Identify any publicly accessible Artifact Registry repositories within your Google Cloud Platform (GCP) account and update their IAM policy in order to protect against unauthorized access. To deny access from anonymous and public users, remove the bindings for allUsers and allAuthenticatedUsers members from the IAM policy associated with your repository. allUsers is a special member identifier that represents any user on the Internet, including authenticated and unauthenticated users, while the allAuthenticatedUsers is an identifier that represents any user or service account that can sign in to Google Cloud Platform (GCP) with a Google account.
This rule resolution is part of the Conformity Security & Compliance tool for GCP.
Misconfigured access permissions are a common security vulnerability that involves Google Cloud resources. Artifact Registry lets you store code and dependencies for your cloud applications. However, it's vital to secure access if your repositories contain sensitive information like passwords, personal details (such as PII), or confidential data. To prevent sensitive data leaks and data loss, ensure that anonymous and/or public access to your Artifact Registry repositories is not allowed.
Audit
To determine if there are any publicly accessible Artifact Registry repositories available in your GCP account, perform the following operations:
Remediation / Resolution
To remove the allUsers and/or allAuthenticatedUsers IAM member bindings from the IAM policy associated with your Artifact Registry repository in order to protect against unauthorized access, perform the following operations:
References
- Google Cloud Platform (GCP) Documentation
- Repository overview
- View and list repositories
- Update repository settings