| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | config.googleapis.com | | Details | For more information about Infrastructure Manager, refer to theproduct documentation. | | Limitations | To use Infrastructure Manager in a perimeter: - You must use a Cloud Build private pool for the worker pool used by Infrastructure Manager. You need touse the Infra Manager-maintained Terraform provider for Google Cloud if you don't want to enablepublic internet calls to download the HashiCorp-maintained Terraform providers and configurations. You cannot use the default Cloud Build worker pool.
- The following must be in the same perimeter:
- The service account that Infrastructure Manager uses.
- The Cloud Build worker pool that Infrastructure Manager uses.
- The storage bucket that Infrastructure Manager uses. You can use the default storage bucket.
|
|
| | Status | Preview. The integration of this product with VPC Service Controls is in Preview and is ready for broader testing and use, but is not fully supported for production environments. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | designcenter.googleapis.com | | Details | The API for App Design Center can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about App Design Center, refer to theproduct documentation. | | Limitations | To use App Design Center in a perimeter: - You must use a Cloud Build private pool for the worker pool used by App Design Center. Enablepublic internet calls to download HashiCorp-maintained Terraform providers and configurations. You cannot use the default Cloud Build worker pool.
- The following resources must be restricted in the same perimeter:
- The management project where you set up App Design Center.
- The Cloud Build worker pool that App Design Center uses.
For more information, see Deploy resources in a secure perimeter. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | workloadmanager.googleapis.com | | Details | To use Workload Manager in a VPC Service Controls perimeter: - You must use a Cloud Build private worker pool for your deployment environment in Workload Manager. You cannot use the default Cloud Build worker pool.
- The Cloud Build private pool must havepublic internet calls enabled to download the Terraform configuration.
For more information, see Use a Cloud Build private worker pool in the Workload Manager documentation. For more information about Workload Manager, refer to theproduct documentation. | | Limitations | You must ensure that the following resources are in the sameVPC Service Controls service perimeter: - Workload Manager service account.
- Cloud Build private worker pool.
- The Cloud Storage bucket that Workload Manager uses for deployment.
|
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | netapp.googleapis.com | | Details | The API for Google Cloud NetApp Volumes can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Google Cloud NetApp Volumes, refer to theproduct documentation. | | Limitations | VPC Service Controls doesn't cover dataplane paths such as Network File System (NFS) and Server Message Block (SMB) reads and writes. Additionally, if your host and service projects are configured in different perimeters, you can experience a break in the implementation of Google Cloud services. |
|
| | Status | GA | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | cloudsearch.googleapis.com | | Details | Google Cloud Search supports Virtual Private Cloud Security Controls (VPC Service Controls) to enhance the security of your data. VPC Service Controls allows you to define a security perimeter around Google Cloud Platform resources to constrain data and help mitigate data exfiltration risks. For more information about Google Cloud Search, refer to theproduct documentation. | | Limitations | Because Cloud Search resources are not stored in a Google Cloud project, you must update the Cloud Search customer settings with the VPC perimeter protected project. The VPC project acts as a virtual project container for all your Cloud Search resources. Without building this mapping, VPC Service Controls won't work for the Cloud Search API. For complete steps to enable VPC Service Controls with Google Cloud Search, refer toEnhance security for Google Cloud Search. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | networkmanagement.googleapis.com | | Details | The API for Connectivity Tests can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Connectivity Tests, refer to theproduct documentation. | | Limitations | The Connectivity Tests integration with VPC Service Controls has no known limitations. |
|
| | Status | DEPRECATED. This legacy version of AI Platform Prediction isdeprecated and will no longer be available on Google Cloud after January 31, 2025. All models, associated metadata, and deployments will be deleted after January 31, 2025. Migrate your resources toVertex AI to get new machine learning features that are unavailable in AI Platform. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | ml.googleapis.com | | Details | VPC Service Controls supports online prediction, but not batch prediction. For more information about AI Platform Prediction, refer to theproduct documentation. | | Limitations | To fully protect AI Platform Prediction, add all of the following APIs to the service perimeter: - AI Platform Training and Prediction API (
ml.googleapis.com) - Pub/Sub API (
pubsub.googleapis.com) - Cloud Storage API (
storage.googleapis.com) - Google Kubernetes Engine API (
container.googleapis.com) - Container Registry API (
containerregistry.googleapis.com) - Cloud Logging API (
logging.googleapis.com)
Read more aboutsetting up VPC Service Controls for AI Platform Prediction. Batch prediction is not supported when you use AI Platform Prediction inside a service perimeter. AI Platform Prediction and AI Platform Training both use the AI Platform Training and Prediction API, so you must configure VPC Service Controls for both products. Read more aboutsetting up VPC Service Controls for AI Platform Training.
|
|
| | Status | DEPRECATED. This legacy version of AI Platform Training isdeprecated and will no longer be available on Google Cloud after January 31, 2025. Migrate your resources toVertex AI custom training to get new machine learning features that are unavailable in AI Platform. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | ml.googleapis.com | | Details | The API for AI Platform Training can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about AI Platform Training, refer to theproduct documentation. | | Limitations | To fully protect your AI Platform Training training jobs, add all of the following APIs to the service perimeter: - AI Platform Training and Prediction API (
ml.googleapis.com) - Pub/Sub API (
pubsub.googleapis.com) - Cloud Storage API (
storage.googleapis.com) - Google Kubernetes Engine API (
container.googleapis.com) - Container Registry API (
containerregistry.googleapis.com) - Cloud Logging API (
logging.googleapis.com)
Read more aboutsetting up VPC Service Controls for AI Platform Training. Training with TPUs is not supported when you use AI Platform Training inside a service perimeter. AI Platform Training and AI Platform Prediction both use the AI Platform Training and Prediction API, so you must configure VPC Service Controls for both products. Read more aboutsetting up VPC Service Controls for AI Platform Prediction.
|
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | alloydb.googleapis.com | | Details | VPC Service Controls perimeters protect the AlloyDB API. For more information about AlloyDB for PostgreSQL, refer to theproduct documentation. | | Limitations | - Service perimeters protect only the AlloyDB for PostgreSQL Admin API. They don't protect IP-based data access to underlying databases (such as AlloyDB for PostgreSQL instances). To restrict public IP access on AlloyDB for PostgreSQL instances, use anorganization policy constraint.
- Before you configure VPC Service Controls for AlloyDB for PostgreSQL, enable the Service Networking API.
- When you use AlloyDB for PostgreSQL with Shared VPC and VPC Service Controls, the host project and service project must be in the same VPC Service Controls service perimeter.
|
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | notebooks.googleapis.com | | Details | The API for Vertex AI Workbench can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Vertex AI Workbench, refer to theproduct documentation. | | Limitations | |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | aiplatform.googleapis.com | | Details | The API for Vertex AI can be protected by VPC Service Controls and the product can be used normally inside service perimeters. SeeColab Enterprise. For more information about Vertex AI, refer to theproduct documentation. | | Limitations | For more information about limitations, seelimitations in the Vertex AI documentation. |
|
| | Status | Preview. The integration of this product with VPC Service Controls is in Preview and is ready for broader testing and use, but is not fully supported for production environments. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | visionai.googleapis.com | | Details | The API for Vertex AI Vision can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Vertex AI Vision, refer to theproduct documentation. | | Limitations | When constraints/visionai.disablePublicEndpoint is on, we disable the cluster's public endpoint. Users must manually connect to the PSC target and access the service from the private network. You can get the PSC target from the cluster resource. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | firebasevertexai.googleapis.com | | Details | The API for Vertex AI in Firebase can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Vertex AI in Firebase, refer to theproduct documentation. | | Limitations | - The Vertex AI in Firebase API proxies traffic to theVertex AI API (
aiplatform.googleapis.com).- Make sure that
aiplatform.googleapis.com is also added to the restricted services list in the service perimeter. - Anyknown limitations of the Vertex AI API apply to the Vertex AI in Firebase API.
Traffic to the Vertex AI in Firebase API is intended to originate from a mobile or browser client, which will always be outside the service perimeter. So, you need to configure an explicit ingress policy. If you need to connect to the Vertex AI API from within the service perimeteronly, then consider using the Vertex AI API directly or via one of the server SDKs, Firebase Genkit, or any of the other available services for accessing the Vertex AI API server-side.
|
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | aiplatform.googleapis.com | | Details | The API for Colab Enterprise can be protected by VPC Service Controls and the product can be used normally inside service perimeters. Colab Enterprise is a part of Vertex AI. SeeVertex AI. Colab Enterprise uses Dataform for storing notebooks. SeeDataform. For more information about Colab Enterprise, refer to theproduct documentation. | | Limitations | For information about limitations, seeKnown limitations in the Colab Enterprise documentation. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | apigee.googleapis.com, apigeeconnect.googleapis.com | | Details | The API for Apigee and Apigee hybrid can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Apigee and Apigee hybrid, refer to theproduct documentation. | | Limitations | Apigee integrations with VPC Service Controls have the following limitations: - Integrated portals requireadditional steps to configure.
- You must deploy Drupal portals within the service perimeter.
|
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | apihub.googleapis.com | | Details | The API for Apigee API hub can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Apigee API hub, refer to theproduct documentation. | | Limitations | All Apigee runtime projects associated with an API hub instance must reside within the same VPC Service Controls service perimeter as the API hub host project. |
|
| |
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | meshca.googleapis.com, meshconfig.googleapis.com, trafficdirector.googleapis.com, networkservices.googleapis.com, networksecurity.googleapis.com | | Details | The API for Cloud Service Mesh can be protected by VPC Service Controls, and the product can be used normally inside service perimeters. You can usemesh.googleapis.com to enable the required APIs for Cloud Service Mesh. You don't need to restrictmesh.googleapis.com in your perimeter as it doesn't expose any APIs. For more information about Cloud Service Mesh, refer to theproduct documentation. | | Limitations | The Cloud Service Mesh integration with VPC Service Controls has no known limitations. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | artifactregistry.googleapis.com | | Details | In addition to protecting the Artifact Registry API, Artifact Registry can be used inside service perimeters with GKE and Compute Engine. For more information about Artifact Registry, refer to theproduct documentation. | | Limitations | - For Artifact Registry repositories that use the
pkg.dev domain, you mustconfigure DNS for*.pkg.dev to map to eitherprivate.googleapis.com orrestricted.googleapis.com. For more information, seeSecuring repositories in a service perimeter. In addition to the artifacts inside a perimeter that are available to Artifact Registry, the following read-only repositories are available to all projects regardless of service perimeters: gcr.io/anthos-baremetal-releasegcr.io/asci-toolchaingcr.io/cloud-airflow-releasergcr.io/cloud-buildersgcr.io/cloud-dataflowgcr.io/cloud-ingestgcr.io/cloud-marketplacegcr.io/cloud-ssagcr.io/cloudsql-dockergcr.io/config-management-releasegcr.io/deeplearning-platform-releasegcr.io/foundry-devgcr.io/fn-imggcr.io/gae-runtimesgcr.io/serverless-runtimesgcr.io/gke-node-imagesgcr.io/gke-releasegcr.io/gkeconnectgcr.io/google-containersgcr.io/kubeflowgcr.io/kubeflow-images-publicgcr.io/kubernetes-helmgcr.io/istio-releasegcr.io/ml-pipelinegcr.io/projectcalico-orggcr.io/rbe-containersgcr.io/rbe-windows-test-imagesgcr.io/speckle-umbrellagcr.io/stackdriver-agentsgcr.io/tensorflowgcr.io/vertex-aigcr.io/vertex-ai-restrictedgke.gcr.iok8s.gcr.io
In all cases, the regional versions of these repositories are also available.
|
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | assuredoss.googleapis.com | | Details | The API for Assured Open Source Software can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Assured Open Source Software, refer to theproduct documentation. | | Limitations | |
|
| | Status | Preview. The integration of this product with VPC Service Controls is in Preview and is ready for broader testing and use, but is not fully supported for production environments. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | assuredworkloads.googleapis.com | | Details | The API for Assured Workloads can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Assured Workloads, refer to theproduct documentation. | | Limitations | The Assured Workloads integration with VPC Service Controls has no known limitations. |
|
| | Status | DEPRECATED. AutoML Translation API isdeprecated and will no longer be available on Google Cloud after September 30, 2025. The functionality and management of custom models is available throughCloud Translation - Advanced API (v3). | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | automl.googleapis.com, eu-automl.googleapis.com | | Details | To fully protect the AutoML API, include all of the following APIs in your perimeter: - AutoML API (
automl.googleapis.com) - Cloud Storage API (
storage.googleapis.com) - Compute Engine API (
compute.googleapis.com) - BigQuery API (
bigquery.googleapis.com)
For more information about AutoML Translation, refer to theproduct documentation. | | Limitations | - All AutoML products that are integrated with VPC Service Controls use the same service name.
- You cannot add the supportedregional endpoints, such as
eu-automl.googleapis.com, to the list of restricted services in a perimeter. When you protect theautoml.googleapis.com service, the perimeter protects the supported regional endpoints, such aseu-automl.googleapis.com, as well.
