Overview
This document describes procedures for configuring and managing infrastructure resources in our GCP environment. All infrastructure changes must follow the change management process.Configuration Standards
All infrastructure must be configured according to the standards defined in Operations Security Policy Appendix A. Key standards include:- System hardening requirements
- Network security controls
- Cloud-specific security configurations
- Container and CI/CD security
Common Infrastructure Procedures
1. Managing Secrets and Credentials
When needed:- Adding API keys for third-party integrations
- Storing database credentials
- Managing service account keys
- Storing encryption keys
- Never commit secrets to Git repositories
- Store secrets in GCP Secret Manager
- Use appropriate access controls (least privilege)
- Request access to secrets via standard access request process
- Rotate secrets according to policy requirements
- Document secret purpose and ownership
2. Creating and Modifying GCP Resources
When needed:- Provisioning new Cloud Functions
- Creating Firestore databases or collections
- Configuring Cloud Storage buckets
- Setting up Cloud Run services
- Modifying IAM roles and permissions
- Create GitLab ticket documenting the change
- Include business justification and impact assessment
- Follow change management approval workflow
- Apply security hardening standards from Operations Security Policy
- Use infrastructure-as-code where feasible
- Document configuration in ticket
- Test in non-production environment first
- Deploy to production following change management process
- Enable audit logging (Cloud Audit Logs)
- Configure appropriate network access controls
- Implement least-privilege IAM roles
- Enable encryption at rest and in transit
- Follow principle of least privilege for service accounts
3. Requesting Infrastructure Changes
All infrastructure changes require:- GitLab ticket with change request
- Approval from system owner or DevOps lead
- Change impact assessment
- Testing in non-production environment (where applicable)
Network and Security Configuration
Firewall Rules and Network Access
Network configuration changes must:- Follow change management approval process
- Be documented in GitLab ticket
- Include business justification
- Follow principle of least privilege (minimum necessary access)
- Be reviewed at least annually
Production Environment Access
Access to production infrastructure is restricted to:- Authorized DevOps engineers
- Team leads with production responsibilities
- All access requires MFA
- All changes require change management approval
Infrastructure Security Scanning
Infrastructure security is validated through:- GCP Security Command Center (Standard tier)
- Annual penetration testing
- Quarterly vulnerability scanning
- Continuous security monitoring and alerting
Related Documentation
- Change Management Procedure
- Operations Security Policy
- Access Control Policy
- Cryptography Policy