Skip to main content

🧠 Google IAM Service Account User-Managed Key is not rotated every 90 days - prod.logic.yaml 🟒

Flags​

Input Type​

TypeAPI NameExtractsExtract FilesLogic Files
πŸ”’πŸ“• Google IAM Service Account KeyCA10__CaGoogleIamServiceAccountKey__c111

Uses​

Test Results πŸŸ’β€‹

Generated at: 2025-04-24T23:47:02.897675359Z Open

ResultIdCondition IndexCondition TextRuntime Error
🟒aA1βœ”οΈ 99βœ”οΈ isDisappeared(CA10__disappearanceTime__c)βœ”οΈ null
🟒aA2βœ”οΈ 199βœ”οΈ extract('CA10__validAfter__c').beyondLastDays(90)βœ”οΈ null
🟒aA3βœ”οΈ 200βœ”οΈ otherwiseβœ”οΈ null

Generation​

FileMD5
Open/ce/ca/google/iam/service-account-key-rotation/policy.yaml96D671B53702B9437225A4BF207FE3FC
Open/ce/ca/google/iam/service-account-key-rotation/prod.logic.yaml843E06AB8218228A631A2F2719D80626
Open/ce/ca/google/iam/service-account-key-rotation/test-data.jsonD2DD12B93957E57AE7B94231F0BC103F
Open/types/CA10__CaGoogleIamServiceAccountKey__c/object.extracts.yaml77CA840C297D7AA897F12C624C90A9A4

Generate FULL script​

java -jar repo-manager.jar policies generate FULL /ce/ca/google/iam/service-account-key-rotation/prod.logic.yaml

Generate DEBUG script​

java -jar repo-manager.jar policies generate DEBUG /ce/ca/google/iam/service-account-key-rotation/prod.logic.yaml

Generate CAPTURE_TEST_DATA script​

java -jar repo-manager.jar policies generate CAPTURE_TEST_DATA /ce/ca/google/iam/service-account-key-rotation/prod.logic.yaml

Generate TESTS script​

java -jar repo-manager.jar policies generate TESTS /ce/ca/google/iam/service-account-key-rotation/prod.logic.yaml

Execute tests​

java -jar repo-manager.jar policies test /ce/ca/google/iam/service-account-key-rotation/prod.logic.yaml

Content​

Open File

---
inputType: "CA10__CaGoogleIamServiceAccountKey__c"
testData:
- file: test-data.json
importExtracts:
- file: /types/CA10__CaGoogleIamServiceAccountKey__c/object.extracts.yaml
conditions:
- status: "INCOMPLIANT"
currentStateMessage: "Service Account key is older than 90 days."
remediationMessage: "It's recommended to rotate Service Account key."
check:
IS_BEYOND_LAST_DAYS:
offsetDays: 90
arg:
EXTRACT: CA10__validAfter__c
otherwise:
status: "COMPLIANT"
currentStateMessage: "Service Account key is regularly rotated."