Ensure that IAM roles with administrative permissions are not assigned to IAM identities (users, groups, and service accounts) managing Secret Manager secrets. This helps enforce the Principle of Least Privilege (POLP) by granting members (principals) only the minimum access necessary to complete their tasks.
This rule resolution is part of the Conformity Security & Compliance tool for GCP.
One of the most prevalent security vulnerabilities in Google Cloud is misconfigured access permissions. To minimize security risks, avoid assigning IAM roles with admin privileges to IAM members (principals) on a regular basis. IAM members with administrator roles (Owner, Editor, or Secret Manager Admin role) can create, update, and delete Secret Manager resources. To adhere to the Principle of Least Privilege (POLP), assign IAM members only the minimal permissions required for their tasks and remove any overly permissive administrator roles.
Audit
To determine whether the IAM identities managing Secret Manager secrets are using roles with administrative permissions, perform the following operations:
Remediation / Resolution
To ensure that IAM roles with administrative permissions are not used for Secret Manager secrets management, perform the following operations:
References
- Google Cloud Platform (GCP) Documentation
- Manage access to secrets
- Secret Manager roles and permissions
- IAM roles and permissions index
- Roles and permissions
- Understanding allow policies
- Using resource hierarchy for access control
- GCP Command Line Interface (CLI) Documentation
- gcloud projects list
- gcloud secrets list
- gcloud secrets get-iam-policy
- gcloud secrets remove-iam-policy-binding
- gcloud secrets add-iam-policy-binding