Google Cloud Kubernetes Engine cluster should not be publicly accessible

Set up the gke integration.

Description

The control plane of a GKE cluster should not be open to the internet. Limiting internet access significantly reduces the attack surface.

Remediation

Consider allow-listing specific IP ranges in the cluster configuration.

Alternatively, consider making the cluster private and accessing it from an internal network or through Identity-aware Proxy (IaP).

PREVIEWING: safchain/fix-custom-agent