For more information, seethe limitations for using AutoML products with VPC Service Controls. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | No. The API for Bare Metal Solution cannot be protected by service perimeters. However, Bare Metal Solution can be used normally in projects inside a perimeter. | | Details | The Bare Metal Solution API can be added to a secure perimeter. However, the VPC Service Controls perimeters do not extend to the Bare Metal Solution environment in the regional extensions. For more information about Bare Metal Solution, refer to theproduct documentation. | | Limitations | Connecting VPC Service Controls to your Bare Metal Solution environment doesn't uphold any service control guarantees. For more information about Bare Metal Solution limitation regarding VPC Service Controls, seeKnown issues and limitations. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | batch.googleapis.com | | Details | The API for Batch can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Batch, refer to theproduct documentation. | | Limitations | To fully protect Batch, you need to include the following APIs in your perimeter: - Batch API (
batch.googleapis.com) - Cloud Logging API (
logging.googleapis.com) - Cloud Storage API (
storage.googleapis.com) - Container Registry API (
containerregistry.googleapis.com) - Artifact Registry API (
artifactregistry.googleapis.com) - Filestore API (
file.googleapis.com)
|
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | biglake.googleapis.com | | Details | The API for BigLake metastore can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about BigLake metastore, refer to theproduct documentation. | | Limitations | The BigLake metastore integration with VPC Service Controls has no known limitations. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | bigquery.googleapis.com, bigquerystorage.googleapis.com, bigqueryreservation.googleapis.com, bigqueryconnection.googleapis.com | | Details | When you protect the BigQuery API using a service perimeter, the BigQuery Storage API (bigquerystorage.googleapis.com), BigQuery Reservation API (bigqueryreservation.googleapis.com), and BigQuery Connection API (bigqueryconnection.googleapis.com) are also protected. You do not need to separately add these APIs to your perimeter's list of protected services. Learn more about configuringVPC Service Controls for BigQuery and how toallow access to community-contributed functions within a perimeter. For more information about BigQuery, refer to theproduct documentation. | | Limitations | BigQuery audit log records don't always include all resources that were used when a request is made, due to the service internally processing access to multiple resources. When accessing a BigQuery instance protected by a service perimeter, the BigQuery job must be run within a project inside the perimeter, or in a project allowed by anegress rule of the perimeter. By default, the BigQuery client libraries run jobs within the service account or user's project, causing the query to be rejected by VPC Service Controls. BigQuery blocks saving query results to Google Drive from the VPC Service Controls protected perimeter. However, VPC Service Controls doesn't blockquerying Google Drive data. For information about restricting access to Google Drive, seeCreate and manage trust rules for Drive sharing. If you grant access using an ingress rule with user accounts as the identity type, you can't view BigQuery resource utilization or administrative jobs explorer on theMonitoring page. To use these features, configure aningress rule that usesANY_IDENTITY as the identity type. If you grant BigQuery users access to data using an ingress rule, then users can use the Google Cloud console to query and save the results to a local file. Accessing resources in VPC Service Controls perimeters is disallowed in BigQuery Standard edition. VPC Service Controls is only supported when performing analysis through BigQuery Enterprise, Enterprise Plus, or On-Demand. The BigQuery Reservation API is partially supported. The BigQuery Reservation API, which creates the assignment resource, doesn't enforce service perimeter restrictions on the assignment assignees. BigQuery data preparation uses Dataform, which has additional access control requirements. See Dataform.
|
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | bigquerydatapolicy.googleapis.com | | Details | The BigQuery Data Policy API can be protected by VPC Service Controls, and the product can be used normally inside service perimeters. For more information about BigQuery Data Policy API, refer to theproduct documentation. | | Limitations | The BigQuery Data Policy API integration with VPC Service Controls has no known limitations. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | bigquerydatatransfer.googleapis.com | | Details | Service perimeter only protects BigQuery Data Transfer Service API. The actual data protection is enforced by BigQuery. It is by design to allow importing data from various external sources outside of Google Cloud, such as Amazon S3, Redshift, Teradata, YouTube, Google Play and Google Ads, into BigQuery datasets. For information about VPC Service Controls requirements to migrate data from Teradata, seeVPC Service controls requirements. For more information about BigQuery Data Transfer Service, refer to theproduct documentation. | | Limitations | - The BigQuery Data Transfer Service doesn't support exporting data out of a BigQuery dataset. For more information, seeExporting table data.
- To transfer data between projects, the destination project must either be inside the same perimeter as the source project, or else an egress rule must permit the transfer of data out of the perimeter. For information about setting the egress rules, seeLimitations in Manage BigQuery datasets.
- Ingress and egress violations for BigQuery jobs initiated by BigQuery Data Transfer Service recurring offline transfer runs don't contain user context information such as caller IP address and device.
- The BigQuery Data Transfer Service only supports transferring data into projects protected by a service perimeter using one of the connectors listed inSupported data sources. The BigQuery Data Transfer Service doesn't support transferring data into projects protected by a service perimeter using a connector provided by other third-party partners.
|
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | bigquerymigration.googleapis.com | | Details | The BigQuery Migration API can be protected by VPC Service Controls, and the product can be used normally inside service perimeters. For more information about BigQuery Migration API, refer to theproduct documentation. | | Limitations | The BigQuery Migration API integration with VPC Service Controls has no known limitations. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | bigtable.googleapis.com, bigtableadmin.googleapis.com | | Details | Thebigtable.googleapis.com andbigtableadmin.googleapis.com services are bundled together. When you restrict thebigtable.googleapis.com service in a perimeter, the perimeter restricts thebigtableadmin.googleapis.com service by default. You cannot add thebigtableadmin.googleapis.com service to the list of restricted services in a perimeter because it is bundled withbigtable.googleapis.com. For more information about Bigtable, refer to theproduct documentation. | | Limitations | The Bigtable integration with VPC Service Controls has no known limitations. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | binaryauthorization.googleapis.com | | Details | When using multiple projects with Binary Authorization, each project must be included in the VPC Service Controls perimeter. For more information about this use case, seeMulti-project setup. With Binary Authorization, you may use Artifact Analysis to store attestors and attestations as notes and occurrences, respectively. In this case, you must also include Artifact Analysis in the VPC Service Controls perimeter. SeeVPC Service Controls guidance for Artifact Analysis for additional details. For more information about Binary Authorization, refer to theproduct documentation. | | Limitations | The Binary Authorization integration with VPC Service Controls has no known limitations. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | blockchainnodeengine.googleapis.com | | Details | The API for Blockchain Node Engine can be protected by VPC Service Controls and used normally inside service perimeters. For more information about Blockchain Node Engine, refer to theproduct documentation. | | Limitations | Blockchain Node Engine integrations with VPC Service Controls have the following limitations: - VPC Service Controls only protects the Blockchain Node Engine API. When a node is created, you must still indicate that it is meant for a user-configured private network withPrivate Service Connect.
- The peer-to-peer traffic is not affected by VPC Service Controls or Private Service Connect and will continue to use the public internet.
|
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | privateca.googleapis.com | | Details | The API for Certificate Authority Service can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Certificate Authority Service, refer to theproduct documentation. | | Limitations | |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | krmapihosting.googleapis.com | | Details | To use Config Controller with VPC Service Controls, you must enable the following APIs inside your perimeter: - Cloud Monitoring API (
monitoring.googleapis.com) - Container Registry API (
containerregistry.googleapis.com) - Google Cloud Observability API (
logging.googleapis.com) - Security Token Service API (
sts.googleapis.com) - Cloud Storage API (
storage.googleapis.com)
If you provision resources with Config Controller, you must enable the API for those resources in your service perimeter. For example, if you want to add an IAM service account, you must add the IAM API (iam.googleapis.com). For more information about Config Controller, refer to theproduct documentation. | | Limitations | The Config Controller integration with VPC Service Controls has no known limitations. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | datacatalog.googleapis.com | | Details | Data Catalogautomatically respects perimeters around other Google Cloud services. For more information about Data Catalog, refer to theproduct documentation. | | Limitations | The Data Catalog integration with VPC Service Controls has no known limitations. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | datafusion.googleapis.com | | Details | Cloud Data Fusion requires somespecial steps to protect using VPC Service Controls. For more information about Cloud Data Fusion, refer to theproduct documentation. | | Limitations | Establish the VPC Service Controls security perimeter before creating your Cloud Data Fusion private instance. Perimeter protection for instances created prior to setting up VPC Service Controls is not supported. Currently, the Cloud Data Fusion data plane UI does not support identity based access usingingress rules oraccess levels.
|
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | datalineage.googleapis.com | | Details | The API for Data Lineage API can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Data Lineage API, refer to theproduct documentation. | | Limitations | The Data Lineage API integration with VPC Service Controls has no known limitations. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | compute.googleapis.com | | Details | VPC Service Controls support for Compute Engine offers the following security benefits: - Restricts access to sensitive API operations
- Restricts persistent disk snapshots and custom images to a perimeter
- Restricts access to instance metadata
VPC Service Controls support for Compute Engine also enables you to utilize Virtual Private Cloud networks and Google Kubernetes Engine private clusters inside service perimeters. For more information about Compute Engine, refer to theproduct documentation. | | Limitations | Hierarchical firewalls are not affected by service perimeters. VPC Peering operations do not enforce VPC service perimeter restrictions. Theprojects.ListXpnHosts API method for Shared VPC does not enforce service perimeter restrictions on returned projects. To enable creating a Compute Engine image from a Cloud Storage in a project protected by a service perimeter, the user that is creating the image should be added temporarily to aningress rule of the perimeter. VPC Service Controls does not support using the open-source version of Kubernetes on Compute Engine VMs inside a service perimeter. SSH-in-browser is not supported within the perimeter. Use the gcloud CLI instead. For more information, seeConnect to Linux VMs orConnecting to a serial console, depending on your use case. The interactive serial console does not support the restricted VIP. If you need totroubleshoot your instance using the serial console, configure your on-premises DNS resolution to send your commands tossh-serialport.googleapis.com over the internet.
|
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | contactcenterinsights.googleapis.com | | Details | To use Conversational Insights with VPC Service Controls you must have the following additional APIs inside your perimeter, depending on your integration. To load data into Conversational Insights, add the Cloud Storage API to your service perimeter. To useexport, add the BigQuery API to your service perimeter. To integrate multiple CCAI products, add the Vertex AI API to your service perimeter.
For more information about Conversational Insights, refer to theproduct documentation. | | Limitations | The Conversational Insights integration with VPC Service Controls has no known limitations. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | dataflow.googleapis.com | | Details | Dataflow supports a number of storage service connectors. The following connectors have been verified to work with Dataflow inside a service perimeter: For more information about Dataflow, refer to theproduct documentation. | | Limitations | |
|
| | Status | GA | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | dataplex.googleapis.com | | Details | The API for Dataplex Universal Catalog can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Dataplex Universal Catalog, refer to theproduct documentation. | | Limitations | Before creating your Dataplex Universal Catalog resources, set up the VPC Service Controls security perimeter. Otherwise, your resources don't have perimeter protection. Dataplex Universal Catalog supports the following resource types: - Lake
- Data profile scan
- Data quality scan
|
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | dataproc.googleapis.com | | Details | Dataproc requiresspecial steps to protect using VPC Service Controls. For more information about Dataproc, refer to theproduct documentation. | | Limitations | To protect a Dataproc cluster with a service perimeter, follow theDataproc and VPC Service Controls networks instructions. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | dataproc.googleapis.com | | Details | Google Cloud Serverless for Apache Spark requiresspecial steps to protect using VPC Service Controls. For more information about Google Cloud Serverless for Apache Spark for Spark, refer to theproduct documentation. | | Limitations | To protect your serverless workload with a service perimeter, follow theGoogle Cloud Serverless for Apache Spark and VPC Service Controls networks instructions. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | metastore.googleapis.com | | Details | The API for Dataproc Metastore can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Dataproc Metastore, refer to theproduct documentation. | | Limitations | The Dataproc Metastore integration with VPC Service Controls has no known limitations. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | datastream.googleapis.com | | Details | The API for Datastream can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Datastream, refer to theproduct documentation. | | Limitations | The Datastream integration with VPC Service Controls has no known limitations. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | databasecenter.googleapis.com | | Details | The API for Database Center can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Database Center, refer to theproduct documentation. | | Limitations | VPC Service Controls doesn't support access to folder-level or organization-level Cloud Asset API resources from resources and clients inside a service perimeter. VPC Service Controls protects project-level Cloud Asset API resources. You can specify an egress policy to allow access to project-level Cloud Asset API resources from projects inside the perimeter. To manage Database Center permissions at the folder level or organizational level, we recommend using IAM. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | databaseinsights.googleapis.com | | Details | The API for Database Insights API can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Database Insights API, refer to theproduct documentation. | | Limitations | The Database Insights API integration with VPC Service Controls has no known limitations. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | datamigration.googleapis.com | | Details | The API for Database Migration Service can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Database Migration Service, refer to theproduct documentation. | | Limitations | - Service perimeters protect only the Database Migration Service Admin API. They don't protect IP-based data access to underlying databases (such as Cloud SQL instances). To restrict public IP access on Cloud SQL instances, use anorganization policy constraint.
- When you use a Cloud Storage file in the initial dump phase of the migration, add the Cloud Storage bucket to the same service perimeter.
