Preview: Eight new organization policy constraints are available to help you
Share
Services
## Feature
**Preview:** Eight new organization policy constraints are available to help you enforce security best practices for Compute Engine virtual machine (VM) instances.
These [managed constraints](https://cloud.google.com/resource-manager/docs/organization-policy/using-constraints#managed-constraints)simplify governance for common security scenarios and integrate with safe rollout tools like[dry-run](https://cloud.google.com/resource-manager/docs/organization-policy/dry-run-policy)and[simulation](https://cloud.google.com/policy-intelligence/docs/test-organization-policies), letting you test their impact before enforcement.
The new constraints are as follows:
* `compute.managed.disableNestedVirtualization`
* `compute.managed.disableSerialPortAccess`
* `compute.managed.disableSerialPortLogging`
* `compute.managed.disallowGlobalDns`
* `compute.managed.requireOsConfig`
* `compute.managed.requireOsLogin`
* `compute.managed.vmCanIpForward`
* `compute.managed.vmExternalIpAccess`
These constraints can evaluate metadata values at the [VM instance, project, or zonal level](https://cloud.google.com/compute/docs/metadata/overview#metadata-directories). For more information about these managed constraints, see [Managed Constraints](https://cloud.google.com/resource-manager/docs/organization-policy/org-policy-constraints#managed-constraints) in the Resource Manager documentation.
What else is happening at Google Cloud Platform?
Addressed multiple Common Vulnerabilities and Exposures (CVEs) by updating dependencies
about 9 hours ago
Services
Share
Read update
Services
Share
Read update
Services
Share