changing this value may affect your workload's data residency or data sovereignty.
compute.disableGlobalCloudArmorPolicy
Disables the creation of new global Google Cloud Armor security policies and the addition or modification of rules to existing global Google Cloud Armor security policies. This constraint doesn't restrict the removal of rules or the ability to remove or change the description and listing of global Google Cloud Armor security policies. Regional Google Cloud Armor security policies are unaffected by this constraint. All global and regional security policies that exist prior to the enforcement of this constraint remain in effect.
compute.disableGlobalLoadBalancing
Disables creation of global load balancing products.
Changing this value may affect your workload's data residency or data sovereignty.
compute.disableInstanceDataAccessApis
Globally disables the
instances.getSerialPortOutput()
and instances.getScreenshot()
APIs.Enabling this constraint prevents you from generating credentials on Windows Server VMs .
If you need to manage a username and password on a Windows VM, do the following:
- Enable SSH for Windows VMs .
- Run the following command to change the VM's password:
Replace the following:gcloud compute ssh VM_NAME --command "net user USERNAME PASSWORD "
- VM_NAME : The name of the VM you're setting the password for.
- USERNAME : The username of the user who you're setting the password for.
- PASSWORD : The new password.
compute.disableSshInBrowser
Disables the SSH-in-browser tool in the Google Cloud console for VMs that use OS Login and App Engine flexible environment environment VMs.
Changing this value may affect your workload's data residency or data sovereignty.
compute.restrictNonConfidentialComputing
compute.trustedImageProjects
Setting this value constrains image storage and disk instantiation to the specified list of projects. This value affects data sovereignty by preventing use of any unauthorized images or agents.
Dataplex Universal Catalog
Dataplex Universal Catalog features
| Feature | Description |
|---|---|
| Attribute Store | This feature is deprecated and disabled. |
| Data Catalog | This feature is deprecated and disabled. You cannot search through nor manage your metadata in Data Catalog. |
| Data Quality and Data Profile Scan | Export of Data Quality Scan results is not supported. |
| Discovery | This feature is disabled. You cannot run the Discovery scans to extract metadata from your data. |
| Data insights | This feature is disabled. You cannot generate data insights for your catalogs. |
| Lakes and Zones | This feature is disabled. You cannot manage lakes, zones and tasks. |
Dataproc
Affected Dataproc features
| Feature | Description |
|---|---|
| Google Cloud console | Dataproc does not currently support the Jurisdictional Google Cloud console . To enforce data residency, ensure that you use either the Google Cloud CLI or the API when using Dataproc. |
Google Cloud Armor
Affected Google Cloud Armor features
| Feature | Description |
|---|---|
| Globally scoped security policies | This feature is disabled by the compute.disableGlobalCloudArmorPolicy
organization policy constraint. |
Google Kubernetes Engine
Google Kubernetes Engine organization policy constraints
| Organization policy constraint | Description |
|---|---|
container.restrictNoncompliantDiagnosticDataAccess
|
Set to True
. Disables aggregate analysis of kernel issues, which is required to maintain sovereign control of a workload. Changing this value may affect your workload's data residency or data sovereignty. |
Spanner
Affected Spanner features
| Feature | Description |
|---|---|
| Split boundaries | Spanner uses a small subset of primary keys and indexed columns to define split boundaries
, which
may include customer data and metadata. A split boundary in Spanner denotes the
location where contiguous ranges of rows are split into smaller pieces. These split boundaries are accessible by Google personnel for technical support and debugging purposes, and are not subject to administrative access data controls in Sovereign Controls by Partners. |
Spanner organization policy constraints
| Organization policy constraint | Description |
|---|---|
spanner.assuredWorkloadsAdvancedServiceControls
|
Set to True
. Applies additional data sovereignty and supportability controls to Spanner resources. |
spanner.disableMultiRegionInstanceIfNoLocationSelected
|
Set to True
. Disables the ability to create multi-region Spanner instances to enforce data residency and data sovereignty. |

