Description
In order to prevent unnecessary project ownership assignments to users/service-accounts and further misuses of projects and resources, all roles/Owner
assignments should be monitored.
Members (users/Service-Accounts) with a role assignment to primitive role roles/Owner
are project owners.
The project owner has all the privileges on the project the role belongs to. These are summarized below:
β’ All viewer permissions on all GCP Services within the project
β’ Permissions for actions that modify the state of all GCP services within the project
β’ Manage roles and permissions for a project and all resources within the project
β’ Set up billing for a project
Granting the owner role to a member (user/Service-Account) will allow that member to modify the Identity and Access Management (IAM) policy. Therefore, grant the owner role only if the member has a legitimate purpose to manage the IAM policy. This is because the project IAM policy contains sensitive access control data. Having a minimal set of users allowed to manage IAM policy will simplify any auditing that may be necessary.
Rationaleβ
Project ownership has the highest level of privileges on a project. To avoid misuse of project resources, the project ownership assignment/change actions mentioned above should be monitored and alerted to concerned recipients.
β’ Sending project ownership invites
β’ Acceptance/Rejection of project ownership invite by user
β’ Adding `role\Owner` to a user/service-account
β’ Removing a user/Service account from `role\Owner`
Impactβ
Enabling of logging may result in your project being charged for the additional logs usage.
Auditβ
From Google Cloud Consoleβ
Ensure that the prescribed log metric is present:
-
Go to
Logging/Log-based Metrics
by visiting https://console.cloud.google.com/logs/metrics. -
In the
User-defined Metrics
section, ensure that at least one metric<Log_Metric_Name>
is present with filter text:(protoPayload.serviceName="cloudresourcemanager.googleapis.com")
AND (ProjectOwnership OR projectOwnerInvitee)
OR (protoPayload.serviceData.policyDelta.bindingDeltas.action="REMOVE"
AND protoPayload.serviceData.policyDelta.bindingDeltas.role="roles/owner")
OR (protoPayload.serviceData.policyDelta.bindingDeltas.action="ADD"
AND protoPayload.serviceData.policyDelta.bindingDeltas.role="roles/owner")
Ensure that the prescribed Alerting Policy is present:
- Go to
Alerting
by visiting https://console.cloud.google.com/monitoring/alerting. - Under the
Policies
section, ensure that at least one alert policy exists for the log metric above. Clicking on the policy should show that it is configured with a condition. For example,Violates when: Any logging.googleapis.com/user/<Log Metric Name> stream is above a threshold of zero(0) for greater than zero(0) seconds
means that the alert will trigger for any new owner change. Verify that the chosen alerting thresholds make sense for your organization. - Ensure that the appropriate notifications channels have been set up.
From Google Cloud CLIβ
Ensure that the prescribed log metric is present:
-
List the log metrics:
gcloud logging metrics list --format json
-
Ensure that the output contains at least one metric with filter set to:
(protoPayload.serviceName="cloudresourcemanager.googleapis.com")
AND (ProjectOwnership OR projectOwnerInvitee)
OR (protoPayload.serviceData.policyDelta.bindingDeltas.action="REMOVE"
AND protoPayload.serviceData.policyDelta.bindingDeltas.role="roles/owner")
OR (protoPayload.serviceData.policyDelta.bindingDeltas.action="ADD"
AND protoPayload.serviceData.policyDelta.bindingDeltas.role="roles/owner") -
Note the value of the property
metricDescriptor.type
for the identified metric, in the formatlogging.googleapis.com/user/<Log Metric Name>
.
Ensure that the prescribed alerting policy is present:
-
List the alerting policies:
gcloud alpha monitoring policies list --format json
-
Ensure that the output contains an least one alert policy where:
β’
conditions.conditionThreshold.filter
is set tometric.type=\"logging.googleapis.com/user/<Log Metric Name>\"
β’ AND
enabled
is set totrue
Referencesβ
- https://cloud.google.com/logging/docs/logs-based-metrics/
- https://cloud.google.com/monitoring/custom-metrics/
- https://cloud.google.com/monitoring/alerts/
- https://cloud.google.com/logging/docs/reference/tools/gcloud-logging
Additional Informationβ
- Project ownership assignments for a user cannot be done using the gcloud utility as assigning project ownership to a user requires sending, and the user accepting, an invitation.
- Project Ownership assignment to a service account does not send any invites. SetIAMPolicy to role/owneris directly performed on service accounts.