turbot/gcp_compliance
Loading controls...

Control: 1.1 Ensure that corporate login credentials are used

Description

Use corporate login credentials instead of personal accounts, such as Gmail accounts.

It is recommended fully-managed corporate Google accounts be used for increased visibility, auditing, and controlling access to Cloud Platform resources. Email accounts based outside of the user's organization, such as personal accounts, should not be used for business purposes.

Remediation

To find if the GCP project is associated with the corporate organization domain:

  1. List the accounts that have been granted access to that project
    gcloud projects get-iam-policy PROJECT_ID
  2. Also list the accounts added on each folder
    gcloud resource-manager folders get-iam-policy FOLDER_ID
  3. And list your organization's IAM policy
    gcloud organizations get-iam-policy ORGANIZATION_ID

Note No email accounts outside the organization domain should be granted permissions in the IAM policies.

Follow the documentation and setup corporate login accounts.

To ensure that no email addresses outside the organization can be granted IAM permissions to its Google Cloud projects, folders or organization, turn on the Organization Policy for Domain Restricted Sharing. Learn more at

Usage

Run the control in your terminal:

powerpipe control run gcp_compliance.control.cis_v120_1_1

Snapshot and share results via Turbot Pipes:

powerpipe login
powerpipe control run gcp_compliance.control.cis_v120_1_1 --share

SQL

This control uses a named query:

iam_user_uses_corporate_login_credentials

Tags