๐ก๏ธ Google Resource Manager Organization has a Redis IAM role assigned๐ข
- Contextual name: ๐ก๏ธ Organization has a Redis IAM role assigned๐ข
- ID:
/ce/ca/google/iam/organization-assigned-redis-role - Tags:
- ๐ข Policy with categories
- ๐ข Policy with type
- ๐ข Production policy
- Policy Type:
COMPLIANCE_POLICY - Policy Categories:
SECURITY
Logicโ
- ๐ง prod.logic.yaml๐ข
Descriptionโ
Descriptionโ
This policy identifies Google Resource Manager Organizations with any of the predefined Redis IAM roles (
roles/redis.admin,roles/redis.editor,roles/redis.viewer) assigned to any principal (user, group, or service account).Rationaleโ
Assigning Redis roles at the organization level grants permissions across all projects within the organization, including projects that do not use Redis. Broad permissions increase the attack surface and the risk of accidental or malicious configuration changes to Redis instances in any project. Roles should be scoped to the specific projects where Redis instances are deployed and require management. Compromise of a principal with organization-level permissions could impact all Redis resources within the organization.
Impactโ
Requires careful planning to ensure the user retains the necessary permissions to perform their job functions without interruption.
Auditโ
This policy flags a Google Resource Manager Organization as
INCOMPLIANTif its related Google IAM Policy BindingIAM Role Nameis set to roles/redis.admin, roles/redis.editor, or roles/redis.viewer.
Remediationโ
Remediationโ
From Google Cloud Consoleโ
- Navigate to IAM & Admin - IAM: https://console.cloud.google.com/iam-admin/iam
- Identify any principals (users, groups, or service accounts) assigned the Redis roles (roles/redis.admin, roles/redis.editor, roles/redis.viewer) at the organization level.
- Click the Delete Bin icon to remove the role from the principal.
- Assign Redis roles scoped only to the projects where Redis instances exist and management is required.
Note: Changes should be guided by business requirements to ensure principals retain necessary permissions.
From gcloud CLIโ
Remove the organization-level Redis role from the principal:
gcloud organizations remove-iam-policy-binding {{organization-id}} \
--member="{{principal-type}}:{{principal-email}}" \
--role="{{roles/redis.admin}}"Assign a project-scoped Redis role appropriate for the principalโs responsibilities:
gcloud projects add-iam-policy-binding {{project-id}} \... see more