- When you use a customer-managed encryption key (CMEK) in the destination database, make sure that the CMEK resides in the same service perimeter as the connection profile that contains the key.
|
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | dialogflow.googleapis.com | | Details | The API for Dialogflow can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Dialogflow, refer to theproduct documentation. | | Limitations | |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | dialogflow.googleapis.com | | Details | The API for Agent Assist can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Agent Assist, refer to theproduct documentation. | | Limitations | |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | dlp.googleapis.com | | Details | The API for Sensitive Data Protection can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Sensitive Data Protection, refer to theproduct documentation. | | Limitations | Because VPC Service Controls does not currently support folder and organization resources, Sensitive Data Protection calls may return a 403 response when attempting to access organization-level resources. We recommend that IAM is used to manage Sensitive Data Protection permissions at the folder and organization level.
|
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | dns.googleapis.com | | Details | The API for Cloud DNS can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Cloud DNS, refer to theproduct documentation. | | Limitations | |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | documentai.googleapis.com | | Details | The API for Document AI can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Document AI, refer to theproduct documentation. | | Limitations | The Document AI integration with VPC Service Controls has no known limitations. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | contentwarehouse.googleapis.com | | Details | The API for Document AI Warehouse can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Document AI Warehouse, refer to theproduct documentation. | | Limitations | The Document AI Warehouse integration with VPC Service Controls has no known limitations. |
|
| | Status | Preview. The integration of this product with VPC Service Controls is in Preview and is ready for broader testing and use, but is not fully supported for production environments. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | domains.googleapis.com | | Details | The API for Cloud Domains can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Cloud Domains, refer to theproduct documentation. | | Limitations | |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | eventarc.googleapis.com, eventarcpublishing.googleapis.com | | Details | Eventarc Advanced APIs can be protected with VPC Service Controls, and features can be used normally inside service perimeters. An Eventarc Advanced bus outside of a service perimeter can't receive events from Google Cloud Platform projects inside the perimeter. An Eventarc Advanced bus inside of a perimeter can't route events to a consumer outside of the perimeter. - To publish to an Eventarc Advanced bus, the source of an event must be inside the same service perimeter as the bus.
- To consume a message, an event consumer must be inside the same service perimeter as the bus.
You can verify VPC Service Controls support for theEnrollment,GoogleApiSource,MessageBus, andPipeline resources by viewing platform logs on ingress. For more information about Eventarc Advanced, refer to theproduct documentation. | | Limitations | The Eventarc Advanced integration with VPC Service Controls has no known limitations. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | eventarc.googleapis.com, eventarcpublishing.googleapis.com | | Details | Eventarc Standard handles event delivery using Pub/Sub topics and push subscriptions. To access the Pub/Sub API and manage event triggers, the Eventarc API must be protected within the same VPC Service Controls service perimeter as the Pub/Sub API. For more information about Eventarc Standard, refer to theproduct documentation. | | Limitations | In projects protected by a service perimeter, the following limitations apply: - Eventarc Standard is bound by the same limitations as Pub/Sub:
- When routing events to Cloud Run targets, new Pub/Sub push subscriptions can't be created unless the push endpoints are set to Cloud Run services with default
run.app URLs (custom domains don't work). - When routing events to Workflows targets for which the Pub/Sub push endpoint is set to a Workflows execution, you can only create new Pub/Sub push subscriptions through Eventarc Standard.
In this document, see thePub/Sub limitations. - VPC Service Controls blocks the creation of Eventarc Standard triggers forinternal HTTP endpoints. VPC Service Controls protection does not apply when routing events to such destinations.
|
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | edgenetwork.googleapis.com | | Details | The API for Distributed Cloud Edge Network API can be protected by VPC Service Controls and used normally inside service perimeters. For more information about Distributed Cloud Edge Network API, refer to theproduct documentation. | | Limitations | The Distributed Cloud Edge Network API integration with VPC Service Controls has no known limitations. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | financialservices.googleapis.com | | Details | The API for Anti Money Laundering AI can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Anti Money Laundering AI, refer to theproduct documentation. | | Limitations | The Anti Money Laundering AI integration with VPC Service Controls has no known limitations. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | firebaseappcheck.googleapis.com | | Details | When you configure and exchange Firebase App Check tokens, VPC Service Controls protects only the Firebase App Check service. To protect services that rely on Firebase App Check, you must set up service perimeters for those services. For more information about Firebase App Check, refer to theproduct documentation. | | Limitations | The Firebase App Check integration with VPC Service Controls has no known limitations. |
|
| | Status | Preview. The integration of this product with VPC Service Controls is in Preview and is ready for broader testing and use, but is not fully supported for production environments. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | firebaseapphosting.googleapis.com | | Details | VPC Service Controls helps protect requests to the App Hosting API. However, VPC Service Controls restrictions don't apply to requests to websites deployed on App Hosting. For more information about Firebase App Hosting, refer to theproduct documentation. | | Limitations | Sites deployed on App Hosting are available on the public internet and cannot be restricted within a service perimeter. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | firebasedataconnect.googleapis.com | | Details | Service perimeters protect only the Firebase Data Connect API. They don't protect access to the underlying data sources (such as Cloud SQL instances). Restricting access on database instances must be configured separately. For more information about Firebase Data Connect, refer to theproduct documentation. | | Limitations | The Firebase Data Connect integration with VPC Service Controls has no known limitations. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | firebaserules.googleapis.com | | Details | When you manage Firebase Security Rules policies VPC Service Controls protects only the Firebase Security Rules service. To protect services that rely on Firebase Security Rules, you must set up service permiters for those services. For more information about Firebase Security Rules, refer to theproduct documentation. | | Limitations | The Firebase Security Rules integration with VPC Service Controls has no known limitations. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | cloudfunctions.googleapis.com | | Details | See theCloud Run functions documentation for setup steps. VPC Service Controls protection does not apply to the build phase when Cloud Run functions are built using Cloud Build. For more details, see the known limitations. For more information about Cloud Run functions, refer to theproduct documentation. | | Limitations | Cloud Run functions uses Cloud Build, Container Registry, and Cloud Storage to build and manage your source code in a runnable container. If any of these services are restricted by the service perimeter, VPC Service Controls blocks the Cloud Run functions build, even if Cloud Run functions is not added as a restricted service to the perimeter. To use Cloud Run functions inside a service perimeter, you must configure aningress rule for the Cloud Build service account in your service perimeter. To allow your functions to use external dependencies such as npm packages, Cloud Build has unlimited internet access. This internet access could be used to exfiltrate data that is available at build time, such as your uploaded source code. If you want to mitigate this exfiltration vector, we recommend that you only allow trusted developers to deploy functions. Do not grantCloud Run functions Owner, Editor, or Developer IAM roles to untrusted developers. When you specify an ingress or egress policy for a service perimeter, you cannot useANY_SERVICE_ACCOUNT andANY_USER_ACCOUNT as an identity type to deployCloud Run functions from alocal machine. As a workaround, useANY_IDENTITY as the identity type. When Cloud Run functions services are invoked by HTTP triggers, VPC Service Controls policy enforcement does not use the client's IAM authentication information. VPC Service Controls ingress policy rules that use IAM principals are not supported. Access levels for VPC Service Controls perimeters that use IAM principals are not supported.
|
|
| | Status | Preview. The integration of this product with VPC Service Controls is in Preview and is ready for broader testing and use, but is not fully supported for production environments. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | iam.googleapis.com | | Details | When you restrict IAM with a perimeter, only actions that use the Identity and Access Management API are restricted. These actions include the following: - Managing custom IAM roles
- Managing workload identity pools
- Managing service accounts and keys
- Managing deny policies
- Managing policy bindings for principal access boundary policies
The perimeterdoesn't restrict actions related to workforce pools and principal access boundary policies because those resources are created at the organization level. The perimeter alsodoesn't restrict allow policy management for resources owned by other services, like Resource Manager projects, folders, and organizations or Compute Engine virtual machine instances. To restrict allow policy management for these resources, create a perimeter that restricts the service that owns the resources. For a list of resources that accept allow policies and the services that own them, seeResource types that accept allow policies. Additionaly, the perimeter around IAMdoesn't restrict actions that use other APIs, including the following: - IAM Policy Simulator API
- IAM Policy Troubleshooter API
- Security Token Service API
- Service Account Credentials API (including the legacy
signBlob andsignJwt methods in the IAM API)
For more information about Identity and Access Management, refer to theproduct documentation. | | Limitations | If you are inside the perimeter, you cannot call theroles.list method with an empty string to list IAM predefined roles. If you need to view predefined roles, seeIAM role documentation. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | iap.googleapis.com | | Details | IAP Admin API enables users to configure IAP. For more information about IAP Admin API , refer to theproduct documentation. | | Limitations | The IAP Admin API integration with VPC Service Controls has no known limitations. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | kmsinventory.googleapis.com | | Details | The API for Cloud KMS Inventory API can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Cloud KMS Inventory API, refer to theproduct documentation. | | Limitations | The SearchProtectedResources API method does not enforce service perimeter restrictions on returned projects. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | iamcredentials.googleapis.com | | Details | The API for Service Account Credentials can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Service Account Credentials, refer to theproduct documentation. | | Limitations | The Service Account Credentials integration with VPC Service Controls has no known limitations. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | cloud.googleapis.com | | Details | The API for Service Metadata API can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Service Metadata API, refer to theproduct documentation. | | Limitations | The Service Metadata API integration with VPC Service Controls has no known limitations. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | No. The API for Service Networking cannot be protected by service perimeters. However, Service Networking can be used normally in projects inside a perimeter. | | Details | If you're using private service access, we recommend enabling VPC Service Controls for the Service Networking connection.When you enable VPC Service Controls, service producers are restricted to access only the APIs supported by VPC Service Controls over the Service Networking connection. You can enable VPC Service Controls for Service Networking only using theEnableVpcServiceControls API. You can disable VPC Service Controls for Service Networking only usingDisableVpcServiceControls API. For more information about Service Networking, refer to theproduct documentation. | | Limitations | The Service Networking integration with VPC Service Controls has no known limitations. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | vpcaccess.googleapis.com | | Details | The API for Serverless VPC Access can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Serverless VPC Access, refer to theproduct documentation. | | Limitations | The Serverless VPC Access integration with VPC Service Controls has no known limitations. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | cloudkms.googleapis.com | | Details | The Cloud KMS API can be protected by VPC Service Controls and the product can be used inside service perimeters. The access to Cloud HSM services is also protected by VPC Service Controls and can be used inside service perimeters. For more information about Cloud Key Management Service, refer to theproduct documentation. | | Limitations | The Cloud Key Management Service integration with VPC Service Controls has no known limitations. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | gameservices.googleapis.com | | Details | The API for Game Servers can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Game Servers, refer to theproduct documentation. | | Limitations | The Game Servers integration with VPC Service Controls has no known limitations. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | cloudaicompanion.googleapis.com | | Details | The API for Gemini Code Assist can be protected by VPC Service Controls and the product can be used normally inside service perimeters. This includescode customization. For more information about Gemini Code Assist, refer to theproduct documentation. | | Limitations | Access control based on device, public IP address, or location is not supported for Gemini in the Google Cloud console. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | iaptunnel.googleapis.com | | Details | The API for Identity-Aware Proxy for TCP can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Identity-Aware Proxy for TCP, refer to theproduct documentation. | | Limitations | Only the usage API of IAP for TCP can be protected by a perimeter. The administrative API cannot be protected by a perimeter. To use IAP for TCP within a VPC Service Controls service perimeter, you mustadd or configure some DNS entries to point the following domains to the restricted VIP: - tunnel.cloudproxy.app
- *.tunnel.cloudproxy.app
|
|
| | Status | Preview. The integration of this product with VPC Service Controls is in Preview and is ready for broader testing and use, but is not fully supported for production environments. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | lifesciences.googleapis.com | | Details | The API for Cloud Life Sciences can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Cloud Life Sciences, refer to theproduct documentation. | | Limitations | The Cloud Life Sciences integration with VPC Service Controls has no known limitations. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | managedidentities.googleapis.com | | Details | Additional configuration required for: For more information about Managed Service for Microsoft Active Directory, refer to theproduct documentation. | | Limitations | The Managed Service for Microsoft Active Directory integration with VPC Service Controls has no known limitations. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | recaptchaenterprise.googleapis.com | | Details | The API for reCAPTCHA can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about reCAPTCHA, refer to theproduct documentation. | | Limitations | The reCAPTCHA integration with VPC Service Controls has no known limitations. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | webrisk.googleapis.com | | Details | The API for Web Risk can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Web Risk, refer to theproduct documentation. | | Limitations | The Evaluate API and the Submission API are not supported by VPC Service Controls. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | recommender.googleapis.com | | Details | The API for Recommender can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Recommender, refer to theproduct documentation. | | Limitations | |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | secretmanager.googleapis.com | | Details | The API for Secret Manager can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Secret Manager, refer to theproduct documentation. | | Limitations | The Secret Manager integration with VPC Service Controls has no known limitations. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | pubsub.googleapis.com | | Details | VPC Service Controls protection applies to all administrator operations, publisher operations, and subscriber operations (except for existing push subscriptions). For more information about Pub/Sub, refer to theproduct documentation. | | Limitations | In projects protected by a service perimeter, the following limitations apply: - New push subscriptions can't be created unless the push endpoints are set to Cloud Run services with default
run.app URLs or a Workflows execution (custom domains don't work). For more information about integrating with Cloud Run, seeUsing VPC Service Controls. - For non-push subscriptions, you must create a subscription in the same perimeter as the topic or enable egress rules to allow access from the topic to the subscription.
