๐ก๏ธ Google IAM Roles related to KMS are not assigned to separate users๐ข
- Contextual name: ๐ก๏ธ Roles related to KMS are not assigned to separate users๐ข
- ID:
/ce/ca/google/iam/kms-related-roles-to-users
- Tags:
- ๐ข Policy with categories
- ๐ข Policy with type
- ๐ข Production policy
- Policy Type:
COMPLIANCE_POLICY
- Policy Categories:
SECURITY
Logicโ
- ๐ง prod.logic.yaml๐ข
Similar Policiesโ
- Cloud Conformity: Enforce Separation of Duties for KMS-Related Roles
Descriptionโ
Descriptionโ
It is recommended that the principle of 'Separation of Duties' is enforced while assigning KMS related roles to users.
Rationaleโ
The built-in/predefined IAM role
Cloud KMS Admin
allows the user/identity to create, delete, and manage service account(s). The built-in/predefined IAM roleCloud KMS CryptoKey Encrypter/Decrypter
allows the user/identity (with adequate privileges on concerned resources) to encrypt and decrypt data at rest using an encryption key(s).The built-in/predefined IAM role
Cloud KMS CryptoKey Encrypter
allows the user/identity (with adequate privileges on concerned resources) to encrypt data at rest using an encryption key(s). The built-in/predefined IAM roleCloud KMS CryptoKey Decrypter
allows the user/identity (with adequate privileges on concerned resources) to decrypt data at rest using an encryption key(s).Separation of duties is the concept of ensuring that one individual does not have all necessary permissions to be able to complete a malicious action. In Cloud KMS, this could be an action such as using a key to access and decrypt data a user should not normally have access to. Separation of duties is a business control typically used in larger organizations, meant to help avoid security or privacy incidents and errors. It is considered best practice.
... see more
Remediationโ
Remediationโ
From Google Cloud Consoleโ
- Go to
IAM & Admin/IAM
using https://console.cloud.google.com/iam-admin/iam- For any member having
Cloud KMS Admin
and any of theCloud KMS CryptoKey Encrypter/Decrypter
,Cloud KMS CryptoKey Encrypter
,Cloud KMS CryptoKey Decrypter
roles granted/assigned, click theDelete Bin
icon to remove the role from the member.Note: Removing a role should be done based on the business requirement.
policy.yamlโ
Linked Framework Sectionsโ
Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
---|---|---|---|---|---|
๐ผ CIS GCP v1.2.0 โ ๐ผ 1.11 Ensure that Separation of duties is enforced while assigning KMS related roles to users - Level 2 (Automated) | 1 | no data | |||
๐ผ CIS GCP v1.3.0 โ ๐ผ 1.11 Ensure That Separation of Duties Is Enforced While Assigning KMS Related Roles to Users - Level 2 (Automated) | 1 | no data | |||
๐ผ CIS GCP v2.0.0 โ ๐ผ 1.11 Ensure That Separation of Duties Is Enforced While Assigning KMS Related Roles to Users - Level 2 (Automated) | 1 | no data | |||
๐ผ CIS GCP v3.0.0 โ ๐ผ 1.11 Ensure That Separation of Duties Is Enforced While Assigning KMS Related Roles to Users - Level 2 (Automated) | 1 | no data | |||
๐ผ Cloudaware Framework โ ๐ผ Role-Based Access Control (RBAC) Management | 13 | no data |