Ensure that corporate login credentials are used to access Google Cloud Platform (GCP) resources in order to follow cloud security best practices. In this way, all members within your organization can access Google Cloud services and resources using their corporate accounts, and your administrators can see and control these accounts through Google Admin console. The appropriate credentials required must be fully managed Google accounts tied to your corporate domain name through the Cloud Identity service. Cloud Identity is a stand-alone Identity-as-a-Service (IDaaS) service that provides GCP users access to many of the identity management capabilities provided by G Suite - a set of secure, cloud-native collaboration and productivity applications powered by Google. Signing up for Cloud Identity service provides a management layer over the Google accounts that are associated with your corporate (organization) domain name. Through the Cloud Identity management layer, you can enable or disable access to various Google solutions, including Google Cloud Platform (GCP), for your organization members. Signing up for Cloud Identity also creates an organization node for your domain, which helps map corporate structure and controls to your GCP resources via Google Cloud resource hierarchy.
This rule resolution is part of the Conformity Security & Compliance tool for GCP.
Use only fully-managed corporate login credentials to access your Google Cloud Platform (GCP) resources for increased visibility, auditing, and secure access management. Personal accounts, available outside the organization's domain, such as Gmail accounts, should not be used for business purposes.
Audit
To determine the type of login credentials used to access your GCP resources and deployments, perform the following actions:
Remediation / Resolution
To create new Google corporate login accounts and ensure that no email addresses outside the organization can be granted IAM permissions to the GCP projects, folders, or the organization itself, perform the following actions:
Step A: To ensure that no email addresses outside your organization can be granted IAM permissions to GCP projects, folders, or organizations, enable Domain Restricted Sharing within the organization policy:
Step B: Create new Google corporate login accounts to be used instead of personal accounts:
Note: Creating Google corporate login accounts using Command Line Interface (CLI) is not currently supported.References
- Google Cloud Platform (GCP) Documentation
- Google Workplace
- Cloud Identity
- Resource hierarchy
- Best practices for enterprise organizations
- Types of Google Accounts
- Organization policy constraints
- Restricting identities by domain
- GCP Command Line Interface (CLI) Documentatio
- gcloud organizations list
- gcloud organizations get-iam-policy
- gcloud projects list
- gcloud projects get-iam-policy
- gcloud alpha resource-manager folders list
- gcloud alpha resource-manager folders get-iam-policy
- gcloud alpha resource-manager org-policies allow
- CIS Security Documentation
- Securing Google Cloud Computing Platform