- When routing events through Eventarc to Workflows targets for which the push endpoint is set to a Workflows execution, you can only create new push subscriptions through Eventarc.
- Pub/Sub subscriptions created prior to the service perimeter are not blocked.
|
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | pubsublite.googleapis.com | | Details | VPC Service Controls protection applies to all subscriber operations. For more information about Pub/Sub Lite, refer to theproduct documentation. | | Limitations | The Pub/Sub Lite integration with VPC Service Controls has no known limitations. |
|
| | Status | GA. This product integration is supported by VPC Service Controls. Refer to details and limitations for more information. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | cloudbuild.googleapis.com | | Details | UseVPC Service Controls with Cloud Build private pools to add additional security to your builds. For more information about Cloud Build, refer to theproduct documentation. | | Limitations | |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | clouddeploy.googleapis.com | | Details | The API for Cloud Deploy can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Cloud Deploy, refer to theproduct documentation. | | Limitations | To use Cloud Deploy in a perimeter, you must use a Cloud Build private pool for the target'sexecution environments. Don't use the default (Cloud Build) worker pool, and don't use a hybrid pool. |
|
| | Status | GA | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | composer.googleapis.com | | Details | Configuring Composer for use with VPC Service Controls For more information about Cloud Composer, refer to theproduct documentation. | | Limitations | Enabling DAG serialization prevents Airflow from displaying a rendered template with functions in the web UI. Setting theasync_dagbag_loader flag toTrue is not supported while DAG serialization is enabled. Enabling DAG serialization disables all Airflow web server plugins, as they could risk the security of the VPC network where Cloud Composer is deployed. This doesn't impact the behaviour of scheduler or worker plugins, including Airflow operators and sensors. When Cloud Composer is running inside a perimeter, access to public PyPI repositories is restricted. In the Cloud Composer documentation, seeInstalling Python dependencies to learn how to install PyPi modules in Private IP mode. Cloud Composer doesn't support usingthird-party identities in ingress and egress rules forApache Airflow web interface operations. However, you can use theANY_IDENTITY identity type in ingress and egress rules to allow access to all identities, including third-party identities. For more information about theANY_IDENTITY identity type, seeIngress and egress rules.
|
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | cloudquotas.googleapis.com | | Details | The API for Cloud Quotas can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Cloud Quotas, refer to theproduct documentation. | | Limitations | - Because VPC Service Controls enforces boundaries at the project level, Cloud Quotas requests that originate from clients within the perimeter can only access organization resources if the organization sets up anegress rule.
When requesting aquota decrease , Cloud Quotas executes a service to service (S2S) call to Monitoring. This S2S call does not originate from within the perimeter even if the decrease request does, therefore, it will be blocked by VPC Service Controls. To avoid this issue, you can either:
To set up an ingress or egress rule, see the VPC Service Controls instructions for configuring ingress and egress policies. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | run.googleapis.com | | Details | Additional setup for Cloud Run is required. Follow the instructions at the Cloud RunVPC Service Controls documentation page. For more information about Cloud Run, refer to theproduct documentation. | | Limitations | - For Artifact Registry and Container Registry, the registry where you store your container must be in the same VPC Service Controls perimeter as the project that you are deploying to. The code being built must be in the same VPC Service Controls perimeter as the registry that the container is being pushed to.
- The Cloud Runcontinuous deployment feature is not available for projects inside a VPC Service Controls perimeter.
- When Cloud Run services are invoked, VPC Service Controls policy enforcement does not use the client's IAM authentication information. Such requests have the following limitations:
- VPC Service Controls ingress policy rules that use IAM principals are not supported.
- Access levels for VPC Service Controls perimeters that use IAM principals are not supported.
- Enforcement of VPC Service Controls egress policy is only guaranteed when using therestricted virtual IP (VIP) address.
- Requests from the same project on non-restricted VIPs are allowed, even if Cloud Run is not configured as aVPC accessible service.
|
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | cloudscheduler.googleapis.com | | Details | VPC Service Controls is enforced on the following actions:
- Cloud Scheduler job creation
- Cloud Scheduler job updates
For more information about Cloud Scheduler, refer to theproduct documentation. | | Limitations | VPC Service Controls supports Cloud Scheduler jobs only with the following targets: - Cloud Run
run.app endpoints - Cloud Run functions
functions.net endpoints - Google Cloud APIs that are VPC Service Controls-compliant (either in Preview or GA)—can be in a different Google Cloud project from your Cloud Scheduler job.
- Pub/Sub
For more information, see Secure cron jobs with VPC Service Controls. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | spanner.googleapis.com | | Details | The API for Spanner can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Spanner, refer to theproduct documentation. | | Limitations | The Spanner integration with VPC Service Controls has no known limitations. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | speakerid.googleapis.com | | Details | The API for Speaker ID can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Speaker ID, refer to theproduct documentation. | | Limitations | The Speaker ID integration with VPC Service Controls has no known limitations. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | storage.googleapis.com | | Details | The API for Cloud Storage can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Cloud Storage, refer to theproduct documentation. | | Limitations | When using theRequester Pays feature with a storage bucketinside a service perimeter that protects the Cloud Storage service, you cannot identify a project to pay that isoutside the perimeter. The target project must be in the same perimeter as the storage bucket or in a perimeter bridge with the bucket's project. For more information about Requester Pays, see theRequester Pays use and access requirements. For projects in a service perimeter, the Cloud Storage page in the Google Cloud console is not accessible if the Cloud Storage API is protected by that perimeter. If you want to grant access to the page, you must create an ingress rule and/or access level that includes the user accounts and/or public IP range that you want to allow to access the Cloud Storage API. In audit log records, theresourceName field does not identify the project that owns a bucket. Theproject must be discovered separately. In audit log records, the value formethodName is not always correct. We recommend that you donot filter Cloud Storage audit log records bymethodName. In certain cases, Cloud Storage legacy bucket logs can be written to destinations outside of a service perimeter even when access is denied. - In certain cases, Cloud Storage objects that were public are accessible even after you enable VPC Service Controls on the objects. The objects are accessible until they expire from the built-in caches and any other upstream caches on the network between the end user and Cloud Storage. Cloud Storage caches publicly accessible data by default in the Cloud Storage network. For more information about how Cloud Storage objects are cached, seeCloud Storage For information about the length of time an object may be cached, seeCache-control metadata.
When you specify an ingress or egress policy for a service perimeter, you cannot useANY_SERVICE_ACCOUNT andANY_USER_ACCOUNT as an identity type for allCloud Storage operations usingsigned URLs. As a workaround, useANY_IDENTITY as the identity type. Signed URLs support VPC Service Controls. VPC Service Controls uses the signing credentials of the user or service account that signed theSigned URL to evaluate VPC Service Controls checks, not the caller or user credential initiating the connection. VPC Service Controls protects theStorage Intelligence API. VPC Service Controls does not support adding folder-level or organization-level resources to service perimeters. Therefore, while you can enable Storage Intelligence at the folder, organization, or project level, VPC Service Controls only protects project-level resources. To manage Storage Intelligence at the folder-level or organization-level, we recommend using IAM.
|
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | cloudtasks.googleapis.com | | Details | The API for Cloud Tasks can be protected by VPC Service Controls and the product can be used normally inside service perimeters. HTTP requests from Cloud Tasks executions are supported as follows: - Authenticated requests to VPC Service Controls-compliant Cloud Run functions and Cloud Run endpoints are allowed.
- Requests to non-Cloud Run functions and non-Cloud Run endpoints are blocked.
- Requests to non-VPC Service Controls-compliant Cloud Run functions and Cloud Run endpoints are blocked.
For more information about Cloud Tasks, refer to theproduct documentation. | | Limitations | VPC Service Controls only supports Cloud Tasks requests to the following targets: - Cloud Run functions
functions.net endpoints - Cloud Run
run.app endpoints
|
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | sqladmin.googleapis.com | | Details | VPC Service Controls perimeters protect the Cloud SQL Admin API. For more information about Cloud SQL, refer to theproduct documentation. | | Limitations | - Service perimeters protect only the Cloud SQL Admin API. They do not protect IP-based data access to Cloud SQL instances. You need to use anorganization policy constraint to restrict public IP access on Cloud SQL instances.
- Before you configure VPC Service Controls for Cloud SQL, enable the Service Networking API.
Cloud SQL imports and exports can only perform reads and writes from a Cloud Storage bucket within the same service perimeter as the Cloud SQL replica instance. - In theexternal server migration flow, you need to add the Cloud Storage bucket to the same service perimeter.
In thekey creation flow for CMEK, use one of the following configurations: - Create the key in the same service perimeter as the resources that use it, such as Cloud SQL.
- Create the key in a service perimeter that's connected, through aperimeter bridge, to the service perimeter that protects Cloud SQL.
- When restoring an instance from a backup, the target instance needs to reside in the same service perimeter as the backup.
|
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | videointelligence.googleapis.com | | Details | The API for Video Intelligence API can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Video Intelligence API, refer to theproduct documentation. | | Limitations | The Video Intelligence API integration with VPC Service Controls has no known limitations. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | vision.googleapis.com | | Details | The API for Cloud Vision API can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Cloud Vision API, refer to theproduct documentation. | | Limitations | Even if you create an egress rule to allow calls to public URLs from within VPC Service Controls perimeters, Cloud Vision API blocks calls to public URLs. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | containeranalysis.googleapis.com | | Details | To use Artifact Analysis with VPC Service Controls, you may have to add other services to your VPC perimeter: Because the Container Scanning API is a surfaceless API that stores the results in Artifact Analysis, you do not need to protect the API with a service perimeter. For more information about Artifact Analysis, refer to theproduct documentation. | | Limitations | The Artifact Analysis integration with VPC Service Controls has no known limitations. |
|
| | Status | Caution: Container Registry is deprecated. Effective March 18, 2025, Container Registry is shut down, and writing images to Container Registry is unavailable. For details on the deprecation and how to migrate to Artifact Registry, seeContainer Registry deprecation. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | containerregistry.googleapis.com | | Details | In addition to protecting the Container Registry API, Container Registry can be used inside a service perimeter with GKE and Compute Engine. For more information about Container Registry, refer to theproduct documentation. | | Limitations | When you specify an ingress or egress policy for a service perimeter, you cannot useANY_SERVICE_ACCOUNT andANY_USER_ACCOUNT as an identity type for allContainer Registry operations. As a workaround, useANY_IDENTITY as the identity type. Because Container Registry uses thegcr.io domain, you mustconfigure DNS for*.gcr.io to map to eitherprivate.googleapis.com orrestricted.googleapis.com. For more information, seeSecuring Container Registry in a service perimeter. In addition to the containers inside a perimeter that are available to Container Registry, the following read-only repositories are available to all projects regardless of any restrictions enforced by service perimeters: gcr.io/anthos-baremetal-releasegcr.io/asci-toolchaingcr.io/cloud-airflow-releasergcr.io/cloud-buildersgcr.io/cloud-dataflowgcr.io/cloud-ingestgcr.io/cloud-marketplacegcr.io/cloud-ssagcr.io/cloudsql-dockergcr.io/config-management-releasegcr.io/deeplearning-platform-releasegcr.io/foundry-devgcr.io/fn-imggcr.io/gae-runtimesgcr.io/serverless-runtimesgcr.io/gke-node-imagesgcr.io/gke-releasegcr.io/gkeconnectgcr.io/google-containersgcr.io/kubeflowgcr.io/kubeflow-images-publicgcr.io/kubernetes-helmgcr.io/istio-releasegcr.io/ml-pipelinegcr.io/projectcalico-orggcr.io/rbe-containersgcr.io/rbe-windows-test-imagesgcr.io/speckle-umbrellagcr.io/stackdriver-agentsgcr.io/tensorflowgcr.io/vertex-aigcr.io/vertex-ai-restrictedgke.gcr.iok8s.gcr.io
In all cases, the multi-regional versions of these repositories are also available.
|
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | container.googleapis.com | | Details | The Google Kubernetes Engine API can be protected by VPC Service Controls and the product can be used normally inside service perimeters. This compatibility includes the protection of theDNS endpoint for GKE, which is a service for accessing the cluster's control plane and uses the*.gke.goog domain. When you restrict thecontainer.googleapis.com service in a perimeter, the perimeter also restricts the DNS endpoint for GKE. For more information about Google Kubernetes Engine, refer to theproduct documentation. | | Limitations | - To fully protect the GKE API, you must include the Kubernetes Metadata API (
kubernetesmetadata.googleapis.com) as well in your perimeter. - Only private clusters can be protected using VPC Service Controls. Clusters with public IP addresses are not supported by VPC Service Controls.
