This page describes how Config Validator works.
The Config Validator Scanner allows you to scan for non-compliant resources in your GCP infrastructure.
These constraints are a good way for you to translate your security policies into code, and can be configured to meet your granular requirements. And because policy constraints are based on Config Validator templates, it’s easy to reuse the same code base to implement similar, but distinct constraints.
With this scanner in place, users are now able to define customized policies easily without writing a new scanner.
Note: Forseti Security team does not plan to add any new custom scanners or expand the existing custom scanners.