Identify any publicly accessible Artifact Registry repositories within your Google Cloud account and update their IAM policy in order to protect against unauthorized access. To deny access from anonymous and public users, remove the bindings for "allUsers" and "allAuthenticatedUsers" members from the IAM policy associated with your repository. The "allUsers" is a special member identifier that represents any user on the Internet, including authenticated and unauthenticated users, while the "allAuthenticatedUsers" is an identifier that represents any user or service account that can sign in to Google Cloud Platform (GCP) with a Google account.
Google Cloud Artifact Registry lets you store code and dependencies for your cloud applications. However, it's vital to secure access if your repositories contain sensitive information like passwords, personal details (such as PII), or confidential data. To prevent sensitive data leaks and data loss, ensure that anonymous and/or public access to your Artifact Registry repositories is not allowed.
Audit
To determine if there are any publicly accessible Artifact Registry repositories available in your Google Cloud account, perform the following operations:
Remediation / Resolution
To remove the "allUsers" and/or "allAuthenticatedUsers" IAM member bindings from the associated IAM policy in order to restrict anonymous and/or public access to your Artifact Registry repositories, perform the following operations:
References
- Google Cloud Platform (GCP) Documentation
- Repository overview
- View and list repositories
- Update repository settings
- GCP Command Line Interface (CLI) Documentation
- gcloud projects list
- gcloud artifacts repositories list
- gcloud artifacts repositories get-iam-policy
- gcloud artifacts repositories remove-iam-policy-binding