The GKE service entry in this table only specifies the control of the GKE API itself. GKE relies on several other underlying services for its operation, such as Compute Engine, Cloud Logging, Cloud Monitoring, and the Autoscaling API (autoscaling.googleapis.com). To effectively secure your GKE environments with VPC Service Controls, you must ensure that all necessary underlying services are also included within your service perimeter. See theGKE documentation for a complete list of these services.
|
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | containersecurity.googleapis.com | | Details | The API for Container Security API can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Container Security API, refer to theproduct documentation. | | Limitations | The Container Security API integration with VPC Service Controls has no known limitations. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | containerfilesystem.googleapis.com | | Details | Image streaming is a GKE data streaming feature that provides shorter container image pull times for images stored in Artifact Registry. If VPC Service Controls protects your container images and you use Image streaming, you must also include the Image streaming API in the service perimeter. For more information about Image streaming, refer to theproduct documentation. | | Limitations | |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | gkeconnect.googleapis.com, gkehub.googleapis.com, connectgateway.googleapis.com | | Details | Fleet management APIs, including theConnect gateway, can be protected with VPC Service Controls, and fleet management features can be used normally inside service perimeters. For more information, see the following: For more information about Fleets, refer to theproduct documentation. | | Limitations | - Although all fleet management features can be used normally, enabling a service perimeter around the Stackdriver API restricts the Policy Controller fleet feature from integrating with Security Command Center.
- When using the Connect gateway to access GKE clusters, VPC Service Controls perimeter for
container.googleapis.com is not enforced.
|
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | configdelivery.googleapis.com | | Details | The API forFleetPackage API can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information aboutFleetPackage API, refer to theproduct documentation. | | Limitations | TheFleetPackage API integration with VPC Service Controls has no known limitations. |
|
| | Status | Preview. The integration of this product with VPC Service Controls is in Preview and is ready for broader testing and use, but is not fully supported for production environments. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | cloudresourcemanager.googleapis.com | | Details | The following Cloud Resource Manager API methods can be protected by VPC Service Controls: For more information about Resource Manager, refer to theproduct documentation. | | Limitations | - Only tag keys directly parented by a project resource and corresponding tag values can be protected using VPC Service Controls. When a project is added to a VPC Service Controls perimeter, all tag keys and corresponding tag values under the project are considered to be resources within the perimeter.
- Tag keys parented by an organization resource and their corresponding tag values can't be included in a VPC Service Controls perimeter and can't be protected using VPC Service Controls.
- Clients inside a VPC Service Controls perimeter can't access tag keys and corresponding values parented by an organization resource, unless an egress rule allowing access is set on the perimeter. For more information about setting egress rules, seeIngress and egress rules.
- Tag bindings are considered resources within the same perimeter as the resource to which the tag value is bound. For example, the tag bindings on a Compute Engine instance in a project is considered to belong to that project regardless of where the tag key is defined.
- Some services such as Compute Engine allowcreating tag bindings using their own service APIs, in addition to the Resource Manager service APIs. For example, adding tags to a Compute Engine VM during resource creation. To protect tag bindings created or deleted using these service APIs, add the corresponding service, such as
compute.googleapis.com, to the list of restricted services in the perimeter. - Tags support method-level restrictions, so you can scope the
method_selectors to specific API methods. For a list of restrictable methods, seeSupported service method restrictions. - Granting the owner role on a project through Google Cloud console is now supported by VPC Service Controls. You cannot send an owner invitation or accept an invitation outside service perimeters. If you try to accept an invitation from outside the perimeter you will not be granted the owner role and there will not be any error or warning message displayed.
|
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | logging.googleapis.com | | Details | The API for Cloud Logging can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Cloud Logging, refer to theproduct documentation. | | Limitations | Aggregated log sinks (folder or organization sinks whereincludeChildren istrue) can access data from projects inside a service perimeter. To restrict aggregated log sinks from accessing data inside a perimeter, we recommend using IAM to manage Logging permissions at the folder-level or organization-level aggregated log sinks. VPC Service Controls does not support adding folder or organization resources to service perimeters. Therefore, you cannot use VPC Service Controls to protect folder-level and organization-level logs, including aggregate logs. To manage Logging permissions at the folder level or organizational level, we recommend using IAM. If you route logs, using an organization-level or folder-level log sink, to a resource that a service perimeter protects, then you must add an ingress rule to the service perimeter. The ingress rule must allow access to the resource from the service account that the log sink uses. This step is not necessary for project-level sinks. For more information, refer to the following pages: When you specify an ingress or egress policy for a service perimeter, you cannot useANY_SERVICE_ACCOUNT andANY_USER_ACCOUNT as an identity type to export logs from aCloud Logging sink to aCloud Storage resource. As a workaround, useANY_IDENTITY as the identity type.
|
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | certificatemanager.googleapis.com | | Details | The API for Certificate Manager can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Certificate Manager, refer to theproduct documentation. | | Limitations | The Certificate Manager integration with VPC Service Controls has no known limitations. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | monitoring.googleapis.com | | Details | The API for Cloud Monitoring can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Cloud Monitoring, refer to theproduct documentation. | | Limitations | Notification channels, alerting policies, and custom metrics can be used together to exfiltrate data/metadata. As of today, a user of Monitoring can set up a notification channel that points to an entity outside of the organization e.g. "baduser@badcompany.com". The user then sets up custom metrics and corresponding alert policies that utilize the notification channel. As a result, by manipulating the custom metrics, the user can trigger alerts and send alert firing notifications, exfiltrating sensitive data to baduser@badcompany.com, outside of the VPC Service Controls perimeter. Any Compute Engine or AWS VMs with theMonitoring Agent installed must be inside the VPC Service Controls perimeter or agent metric writes will fail. AnyGKE Pods must be inside the VPC Service Controls perimeter orGKE Monitoring will not work. When querying metrics for ametrics scope, only the VPC Service Controls perimeter of the scoping project for the metric scope is considered. The perimeters of the individual monitored projects in the metrics scope aren't considered. A project can only be added as a monitored project to an existingmetrics scope if that project is in the same VPC Service Controls perimeter as the metrics scope's scoping project. To access Monitoring in the Google Cloud console for a host project that is protected by a service perimeter, use aningress rule.
|
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | cloudprofiler.googleapis.com | | Details | The API for Cloud Profiler can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Cloud Profiler, refer to theproduct documentation. | | Limitations | The Cloud Profiler integration with VPC Service Controls has no known limitations. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | telemetry.googleapis.com | | Details | The API for Telemetry API can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Telemetry API, refer to theproduct documentation. | | Limitations | The Telemetry API integration with VPC Service Controls has no known limitations. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | timeseriesinsights.googleapis.com | | Details | The API for Timeseries Insights API can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Timeseries Insights API, refer to theproduct documentation. | | Limitations | The Timeseries Insights API integration with VPC Service Controls has no known limitations. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | cloudtrace.googleapis.com | | Details | The API for Cloud Trace can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Cloud Trace, refer to theproduct documentation. | | Limitations | The Cloud Trace integration with VPC Service Controls has no known limitations. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | tpu.googleapis.com | | Details | The API for Cloud TPU can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Cloud TPU, refer to theproduct documentation. | | Limitations | The Cloud TPU integration with VPC Service Controls has no known limitations. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | language.googleapis.com | | Details | For more information about Natural Language API, refer to theproduct documentation. | | Limitations | Because Natural Language API is a stateless API and doesn't run on projects, using VPC Service Controls to protect Natural Language API does not have any effect. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | networkconnectivity.googleapis.com | | Details | The API for Network Connectivity Center can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Network Connectivity Center, refer to theproduct documentation. | | Limitations | The Network Connectivity Center integration with VPC Service Controls has no known limitations. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | cloudasset.googleapis.com | | Details | The API for Cloud Asset API can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Cloud Asset API, refer to theproduct documentation. | | Limitations | - VPC Service Controls doesn't support access to folder-level or organization-level Cloud Asset API resources from resources and clients inside a service perimeter. VPC Service Controls protects project-level Cloud Asset API resources. You can specify an egress policy to prevent access to project-level Cloud Asset API resources from projects inside the perimeter.
- VPC Service Controls doesn't support adding folder-level or organization-level Cloud Asset API resources into a service perimeter. You cannot use a perimeter to protect folder-level or organization-level Cloud Asset API resources. To manage Cloud Asset Inventory permissions at the folder or organization level, we recommend using IAM.
|
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | speech.googleapis.com | | Details | The API for Speech-to-Text can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Speech-to-Text, refer to theproduct documentation. | | Limitations | The Speech-to-Text integration with VPC Service Controls has no known limitations. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | texttospeech.googleapis.com | | Details | The API for Text-to-Speech can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Text-to-Speech, refer to theproduct documentation. | | Limitations | The Text-to-Speech integration with VPC Service Controls has no known limitations. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | translate.googleapis.com | | Details | The API for Translation can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Translation, refer to theproduct documentation. | | Limitations | Cloud Translation - Advanced (v3) supports VPC Service Controls but not Cloud Translation - Basic (v2). To apply VPC Service Controls, you must use Cloud Translation - Advanced (v3). For more information about the different editions, seeCompare Basic and Advanced. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | licensemanager.googleapis.com | | Details | Create a service perimeter for License Manager with the License Manager API to secure your licenses. For more information about License Manager, refer to theproduct documentation. | | Limitations | The License Manager integration with VPC Service Controls has no known limitations. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | livestream.googleapis.com | | Details | Use VPC Service Controls with the Live Stream API to secure your pipeline. For more information about Live Stream API, refer to theproduct documentation. | | Limitations | To protect input endpoints with a service perimeter, you must follow the instructions for setting up a private pool and send input video streams over a private connection. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | transcoder.googleapis.com | | Details | The API for Transcoder API can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Transcoder API, refer to theproduct documentation. | | Limitations | The Transcoder API integration with VPC Service Controls has no known limitations. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | videostitcher.googleapis.com | | Details | The API for Video Stitcher API can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Video Stitcher API, refer to theproduct documentation. | | Limitations | The Video Stitcher API integration with VPC Service Controls has no known limitations. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | accessapproval.googleapis.com | | Details | The API for Access Approval can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Access Approval, refer to theproduct documentation. | | Limitations | The Access Approval integration with VPC Service Controls has no known limitations. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | healthcare.googleapis.com | | Details | The API for Cloud Healthcare API can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Cloud Healthcare API, refer to theproduct documentation. | | Limitations | VPC Service Controls doesn't supportcustomer-managed encryption keys (CMEK) in the Cloud Healthcare API. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | storagetransfer.googleapis.com | | Details | We recommend placing your Storage Transfer Service project within the same service perimeter as your Cloud Storage resources. This protects both your transfer and your Cloud Storage resources. Storage Transfer Service also supports scenarios where the Storage Transfer Service project is not in the same perimeter as your Cloud Storage buckets, using anegress policy. For setup information, seeUsing Storage Transfer Service with VPC Service Controls Transfer service for on-premises data SeeUsing Transfer for on-premises with VPC Service Controls for details and setup information for Transfer for on-premises. For more information about Storage Transfer Service, refer to theproduct documentation. | | Limitations | The Storage Transfer Service integration with VPC Service Controls has no known limitations. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | servicecontrol.googleapis.com | | Details | The API for Service Control can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Service Control, refer to theproduct documentation. | | Limitations | - When you call the Service Control API from a VPC network in a service perimeter with Service Control restricted to report billing or analytics metrics, you can only use theService Control report method to report metrics for VPC Service Controls supported services.
|
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | redis.googleapis.com | | Details | The API for Memorystore for Redis can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Memorystore for Redis, refer to theproduct documentation. | | Limitations | Service perimeters protect only the Memorystore for Redis API. Perimeters do not protect normal data access on Memorystore for Redis instances within the same network. If the Cloud Storage API is also protected, then Memorystore for Redis import and export operations can only read and write to a Cloud Storage bucket within the same service perimeter as the Memorystore for Redis instance. If you use both Shared VPC and VPC Service Controls, you must have the host project that provides the network and the service project that contains the Redis instance inside the same perimeter in order for Redis requests to succeed. At any time, separating the host project and service project with a perimeter can cause a Redis instance failure, in addition to blocked requests. For more information, see Memorystore for Redisconfiguration requirements.
|
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | memcache.googleapis.com | | Details | The API for Memorystore for Memcached can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Memorystore for Memcached, refer to theproduct documentation. | | Limitations | |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | memorystore.googleapis.com | | Details | Service perimeters protect only the Memorystore for Valkey API. Perimeters do not protect normal data access on Memorystore for Valkey instances within the same network. If the Cloud Storage API is also protected, then Memorystore for Valkey import and export operations can only read and write to a Cloud Storage bucket within the same service perimeter as the Memorystore for Valkey instance. If you use both Shared VPC and VPC Service Controls, you must have the host project that provides the network and the service project that contains the Redis instance inside the same perimeter in order for Redis requests to succeed. At any time, separating the host project and service project with a perimeter can cause a Redis instance failure, in addition to blocked requests. For more information, see Memorystore for Valkeyconfiguration requirements. The Memorystore for Valkey API ismemorystore.googleapis.com. For this reason, the display name for Memorystore for Valkey is "Memorystore API" when using the VPC Service Controls in the Google Cloud console.
