Description
Use corporate login credentials instead of consumer accounts, such as Gmail accounts.
Rationaleβ
It is recommended fully-managed corporate Google accounts be used for increased visibility, auditing, and controlling access to Cloud Platform resources. Email accounts based outside of the user's organization, such as consumer accounts, should not be used for business purposes.
Impactβ
There will be increased overhead as maintaining accounts will now be required. For smaller organizations, this will not be an issue, but will balloon with size.
Auditβ
For each Google Cloud Platform project, list the accounts that have been granted access to that project:
From Google Cloud CLIβ
gcloud projects get-iam-policy PROJECT_ID
Also list the accounts added on each folder:
gcloud resource-manager folders get-iam-policy FOLDER_ID
And list your organization's IAM policy:
gcloud organizations get-iam-policy ORGANIZATION_ID
No email accounts outside the organization domain should be granted permissions in the IAM policies. This excludes Google-owned service accounts.
Preventionβ
To ensure that no email addresses outside the organization can be granted IAM permissions to its Google Cloud projects, folders or organization, turn on the Organization Policy for Domain Restricted Sharing
.
Learn more at: https://cloud.google.com/resource-manager/docs/organization-policy/restricting-domains
Default Valueβ
By default, no email addresses outside the organization's domain have access to its Google Cloud deployments, but any user email account can be added to the IAM policy for Google Cloud Platform projects, folders, or organizations.
Referencesβ
- https://support.google.com/work/android/answer/6371476
- https://cloud.google.com/sdk/gcloud/reference/projects/get-iam-policy
- https://cloud.google.com/sdk/gcloud/reference/resource-manager/folders/get-iam-policy
- https://cloud.google.com/sdk/gcloud/reference/organizations/get-iam-policy
- https://cloud.google.com/resource-manager/docs/organization-policy/restricting-domains
- https://cloud.google.com/resource-manager/docs/organization-policy/org-policy-constraints