HEX
Server: Apache/2.4.65 (Ubuntu)
System: Linux ielts-store-v2 6.8.0-1036-gcp #38~22.04.1-Ubuntu SMP Thu Aug 14 01:19:18 UTC 2025 x86_64
User: root (0)
PHP: 7.2.34-54+ubuntu20.04.1+deb.sury.org+1
Disabled: pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals,
Upload Files
File: //snap/google-cloud-cli/394/help/man/man1/gcloud_compute_org-security-policies_update.1
.TH "GCLOUD_COMPUTE_ORG\-SECURITY\-POLICIES_UPDATE" 1



.SH "NAME"
.HP
gcloud compute org\-security\-policies update \- update a Compute Engine organization security policy



.SH "SYNOPSIS"
.HP
\f5gcloud compute org\-security\-policies update\fR \fISECURITY_POLICY\fR [\fB\-\-description\fR=\fIDESCRIPTION\fR] [\fB\-\-json\-custom\-content\-types\fR=[\fICONTENT_TYPE\fR,...]] [\fB\-\-json\-parsing\fR=\fIJSON_PARSING\fR] [\fB\-\-log\-level\fR=\fILOG_LEVEL\fR] [\fB\-\-organization\fR=\fIORGANIZATION\fR] [\fB\-\-user\-ip\-request\-headers\fR=[\fIUSER_IP_REQUEST_HEADER\fR,...]] [\fIGCLOUD_WIDE_FLAG\ ...\fR]



.SH "DESCRIPTION"

\fBgcloud compute org\-security\-policies update\fR is used to update
organization security policies. An organization security policy is a set of
rules that controls access to various resources.



.SH "EXAMPLES"

To update an organization security policy with ID \f5\fI123456789\fR\fR to
change the description to \f5\fINew description\fR\fR, run:

.RS 2m
$ gcloud compute org\-security\-policies update 123456789 \e
    \-\-description='New description'
.RE



.SH "POSITIONAL ARGUMENTS"

.RS 2m
.TP 2m
\fISECURITY_POLICY\fR

Short name or ID of the security policy to update.


.RE
.sp

.SH "FLAGS"

.RS 2m
.TP 2m
\fB\-\-description\fR=\fIDESCRIPTION\fR

An optional, textual description for the organization security policy.

.TP 2m
\fB\-\-json\-custom\-content\-types\fR=[\fICONTENT_TYPE\fR,...]

A comma\-separated list of custom Content\-Type header values to apply JSON
parsing for preconfigured WAF rules. Only applicable when JSON parsing is
enabled, like \f5\fI\-\-json\-parsing=STANDARD\fR\fR. When configuring a
Content\-Type header value, only the type/subtype needs to be specified, and the
parameters should be excluded.

.TP 2m
\fB\-\-json\-parsing\fR=\fIJSON_PARSING\fR

The JSON parsing behavior for this rule. Must be one of the following values:
[DISABLED, STANDARD, STANDARD_WITH_GRAPHQL]. \fIJSON_PARSING\fR must be one of:
\fBDISABLED\fR, \fBSTANDARD\fR, \fBSTANDARD_WITH_GRAPHQL\fR.

.TP 2m
\fB\-\-log\-level\fR=\fILOG_LEVEL\fR

The level of detail to display for WAF logging. \fILOG_LEVEL\fR must be one of:
\fBNORMAL\fR, \fBVERBOSE\fR.

.TP 2m
\fB\-\-organization\fR=\fIORGANIZATION\fR

Organization in which the organization security policy is to be updated. Must be
set if SECURITY_POLICY is the short name.

.TP 2m
\fB\-\-user\-ip\-request\-headers\fR=[\fIUSER_IP_REQUEST_HEADER\fR,...]

A comma\-separated list of request header names to use for resolving the
caller's user IP address.


.RE
.sp

.SH "GCLOUD WIDE FLAGS"

These flags are available to all commands: \-\-access\-token\-file, \-\-account,
\-\-billing\-project, \-\-configuration, \-\-flags\-file, \-\-flatten,
\-\-format, \-\-help, \-\-impersonate\-service\-account, \-\-log\-http,
\-\-project, \-\-quiet, \-\-trace\-token, \-\-user\-output\-enabled,
\-\-verbosity.

Run \fB$ gcloud help\fR for details.



.SH "NOTES"

These variants are also available:

.RS 2m
$ gcloud alpha compute org\-security\-policies update
.RE

.RS 2m
$ gcloud beta compute org\-security\-policies update
.RE