For more information about Memorystore for Valkey, refer to theproduct documentation. | | Limitations | The Memorystore for Valkey integration with VPC Service Controls has no known limitations. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | servicedirectory.googleapis.com | | Details | The API for Service Directory can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Service Directory, refer to theproduct documentation. | | Limitations | The Service Directory integration with VPC Service Controls has no known limitations. |
|
| | Status | Preview. The integration of this product with VPC Service Controls is in Preview and is ready for broader testing and use, but is not fully supported for production environments. | | Protect with perimeters? | No. The API for Transfer Appliance cannot be protected by service perimeters. However, Transfer Appliance can be used normally in projects inside a perimeter. | | Details | Transfer Appliance is fully supported for projects using VPC Service Controls. Transfer Appliance doesn't offer an API, and therefore does not support API-related features in VPC Service Controls. For more information about Transfer Appliance, refer to theproduct documentation. | | Limitations | - When Cloud Storage is protected by VPC Service Controls, the Cloud KMS key you share with the Transfer Appliance Team must be within the same project as the destination Cloud Storage bucket.
|
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | orgpolicy.googleapis.com | | Details | The API for Organization Policy Service can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Organization Policy Service, refer to theproduct documentation. | | Limitations | VPC Service Controls doesn't support access restrictions to folder-level or organization-level organization policies that are inherited by the project. VPC Service Controls protects project-level Organization Policy Service API resources. For example, if an ingress rule restricts a user from accessing the Organization Policy Service API, that user gets a 403 error when querying for organization policies enforced on the project. However, the user is still able to access the organization policies of the folder and organization containing the project. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | oslogin.googleapis.com | | Details | You can call the OS Login API from within VPC Service Controls perimeters. To manage OS Login from within VPC Service Controls perimeters,set up OS Login. SSH connections to VM instances are not protected by VPC Service Controls. For more information about OS Login, refer to theproduct documentation. | | Limitations | The OS Login methods for reading and writing SSH keys don't enforce VPC Service Controls perimeters. Use VPC accessible services to disable access to OS Login APIs. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | servicehealth.googleapis.com | | Details | The API for Personalized Service Health can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Personalized Service Health, refer to theproduct documentation. | | Limitations | VPC Service Controls does not support theOrganizationEvents andOrganizationImpacts resources of the Service Health API. Therefore, VPC Service Controls policy checks won't occur when you call the methods for these resources. However, you can call the methods from a service perimeter using a restricted VIP. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | osconfig.googleapis.com | | Details | You can call the OS Config API from within VPC Service Controls perimeters. To use VM Manager from within VPC Service Controls perimeters,set up VM Manager. For more information about VM Manager, refer to theproduct documentation. | | Limitations | To fully protect VM Manager, you must include all of the following APIs in your perimeter: - OS Config API (
osconfig.googleapis.com) - Compute Engine API (
compute.googleapis.com) - Artifact Analysis API (
containeranalysis.googleapis.com)
VM Manager does not host package and patch content. OS patch management uses the update tools for the operating system which require that package updates and patches are retrievable on the VM. For patching to work, you might need to use Cloud NAT or host your own package repository or Windows Server Update Service within your Virtual Private Cloud. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | workflows.googleapis.com | | Details | Workflows is an orchestration platform that can combine Google Cloud Platform services and HTTP-based APIs to execute services in an order that you define. When you protect the Workflows API using a service perimeter, the Workflow Executions API is also protected. You do not need to separately addworkflowexecutions.googleapis.com to your perimeter's list of protected services. HTTP requests from a Workflows execution are supported as follows: - Authenticated requests to VPC Service Controls-compliant Google Cloud endpoints are allowed.
- Requests to Cloud Run functions and Cloud Run service endpoints are allowed.
- Requests to third-party endpoints are blocked.
- Requests to non-VPC Service Controls-compliant Google Cloud endpoints are blocked.
For more information about Workflows, refer to theproduct documentation. | | Limitations | The Workflows integration with VPC Service Controls has no known limitations. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | file.googleapis.com | | Details | The API for Filestore can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Filestore, refer to theproduct documentation. | | Limitations | Service perimeters protect only the Filestore API. Perimeters do not protect normal NFS data access on Filestore instances within the same network. If you use both Shared VPC and VPC Service Controls, you must have the host project that provides the network and the service project that contains the Filestore instance inside the same perimeter for the Filestore instance to function correctly. Separating the host project and service project with a perimeter might cause the existing instances to become unavailable and might not create new instances.
|
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | parallelstore.googleapis.com | | Details | For more information about Parallelstore, refer to theproduct documentation. | | Limitations | If you use both Shared VPC and VPC Service Controls, you must have the host project that provides the network and the service project that contains the Parallelstore instance inside the same perimeter for the Parallelstore instance to function correctly. Separating the host project and service project with a perimeter might cause the existing instances to become unavailable and might not create new instances.
|
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | containerthreatdetection.googleapis.com | | Details | The API for Container Threat Detection can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Container Threat Detection, refer to theproduct documentation. | | Limitations | |
|
| | Status | Preview. The integration of this product with VPC Service Controls is in Preview and is ready for broader testing and use, but is not fully supported for production environments. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | adsdatahub.googleapis.com | | Details | For more information about Ads Data Hub, refer to theproduct documentation. | | Limitations | Ads Data Hub and VPC Service Controls are subject to different terms of service. Review the terms of each product for details. Certain Ads Data Hub features (such as custom audience activation, custom bidding, and LiveRamp match tables) require certain user data to be exported outside of the VPC Service Controls perimeter. If Ads Data Hub is added as a restricted service, it will bypass VPC Service Controls policies for these features in order to retain their functionality. All dependent services must be included as allowed services in the same VPC Service Controls perimeter. For example, since Ads Data Hub relies on BigQuery, BigQuery must also be added. In general, VPC Service Controls best practices recommend including all services in the perimeter, i.e. “restricting all services”. Customers with multi-tier Ads Data Hub account structures (such as agencies with subsidiaries) should have all of their admin projects in the same perimeter. For simplicity, Ads Data Hub recommends that customers with multi-tier account structures restrict their admin projects to the same Google Cloud organization. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | sts.googleapis.com | | Details | VPC Service Controls only restricts token exchanges if theaudience in the request is a project-level resource. For example, VPC Service Controls doesn't restrict requests fordownscoped tokens, because those requests have no audience. VPC Service Controls also doesn't restrict requests forWorkforce Identity Federation because the audience is an organization-level resource. For more information about Security Token Service, refer to theproduct documentation. | | Limitations | |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | firestore.googleapis.com, datastore.googleapis.com, firestorekeyvisualizer.googleapis.com | | Details | Thefirestore.googleapis.com,datastore.googleapis.com, andfirestorekeyvisualizer.googleapis.com services are bundled together. When you restrict thefirestore.googleapis.com service in a perimeter, the perimeter also restricts thedatastore.googleapis.com andfirestorekeyvisualizer.googleapis.com services. You don't need to separately add these services to your perimeter's list of protected services. To restrictdatastore.googleapis.com service, use thefirestore.googleapis.com service name. To get full egress protection on import and export operations, you must use the Firestore service agent. See the following for more information: For more information about Firestore/Datastore, refer to theproduct documentation. | | Limitations | |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | vmmigration.googleapis.com | | Details | The API for Migrate to Virtual Machines can be protected by VPC Service Controls, and the product can be used normally inside service perimeters. For more information about Migrate to Virtual Machines, refer to theproduct documentation. | | Limitations | To fully protect Migrate to Virtual Machines, add all of the following APIs to the service perimeter: - Artifact Registry API (
artifactregistry.googleapis.com) - Pub/Sub API (
pubsub.googleapis.com) - Cloud Storage API (
storage.googleapis.com) - Cloud Logging API (
logging.googleapis.com) - Container Registry API (
containerregistry.googleapis.com) - Secret Manager API (
secretmanager.googleapis.com) - Compute Engine API (
compute.googleapis.com)
For more information, see theMigrate to Virtual Machines documentation.
|
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | - migrationcenter.googleapis.com
- rapidmigrationassessment.googleapis.com
| | Details | VPC Service Controls lets you protect the infrastructure data that you collect with Migration Center with a service perimeter. For more information about Migration Center, refer to theproduct documentation. | | Limitations | After you enable the service perimeter, you can't transfer your infrastructure data to StratoZone. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | backupdr.googleapis.com | | Details | The API for Backup and DR Service can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Backup and DR Service, refer to theproduct documentation. | | Limitations | If you remove the internet default route from the service producer project using the commandgcloud services vpc-peerings enable-vpc-service-controls, then you may not be able to access or deploy the management console. If you encounter this issue, contactGoogle Cloud Customer Care. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | gkebackup.googleapis.com | | Details | You can use VPC Service Controls to protect backup for GKE and you can use backup for GKE features normally inside service perimeters. For more information about Backup for GKE, refer to theproduct documentation. | | Limitations | The Backup for GKE integration with VPC Service Controls has no known limitations. |
|
| | Status | Preview. The integration of this product with VPC Service Controls is in Preview and is ready for broader testing and use, but is not fully supported for production environments. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | retail.googleapis.com | | Details | The API for Retail API can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Retail API, refer to theproduct documentation. | | Limitations | The Retail API integration with VPC Service Controls has no known limitations. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | integrations.googleapis.com | | Details | Application Integration is a collaborative workflow management system that allows you to create, augment, debug and understand core business system workflows. The workflows on the Application Integration are made up of triggers and tasks. There are several kinds of triggers such as api trigger/Pub/Sub trigger/cron trigger/sfdc trigger. For more information about Application Integration, refer to theproduct documentation. | | Limitations | |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | connectors.googleapis.com | | Details | The API for Integration Connectors can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Integration Connectors, refer to theproduct documentation. | | Limitations | - To connect to non-Google Cloud backends (for example, on-premises systems or services in other clouds), you must use aPrivate Service Connect attachment. Doing so keeps the connection within your VPC network and off the public internet. Connections to these backends fail without an attachment.
- When usingevent subscriptions within a VPC Service Controls perimeter, automatic backend registration isn't supported. You must manually configure the backend to send events to the connection's event listener endpoint. These event subscriptions also require aPrivate Service Connect attachment.
|
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | clouderrorreporting.googleapis.com | | Details | The API for Error Reporting can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Error Reporting, refer to theproduct documentation. | | Limitations | Notifications sent when a new or reoccurring error group is found contain information about the error group. To prevent data exfiltration outside of the VPC Service Controls perimeter, ensure that notification channels are within your organization. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | workstations.googleapis.com | | Details | The API for Cloud Workstations can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Cloud Workstations, refer to theproduct documentation. | | Limitations | - To fully protect Cloud Workstations, you must restrict the Compute Engine API in your service perimeter whenever you restrict the Cloud Workstations API.
- Ensure that Google Cloud Storage API, Google Container Registry API, and Artifact Registry API are VPC accessible in your service perimeter. This is needed to pull images onto your workstation. We also recommended that you allow Cloud Logging API and Cloud Error Reporting API to be VPC accessible in your service perimeter, although this is not required to use Cloud Workstations.
- Ensure that your workstation cluster isprivate. Configuring a private cluster prevents connections to your workstations from outside your VPC service perimeter.
- Ensure that you disable public IP addresses in your workstation configuration. Failing to do so results in VMs with public IP addresses in your project. We strongly recommend that you use the
constraints/compute.vmExternalIpAccess organization policy constraint to disable public IP addresses for all VMs in your VPC service perimeter. For details, seeRestricting external IP addresses to specific VMs. - While connecting to your workstation, access control is only based on whether the private network you are connecting from belongs to the security perimeter. Access control based on device, public IP address, or location is not supported.
|
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | ids.googleapis.com | | Details | The API for Cloud IDS can be protected by VPC Service Controls, and the product can be used normally inside service perimeters. For more information about Cloud IDS, refer to theproduct documentation. | | Limitations | Cloud IDS uses Cloud Logging to create threat logs in your project. If Cloud Logging is restricted by the service perimeter, VPC Service Controls blocks the Cloud IDS threat logs, even if Cloud IDS is not added as a restricted service to the perimeter. To use Cloud IDS inside a service perimeter, you must configure aningress rule for the Cloud Logging service account in your service perimeter. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | beyondcorp.googleapis.com | | Details | For more information about Chrome Enterprise Premium, refer to theproduct documentation. | | Limitations | The Chrome Enterprise Premium integration with VPC Service Controls has no known limitations. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | policytroubleshooter.googleapis.com | | Details | When you restrict the Policy Troubleshooter API with a perimeter, principals can troubleshoot IAM allow policies only if all resources involved in the request are in the same perimeter. There are usually two resources involved in a troubleshooting request: - The resource you're troubleshooting access for. This resource can be any type. You explicitly specify this resource when you troubleshoot an allow policy.
The resource you're using to troubleshoot access. This resource is a project, folder, or organization. In the Google Cloud console and gcloud CLI, this resource is inferred based on the project, folder, or organization you have selected. In the REST API, you specify this resource using thex-goog-user-project header. This resource can be the same as the resource that you're troubleshooting access for, but it doesn't need to be.
