Skip to main content

๐Ÿ›ก๏ธ Google Resource Manager Organization has a Redis IAM role assigned๐ŸŸข

  • Contextual name: ๐Ÿ›ก๏ธ Organization has a Redis IAM role assigned๐ŸŸข
  • ID: /ce/ca/google/iam/organization-assigned-redis-role
  • Tags:
  • Policy Type: COMPLIANCE_POLICY
  • Policy Categories: SECURITY

Logicโ€‹

Descriptionโ€‹

Open File

Descriptionโ€‹

This policy identifies Google Resource Manager Organizations with any of the predefined Redis IAM roles (roles/redis.admin, roles/redis.editor, roles/redis.viewer) assigned to any principal (user, group, or service account).

Rationaleโ€‹

Assigning Redis roles at the organization level grants permissions across all projects within the organization, including projects that do not use Redis. Broad permissions increase the attack surface and the risk of accidental or malicious configuration changes to Redis instances in any project. Roles should be scoped to the specific projects where Redis instances are deployed and require management. Compromise of a principal with organization-level permissions could impact all Redis resources within the organization.

Impactโ€‹

Requires careful planning to ensure the user retains the necessary permissions to perform their job functions without interruption.

Auditโ€‹

This policy flags a Google Resource Manager Organization as INCOMPLIANT if its related Google IAM Policy Binding IAM Role Name is set to roles/redis.admin, roles/redis.editor, or roles/redis.viewer.

Remediationโ€‹

Open File

Remediationโ€‹

From Google Cloud Consoleโ€‹

  1. Navigate to IAM & Admin - IAM: https://console.cloud.google.com/iam-admin/iam
  2. Identify any principals (users, groups, or service accounts) assigned the Redis roles (roles/redis.admin, roles/redis.editor, roles/redis.viewer) at the organization level.
  3. Click the Delete Bin icon to remove the role from the principal.
  4. Assign Redis roles scoped only to the projects where Redis instances exist and management is required.

Note: Changes should be guided by business requirements to ensure principals retain necessary permissions.

From gcloud CLIโ€‹

  1. Remove the organization-level Redis role from the principal:

    gcloud organizations remove-iam-policy-binding {{organization-id}} \
    --member="{{principal-type}}:{{principal-email}}" \
    --role="{{roles/redis.admin}}"
  2. Assign a project-scoped Redis role appropriate for the principalโ€™s responsibilities:

    gcloud projects add-iam-policy-binding {{project-id}} \

... see more

policy.yamlโ€‹

Open File

Linked Framework Sectionsโ€‹

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
๐Ÿ’ผ Cloudaware Framework โ†’ ๐Ÿ’ผ Role-Based Access Control (RBAC) Management14no data
๐Ÿ’ผ ISO/IEC 27001:2013 โ†’ ๐Ÿ’ผ A.9.2.3 Management of privileged access rights312no data
๐Ÿ’ผ NIST CSF v1.1 โ†’ ๐Ÿ’ผ PR.AC-1: Identities and credentials are issued, managed, verified, revoked, and audited for authorized devices, users and processes1934no data
๐Ÿ’ผ NIST CSF v1.1 โ†’ ๐Ÿ’ผ PR.AC-4: Access permissions and authorizations are managed, incorporating the principles of least privilege and separation of duties1756no data
๐Ÿ’ผ NIST CSF v1.1 โ†’ ๐Ÿ’ผ PR.DS-5: Protections against data leaks are implemented4791no data
๐Ÿ’ผ NIST CSF v2.0 โ†’ ๐Ÿ’ผ PR.AA-01: Identities and credentials for authorized users, services, and hardware are managed by the organization42no data
๐Ÿ’ผ NIST CSF v2.0 โ†’ ๐Ÿ’ผ PR.AA-05: Access permissions, entitlements, and authorizations are defined in a policy, managed, enforced, and reviewed, and incorporate the principles of least privilege and separation of duties116no data
๐Ÿ’ผ NIST CSF v2.0 โ†’ ๐Ÿ’ผ PR.DS-01: The confidentiality, integrity, and availability of data-at-rest are protected148no data
๐Ÿ’ผ NIST CSF v2.0 โ†’ ๐Ÿ’ผ PR.DS-02: The confidentiality, integrity, and availability of data-in-transit are protected125no data
๐Ÿ’ผ NIST CSF v2.0 โ†’ ๐Ÿ’ผ PR.DS-10: The confidentiality, integrity, and availability of data-in-use are protected142no data
๐Ÿ’ผ PCI DSS v3.2.1 โ†’ ๐Ÿ’ผ 7.1.2 Restrict access to privileged user IDs to least privileges necessary to perform job responsibilities.5no data
๐Ÿ’ผ PCI DSS v3.2.1 โ†’ ๐Ÿ’ผ 7.1.3 Assign access based on individual personnel's job classification and function.5no data
๐Ÿ’ผ PCI DSS v4.0.1 โ†’ ๐Ÿ’ผ 7.2.2 Access is assigned to users, including privileged users, based on job classification, function, and least privileges.5no data
๐Ÿ’ผ PCI DSS v4.0 โ†’ ๐Ÿ’ผ 7.2.2 Access is assigned to users, including privileged users, based on job classification, function, and least privileges.5no data