Vulnerable traffic reports are reported despite load balancer deny rule on Prisma Cloud
114
Created On 04/24/25 06:42 AM - Last Modified 12/17/25 03:17 AM
Symptom
- An alert was triggered for Google Cloud Platform VM instances, indicating potential internet exposure.
- However, upon investigation, it was confirmed that the affected VMs were not accessible from the internet.
- This suggests that the alert may have been a false positive.
Environment
- Prisma Cloud
- GCP alert rule
Cause
False positive alert.
Resolution
There are two potential scenarios where VMs could still be indirectly exposed:
- Firewall Rule Misconfiguration:
- The default VPC firewall rules block all inbound traffic.
- One needs to verify that no custom firewall rule has been created that inadvertently allows inbound traffic from 0.0.0.0/0 to the VM's internal IP addresses.
- Such a rule if present, could unintentionally expose the VMs to external sources.
- Absence of Load Balancer Security Policies:
- While the VMs are shielded behind the external Load Balancer, if there are no Google Cloud Armor policies or Load Balancer security policies applied to the frontend.
- The Load Balancer itself could become a potential target for attacks.
- Although the VMs would still not be directly exposed, the absence of such protection could lead to security vulnerabilities at the entry point.
Recommendations:
- According to the recommendations provided for the policy, a firewall rule should be added to the 'VPC network details' to deny access from 0.0.0.0/0.
- If there are alternate routes or entry points into the VPC that bypass the Global Load Balancer, traffic may be entering through these paths.
- Examine other network components such as additional firewalls, security groups and routing rules to confirm there are no alternative paths for traffic ingress.
- According to the Policy Recommendation for Remediation, it is essential to remove unrestricted access (0.0.0.0/0) in the firewall rules configuration.