If these resources aren't in the same perimeter, the request fails. For more information about Policy Troubleshooter, refer to theproduct documentation. | | Limitations | The Policy Troubleshooter integration with VPC Service Controls has no known limitations. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | policysimulator.googleapis.com | | Details | You can restrict the Policy Simulator API with a perimeter when simulating organization policies or allow and deny policies. Principals can simulate organization policies as expected inside service perimeters. Principals can simulate allow policies only if certain resources involved in the simulation are in the same perimeter. There are several resources involved in an allow policy simulation: - The resource whose allow policy you're simulating. This resource is also called thetarget resource. In the Google Cloud console, this is the resource whose allow policy you're editing. In the gcloud CLI and REST API, you explicitly specify this resource when you simulate an allow policy.
The project, folder, or organization that creates and runs the simulation. This resource is also called thehost resource. In the Google Cloud console and gcloud CLI, this resource is inferred based on the project, folder, or organization you have selected. In the REST API, you specify this resource using thex-goog-user-project header. This resource can be the same as the resource that you're simulating access for, but it doesn't need to be. The resource that provides access logs for the simulation. In a simulation, there is always one resource that provides access logs for the simulation. This resource varies depending on the target resource type: - If you are simulating an allow policy for a project or organization, Policy Simulator retrieves the access logs for that project or organization.
- If you are simulating an allow policy for a different type of resource, Policy Simulator retrieves the access logs for that resource's parent project or organization.
- If you are simulating multiple resources' allow policies at once, Policy Simulator retrieves the access logs for the resources' nearest common project or organization.
- All supported resources with relevant allow policies. When Policy Simulator runs a simulation, it considers all allow policies that might impact the user's access, including allow policies on the target resource's ancestor and descendant resources. As a result, these ancestor and descendant resources are also involved in simulations.
If the target resource and the host resource aren't in the same perimeter, the request fails. If the target resource and the resource that provides access logs for the simulation aren't in the same perimeter, the request fails. If the target resource and some supported resources with relevant allow policies aren't in the same perimeter, the requests succeeds, but the results might be incomplete. For example, if you're simulating a policy for a project in a perimeter, the results won't include the allow policy of the project's parent organization, because organizations are always outside of VPC Service Controls perimeters. To get more complete results, you can configureingress and egress rules for the perimeter. For more information about Policy Simulator, refer to theproduct documentation. | | Limitations | - VPC Service Controls does not support adding folder-level or organization-level resources to service perimeters. Therefore, you cannot use VPC Service Controls to protect folder-level and organization-level simulations of deny policies. Deny policy simulations on resources outside of the service perimeter still return complete results, and deny policy simulations on project-level resources are protected.
|
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | essentialcontacts.googleapis.com | | Details | The API for Essential Contacts can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Essential Contacts, refer to theproduct documentation. | | Limitations | The Essential Contacts integration with VPC Service Controls has no known limitations. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | identitytoolkit.googleapis.com, securetoken.googleapis.com | | Details | The API for Identity Platform can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Identity Platform, refer to theproduct documentation. | | Limitations | To fully protect Identity Platform, add the Secure Token API (securetoken.googleapis.com) to the service perimeter to allow token refresh.securetoken.googleapis.com is not listed on the VPC Service Controls page of the Google Cloud console. You can only add this service with thegcloud access-context-manager perimeters update command. If your application also integrates with theblocking functions feature, add Cloud Run functions (cloudfunctions.googleapis.com) to the service perimeter. The use of SMS-based multi-factor authentication (MFA), email authentication, or third-party identity providers causes data to be sent out of the perimeter. If you don't use MFA with SMS, email authentication, or third-party identity providers, disable these features.
|
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | gkemulticloud.googleapis.com | | Details | The API for GKE Multi-Cloud can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about GKE Multi-Cloud, refer to theproduct documentation. | | Limitations | - To fully protect the GKE Multi-Cloud API, you must include the Kubernetes Metadata API (
kubernetesmetadata.googleapis.com) as well in your perimeter.
|
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | gkeonprem.googleapis.com | | Details | The GKE On-Prem API can be protected by VPC Service Controls, and the API can be used normally inside service perimeters. For more information about GKE On-Prem API, refer to theproduct documentation. | | Limitations | |
|
| | Status | Preview. The integration of this product with VPC Service Controls is in Preview and is ready for broader testing and use, but is not fully supported for production environments. | | Protect with perimeters? | No. The API for Google Distributed Cloud (software only) for bare metal cannot be protected by service perimeters. However, Google Distributed Cloud (software only) for bare metal can be used normally in projects inside a perimeter. | | Details | You can create a cluster in your environment, which is connected to VPC using Cloud Interconnect or Cloud VPN. For more information about Google Distributed Cloud (software only) for bare metal, refer to theproduct documentation. | | Limitations | |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | ondemandscanning.googleapis.com | | Details | The API for On-Demand Scanning API can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about On-Demand Scanning API, refer to theproduct documentation. | | Limitations | The On-Demand Scanning API integration with VPC Service Controls has no known limitations. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | looker.googleapis.com | | Details | The API for Looker (Google Cloud core) can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Looker (Google Cloud core), refer to theproduct documentation. | | Limitations | OnlyEnterprise orEmbed editions of Looker (Google Cloud core) instances using private IP connections support VPC Service Controls compliance. Looker (Google Cloud core) instances with public IP connections or both public and private IP connections do not support VPC Service Controls compliance. To create an instance that uses a private IP connection, selectPrivate IP in theNetworking section of theCreate instance page of the Google Cloud console. When placing or creating a Looker (Google Cloud core) instance inside a VPC Service Controls service perimeter, you must remove the default route to the internet by calling theservices.enableVpcServiceControls method or by running the followinggcloud command:
gcloud services vpc-peerings enable-vpc-service-controls--network=your-network service=servicenetworking.googleapis.com
Removing the default route restricts outgoing traffic to onlyVPC Service Controls compliant services. For example, sending email will fail because the API that is used to send email is not VPC Service Controls compliant. If you're usingShared VPC, ensure that you either include the Looker (Google Cloud core) service project in the same service perimeter as the Shared VPC host project or create aperimeter bridge between the two projects. If the Looker (Google Cloud core) service project and the Shared VPC host project are not in same perimeter or cannot communicate through a perimeter bridge, instance creation could fail or the Looker (Google Cloud core) instance may not function properly. If you're usingLooker Studio Pro orStudio in Looker}, the Looker connector can't connect to a Looker (Google Cloud core) instance that is inside a VPC Service Controls perimeter. For more information about limitations of the Looker connector, see theOverview of Looker connector requirements, limits, and feature support documentation page.
|
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | publicca.googleapis.com | | Details | The API for Public Certificate Authority can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Public Certificate Authority, refer to theproduct documentation. | | Limitations | The Public Certificate Authority integration with VPC Service Controls has no known limitations. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | storagebatchoperations.googleapis.com | | Details | - To use VPC Service Controls with storage batch operations,create a service perimeter to protect the following project and Google Cloud services:
- Cloud Storage project
- Storage batch operations API (
storagebatchoperations.googleapis.com) - Cloud Storage API (
storage.googleapis.com) - Optional: Cloud KMS API (
cloudkms.googleapis.com), if you use the object encryption key updatesjob type.
- To allow access to storage batch operations from outside the perimeter, you mustconfigure ingress policies.
For more information about Storage batch operations, refer to theproduct documentation. | | Limitations | The Storage batch operations integration with VPC Service Controls has no known limitations. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | storageinsights.googleapis.com | | Details | The API for Storage Insights can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Storage Insights, refer to theproduct documentation. | | Limitations | The Storage Insights integration with VPC Service Controls has no known limitations. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | datapipelines.googleapis.com | | Details | To fully protect Dataflow Data Pipelines, include all of the following APIs in your perimeter: - Dataflow API (
dataflow.googleapis.com) - Cloud Scheduler API (
cloudscheduler.googleapis.com) - Container Registry API (
containerregistry.googleapis.com)
For more information about Dataflow Data Pipelines, refer to theproduct documentation. | | Limitations | The Dataflow Data Pipelines integration with VPC Service Controls has no known limitations. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | securitycenter.googleapis.com, securitycentermanagement.googleapis.com | | Details | The APIs for Security Command Center can be protected by VPC Service Controls, and Security Command Center can be used normally inside service perimeters.
Thesecuritycenter.googleapis.com andsecuritycentermanagement.googleapis.com services are bundled together. When you restrict thesecuritycenter.googleapis.com service in a perimeter, the perimeter restricts thesecuritycentermanagement.googleapis.com service by default. You cannot add thesecuritycentermanagement.googleapis.com service to the list of restricted services in a perimeter because it is bundled withsecuritycenter.googleapis.com. For more information about Security Command Center, refer to theproduct documentation. | | Limitations | - VPC Service Controls doesn't support access to folder-level or organization-level Security Command Center API resources from resources and clients inside a service perimeter. VPC Service Controls protects project-level Security Command Center API resources. You can specify an egress policy to prevent access to project-level Security Command Center API resources from projects inside the perimeter.
- VPC Service Controls doesn't support adding folder-level or organization-level Security Command Center API resources into a service perimeter. You cannot use a perimeter to protect folder-level or organization-level Security Command Center API resources. To manage Security Command Center permissions at the folder or organization level, we recommend using IAM.
- VPC Service Controls doesn't support thesecurity posture service because security posture resources (such as postures, posture deployments, and predefined posture templates) are organization-level resources.
- You cannot export findings at the folder or organization level into destinations inside a service perimeter.
- VPC Service Controls doesn't support Google Security Operations (Google Security Operations SIEM and Google Security Operations SOAR). Enabling Security Command Center Enterprise on projects within a service perimeter might lead to violations from unsupported security operations services. If you have VPC Service Controls configured, before you create a Google Security Operations instance, move the Google Cloud Platform project and Cloud Key Management Service (Cloud KMS) for customer-managed encryption keys (CMEK) project outside the VPC Service Controls perimeter.
- You must enable perimeter access in the following scenarios:
|
|
| | Status | Preview. The integration of this product with VPC Service Controls is in Preview and is ready for broader testing and use, but is not fully supported for production environments. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | cloudsupport.googleapis.com | | Details | The API for Cloud Customer Care can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Cloud Customer Care, refer to theproduct documentation. | | Limitations | VPC Service Controls protects data accessed through the Cloud Support API but doesn't protect data accessed through the Google Cloud console. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | discoveryengine.googleapis.com | | Details | The API for AI Applications - Vertex AI Search can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about AI Applications - Vertex AI Search, refer to theproduct documentation. | | Limitations | If you configure the Vertex AI Search widget for public access (that is, without an OAuth token), then calls to the API backend are made through a Google-managed service agent. Because this traffic doesn't carry your authentication token, the request can effectively bypass your organization's configured VPC Service Controls ingress rules. Even if you protect the discoveryengine.googleapis.com service inside a VPC Service Controls perimeter, a widget with public access can still be reached from outside that perimeter. If your organization requires VPC Service Controls enforcement to protect sensitive data, don't enable a widget that has public access. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | confidentialcomputing.googleapis.com | | Details | To ensure that Confidential Space functions correctly across perimeter boundaries, you must configure egress rules. - If your Confidential Space needs to access Cloud Storage buckets outside your perimeter, create an egress rule to allow access to those buckets.
- If you are enabling Confidential Space API on Compute Engine resources outside your perimeter, create an egress rule to allow access to this API.
For more information about Confidential Space, refer to theproduct documentation. | | Limitations | |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | ssh-serialport.googleapis.com | | Details | To use VPC Service Controls protection when connecting to the serial console for a virtual machine (VM) instance, you need to specify aningress rule for the service perimeter. When setting up the ingress rule, the access level for the source must be an IP-based value and the service name set tossh-serialport.googleapis.com. The ingress rule is required to access the serial console even if the source request and target resource are in the same perimeter. For more information about Serial console, refer to theproduct documentation. | | Limitations | - You can't useSSH-in-browser to access the serial console.
- You cannot access a serial console by using Private Google Access. You can access the serial console only from the public internet.
- When using a serial console, identity-based ingress or egress rules cannot be used to allow access to the serial console.
|
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | vmwareengine.googleapis.com | | Details | For more information about VMware Engine Service Controls, refer toVPC Service Controls with VMware Engine. For more information about Google Cloud VMware Engine, refer to theproduct documentation. | | Limitations | When adding existing VMware Engine networks, Private Clouds, Network Policies, and VPC Peering to a VPC Service Perimeter, previously created resources are not checked again to see if they still comply with the perimeter's policies. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | dataform.googleapis.com | | Details | To learn how to control access to Dataform with VPC Service Controls, seeConfigure VPC Service Controls for Dataform. For more information about Dataform, refer to theproduct documentation. | | Limitations | To use VPC Service Controls protection for Dataform, you must set the `dataform.restrictGitRemotes` organization policy and restrict BigQuery with the same service perimeter as Dataform. You should ensure that Identity and Access Management permissions granted to your service accounts used in Dataform reflect your security architecture. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | websecurityscanner.googleapis.com | | Details | Web Security Scanner and VPC Service Controls are subject to different terms of service. Review the terms of each product for details. Web Security Scanner sends the findings to Security Command Center on demand. You can view or download the data from the Security Command Center dashboard. For more information about Web Security Scanner, refer to theproduct documentation. | | Limitations | The Web Security Scanner integration with VPC Service Controls has no known limitations. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | securesourcemanager.googleapis.com | | Details | - You need to configureCertificate Authority Service with a working certificate authority before creating Secure Source Manager VPC Service Controls instances.
