Skip to main content

πŸ›‘οΈ Google Project has API Keys🟒

  • Contextual name: πŸ›‘οΈ Google Project has API Keys🟒
  • ID: /ce/ca/google/project/api-keys-for-active-services
  • Tags:
  • Policy Type: COMPLIANCE_POLICY
  • Policy Categories: SECURITY

Logic​

Similar Policies​

Description​

Open File

Description​

API keys should only be used for services when other authentication methods are unavailable. Unused keys with their permissions intact may still exist within a project. Keys are insecure because they can be viewed publicly, such as from within a browser, or accessed on a device where the key resides. It is recommended to use the standard authentication flow instead.

Rationale​

To avoid the security risk of using API keys, it is recommended to use the standard authentication flow instead. Security risks involved in using API keys include:

  • API keys are simple encrypted strings
  • API keys do not identify the user or the application making the API request
  • API keys are typically accessible to clients, making it easy to discover and steal an API key

Impact​

Deleting an API key will break dependent applications (if any).

Audit​

From Console​
  1. From within the project you want to audit, go to APIs & Services\Credentials.
  2. In the section API Keys, no API key should be listed.
From Google Cloud CLI​

... see more

Remediation​

Open File

Remediation​

From Google Cloud Console​

  1. Go to APIs & Services\Credentials.
  2. In the API Keys section, delete API keys by clicking the Delete icon in front of each API Key Name.

From Google Cloud CLI​

  1. Run the following from within the project you want to audit:

    gcloud services api-keys list \
    --filter={{filter}}
  2. Pipe the results into:

    gcloud alpha services api-keys delete {{api-key-id}}

policy.yaml​

Open File

Linked Framework Sections​

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
πŸ’Ό CIS GCP v2.0.0 β†’ πŸ’Ό 1.12 Ensure API Keys Only Exist for Active Services - Level 2 (Automated)1no data
πŸ’Ό CIS GCP v3.0.0 β†’ πŸ’Ό 1.12 Ensure API Keys Only Exist for Active Services - Level 2 (Automated)1no data
πŸ’Ό Cloudaware Framework β†’ πŸ’Ό Credential Lifecycle Management28no data
πŸ’Ό FedRAMP High Security Controls β†’ πŸ’Ό PL-8 Security and Privacy Architectures (L)(M)(H)3no data
πŸ’Ό FedRAMP High Security Controls β†’ πŸ’Ό SA-8 Security and Privacy Engineering Principles (L)(M)(H)6no data
πŸ’Ό FedRAMP Low Security Controls β†’ πŸ’Ό PL-8 Security and Privacy Architectures (L)(M)(H)3no data
πŸ’Ό FedRAMP Low Security Controls β†’ πŸ’Ό SA-8 Security and Privacy Engineering Principles (L)(M)(H)6no data
πŸ’Ό FedRAMP Moderate Security Controls β†’ πŸ’Ό PL-8 Security and Privacy Architectures (L)(M)(H)3no data
πŸ’Ό FedRAMP Moderate Security Controls β†’ πŸ’Ό SA-8 Security and Privacy Engineering Principles (L)(M)(H)6no data
πŸ’Ό ISO/IEC 27001:2022 β†’ πŸ’Ό 8.27 Secure system architecture and engineering principles14no data
πŸ’Ό NIST CSF v1.1 β†’ πŸ’Ό PR.IP-2: A System Development Life Cycle to manage systems is implemented69no data
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό ID.AM-03: Representations of the organization's authorized network communication and internal and external network data flows are maintained89no data
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό ID.AM-08: Systems, hardware, software, services, and data are managed throughout their life cycles27no data
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό ID.IM-01: Improvements are identified from evaluations45no data
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό ID.IM-02: Improvements are identified from security tests and exercises, including those done in coordination with suppliers and relevant third parties59no data
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό ID.IM-03: Improvements are identified from execution of operational processes, procedures, and activities60no data
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό PR.DS-10: The confidentiality, integrity, and availability of data-in-use are protected184no data
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό PR.IR-03: Mechanisms are implemented to achieve resilience requirements in normal and adverse situations21no data
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό PL-8 Security and Privacy Architectures23no data
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό SA-8 Security and Privacy Engineering Principles338no data
πŸ’Ό PCI DSS v3.2.1 β†’ πŸ’Ό 2.1 Always change vendor-supplied defaults and remove or disable unnecessary default accounts before installing a system on the network.111no data
πŸ’Ό PCI DSS v3.2.1 β†’ πŸ’Ό 6.3 Develop internal and external software applications securely.24no data
πŸ’Ό PCI DSS v4.0.1 β†’ πŸ’Ό 2.2.2 Vendor default accounts are managed.11no data
πŸ’Ό PCI DSS v4.0.1 β†’ πŸ’Ό 6.2.1 Bespoke and custom software are developed securely.3no data
πŸ’Ό PCI DSS v4.0 β†’ πŸ’Ό 2.2.2 Vendor default accounts are managed.11no data
πŸ’Ό PCI DSS v4.0 β†’ πŸ’Ό 6.2.1 Bespoke and custom software are developed securely.3no data