- You need to configurePrivate Service Connect before accessing the Secure Source Manager VPC Service Controls instance.
For more information about Secure Source Manager, refer to theproduct documentation. | | Limitations | SERVICE_NOT_ALLOWED_FROM_VPC audit log violation caused by GKE limitations can be ignored.- To open the VPC Service Controls web interface with a browser, the browser needs access to the following URLs:
https://accounts.google.comhttps://LOCATION_OF_INSTANCE-sourcemanagerredirector-pa.client6.google.com- For example,
https://us-central1-sourcemanagerredirector-pa.client6.google.com
https://lh3.googleusercontent.com
|
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | networkservices.googleapis.com, networksecurity.googleapis.com | | Details | - The APIs for Secure Web Proxy can be protected by VPC Service Controls and the product can be used normally inside service perimeters.
- If you provision your proxy with acertificate, then you must also include the Certificate Manager API (
certificatemanager.googleapis.com) in your service perimeter. - If youenable TLS inspection for your proxy, then you must also include theCertificate Authority Service API (
privateca.googleapis.com) in your service perimeter.
For more information about Secure Web Proxy, refer to theproduct documentation. | | Limitations | The Secure Web Proxy integration with VPC Service Controls has no known limitations. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | apikeys.googleapis.com | | Details | The API for API keys can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about API keys, refer to theproduct documentation. | | Limitations | The API keys integration with VPC Service Controls has no known limitations. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | cloudcontrolspartner.googleapis.com | | Details | The Cloud Controls Partner API can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Partner console in Sovereign Controls by Partners, refer to theproduct documentation. | | Limitations | - This service must be restricted for all non-partners. If you're a partner supporting Sovereign Controls by Partners, you can protect this service using a service perimeter.
|
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | microservices.googleapis.com | | Details | The API for Microservices can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Microservices, refer to theproduct documentation. | | Limitations | The Microservices integration with VPC Service Controls has no known limitations. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | earthengine.googleapis.com, earthengine-highvolume.googleapis.com | | Details | Theearthengine.googleapis.com andearthengine-highvolume.googleapis.com services are bundled together. When you restrict theearthengine.googleapis.com service in a perimeter, the perimeter restricts theearthengine-highvolume.googleapis.com service by default. You cannot add theearthengine-highvolume.googleapis.com service to the list of restricted services in a perimeter because it is bundled withearthengine.googleapis.com. For more information about Earth Engine, refer to theproduct documentation. | | Limitations | - The Earth EngineCode Editor, a web-based IDE for the Earth Engine JavaScript API, is not supported and VPC Service Controls doesn't allow using the Earth Engine Code Editor with resources and clients inside a service perimeter.
- Legacy assets are not protected by VPC Service Controls.
- Export to Google Drive is not supported by VPC Service Controls.
- Earth Engine Apps are not supported for resources and clients inside a service perimeter.
- VPC Service Controls is only available forPremium andProfessional Earth Engine pricing plans. For more information about pricing plans, see Earth Engine plans.
For more information about limitations and example workarounds, see Earth Engineaccess control documentation. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | apphub.googleapis.com | | Details | App Hub enables you to discover and organize infrastructure resources into applications. You can use VPC Service Controls perimeters to protect the App Hub resources. For more information about App Hub, refer to theproduct documentation. | | Limitations | You must set up VPC Service Controls on the App Hub host and service projects before you create an application and register services and workloads to the application. App Hub supports the following resource types: - Application
- Discovered service
- Discovered workload
- Service
- Service project attachment
- Workload
|
|
| | Status | Preview. The integration of this product with VPC Service Controls is in Preview and is ready for broader testing and use, but is not fully supported for production environments. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | cloudcode.googleapis.com | | Details | The Cloud Code API can be protected by VPC Service Controls. To use Gemini-powered features in Cloud Code, an ingress policy must be configured to allow traffic from IDE clients. See theGemini documentation for details. For more information about Cloud Code, refer to theproduct documentation. | | Limitations | The Cloud Code integration with VPC Service Controls has no known limitations. |
|
| | Status | Preview. The integration of this product with VPC Service Controls is in Preview and is ready for broader testing and use, but is not fully supported for production environments. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | commerceorggovernance.googleapis.com | | Details | VPC Service Controls perimeter protects the Commerce Org Governance API for Google Private Marketplace. For more information about Commerce Org Governance API, refer to theproduct documentation. | | Limitations | Resources such as procurement request and access request, which the Commerce Org Governance API creates at the project level, surface up to the organization level and are reviewed by the Organization Administrator without enforcing VPC Service Controls policies. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | contactcenteraiplatform.googleapis.com | | Details | To restrict the internet traffic, use organization policies. Invoke theCREATE orUPDATE methods of the Google Cloud Contact Center as a Service API toapply the organization policy constraints manually. For more information about Google Cloud Contact Center as a Service, refer to theproduct documentation. | | Limitations | The Google Cloud Contact Center as a Service integration with VPC Service Controls has no known limitations. |
|
| | Status | Preview. The integration of this product with VPC Service Controls is in Preview and is ready for broader testing and use, but is not fully supported for production environments. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | privilegedaccessmanager.googleapis.com | | Details | The API for Privileged Access Manager can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Privileged Access Manager, refer to theproduct documentation. | | Limitations | - VPC Service Controls doesn't support adding folder-level or organization-level resources into a service perimeter. You can't use a perimeter to protect folder-level or organization-level Privileged Access Manager resources. VPC Service Controls protects project-level Privileged Access Manager resources.
- To protect Privileged Access Manager, you need to include the following APIs in your perimeter:
- Privileged Access Manager API (
privilegedaccessmanager.googleapis.com) - Cloud Resource Manager API (
cloudresourcemanager.googleapis.com) - Cloud Logging API (
logging.googleapis.com) - Cloud Asset API (
cloudasset.googleapis.com)
|
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | serviceusage.googleapis.com | | Details | The API for Service Usage can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Service Usage, refer to theproduct documentation. | | Limitations | VPC Service Controls doesn't support the restriction ofService Usage API'sv1beta1 methods and blocks calls to these methods through the restricted VIP. |
|
| | Status | Preview. The integration of this product with VPC Service Controls is in Preview and is ready for broader testing and use, but is not fully supported for production environments. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | auditmanager.googleapis.com | | Details | The API for Audit Manager can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Audit Manager, refer to theproduct documentation. | | Limitations | - You can't use a perimeter to protect folder-level or organization-level Audit Manager resources. To manage Audit Manager permissions at the folder or organization level, we recommend using IAM.
- You must enable perimeter access usingingress and egress rules in the following scenarios:
- If yourun an audit at the folder level and the Cloud Storage bucket is inside a perimeter, configure aningress rule for theservice account.
- If yourun an audit at the folder level and the projects inside the folder are protected by a perimeter, configure aningress rule for theservice account.
- If yourun an audit at the project level, the project is protected by a perimeter, and the Cloud Storage bucket is not inside the same perimeter, configure anegress rule for the project that contains the Cloud Storage bucket.
For more information, seeConfigure VPC Service Controls for Audit Manager.
|
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | discoveryengine.googleapis.com | | Details | The API for Gemini Enterprise can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Gemini Enterprise, refer to theproduct documentation. | | Limitations | When you enable VPC Service Controls on a Google Cloud Platform project that contains a Gemini Enterprise app, you're blocked from creating or using Gemini Enterprise actions by default, and any attempt to create an action in the UI is prohibited. To enable and use actions for specific services within your VPC Service Controls perimeter, you must contact your Google representative and request to be added to the allowlist. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | discoveryengine.googleapis.com | | Details | The API for Gemini Enterprise - NotebookLM for enterprise can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Gemini Enterprise - NotebookLM for enterprise, refer to theproduct documentation. | | Limitations | The Gemini Enterprise - NotebookLM for enterprise integration with VPC Service Controls has no known limitations. |
|
| | Status | Preview. The integration of this product with VPC Service Controls is in Preview and is ready for broader testing and use, but is not fully supported for production environments. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | developerconnect.googleapis.com | | Details | The API for Developer Connect can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Developer Connect, refer to theproduct documentation. | | Limitations | |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | parametermanager.googleapis.com | | Details | The API for Parameter Manager can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Parameter Manager, refer to theproduct documentation. | | Limitations | Parameter Manager must be in the same VPC Service Controls perimeter as Secret Manager. |
|
| | Status | Preview. The integration of this product with VPC Service Controls is in Preview and is ready for broader testing and use, but is not fully supported for production environments. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | modelarmor.googleapis.com | | Details | The API for Model Armor can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Model Armor, refer to theproduct documentation. | | Limitations | Model Armor uses regional endpoints, which aren't supported by Private Google Access. When you restrict Model Armor within a perimeter, you must use a Private Service Connect endpoint for Model Armor to function as expected with VPC Service Controls. |
|
Autoscaling | | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | autoscaling.googleapis.com | | Details | The API for Autoscaling can be protected by VPC Service Controls and the product can be used normally inside service perimeters. | | Limitations | The Autoscaling integration with VPC Service Controls has no known limitations. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | addressvalidation.googleapis.com | | Details | The API for Address Validation can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Address Validation, refer to theproduct documentation. | | Limitations | The Address Validation integration with VPC Service Controls has no known limitations. |
|
| | Status | Preview. The integration of this product with VPC Service Controls is in Preview and is ready for broader testing and use, but is not fully supported for production environments. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | places.googleapis.com | | Details | The API for Places (New) can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Places (New), refer to theproduct documentation. | | Limitations | The Places (New) integration with VPC Service Controls has no known limitations. |
|
| | Status | GA. This product integration is fully supported by VPC Service Controls. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | managedkafka.googleapis.com | | Details | The API for Google Cloud Managed Service for Apache Kafka can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Google Cloud Managed Service for Apache Kafka, refer to theproduct documentation. | | Limitations | Managed Service for Apache Kafka relies on underlying networking services. To help protect this service, make sure that all necessary services are also included within your service perimeter: - Compute Engine API (
compute.googleapis.com) - Cloud DNS API (
dns.googleapis.com)
To help protect a Kafka Connect connector, include any services the connector calls in your perimeter. Depending on the connector type, the connector might call one of the following services: - BigQuery API (
bigquery.googleapis.com) - Cloud Storage API (
storage.googleapis.com) - Pub/Sub API (
pubsub.googleapis.com)
|
|
| | Status | Preview. The integration of this product with VPC Service Controls is in Preview and is ready for broader testing and use, but is not fully supported for production environments. | | Protect with perimeters? | No. The API for Geocoding cannot be protected by service perimeters. However, Geocoding can be used normally in projects inside a perimeter. | | Details | VPC Service Controls only protectthe Geocoding API and don't supportthe Geocoding API v4 (geocoding.googleapis.com). Because the Geocoding API is a stateless API, you can't enforce the VPC Service Controls restrictions on the Geocoding API by adding it to a perimeter. For more information about Geocoding, refer to theproduct documentation. | | Limitations | The Geocoding integration with VPC Service Controls has no known limitations. |
|
| | Status | Preview. The integration of this product with VPC Service Controls is in Preview and is ready for broader testing and use, but is not fully supported for production environments. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | cloudsecuritycompliance.googleapis.com | | Details | The API for Compliance Manager can be protected by VPC Service Controls and the product can be used normally inside service perimeters. For more information about Compliance Manager, refer to theproduct documentation. | | Limitations | You must configure egress and ingress rules to useCompliance Manager within a service perimeter. For more information, see Configure Compliance Manager support for VPC Service Controls. You can't use a perimeter to help protect Compliance Manager resources at the folder level or organization level. To manage Compliance Manager permissions at the folder or organization level,use IAM.
|
|
| | Status | Preview. The integration of this product with VPC Service Controls is in Preview and is ready for broader testing and use, but is not fully supported for production environments. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | maintenance.googleapis.com | | Details | Unified Maintenance provides a centralized view of planned disruptive maintenance events across supported Google Cloud Platform products. For more information about Unified Maintenance, refer to theproduct documentation. | | Limitations | The Unified Maintenance integration with VPC Service Controls has no known limitations. |
|
| | Status | Preview. The integration of this product with VPC Service Controls is in Preview and is ready for broader testing and use, but is not fully supported for production environments. | | Protect with perimeters? | Yes. You can configure your perimeters to protect this service. | | Service name | geminidataanalytics.googleapis.com | | Details | A service perimeter can restrict only the Conversational Analytics API service endpoint. To enforce data protection for the Conversational Analytics API's data sources such as BigQuery, Looker, and Looker Studio, you must also restrict these data sources and the corresponding services in the service perimeter. For more information about Conversational Analytics API, refer to theproduct documentation. | | Limitations | While the service perimeter restricts the Conversational Analytics API, IAM governs access to the API and its underlying data sources. To restrict the data that you use with the Conversational Analytics API within the perimeter, you must have thenecessary IAM permissions to access the API and the data sources from within the API. |
|