Ensure that Cloud IAM roles with administrative permissions are not assigned to IAM identities managing Google Cloud Tasks queues. This helps enforce the Principle of Least Privilege (POLP) by granting members (principals) only the minimum access necessary to complete their tasks.
One of the most prevalent security vulnerabilities in Google Cloud is misconfigured access permissions. To minimize security risks, avoid assigning IAM roles with admin privileges to IAM members (principals) on a regular basis. IAM members with administrator roles (Owner, Editor or roles containing Admin or admin in their name) can create, modify, or delete Cloud Tasks queues. To adhere to the Principle of Least Privilege (POLP), assign IAM members only the minimal permissions required for their tasks and remove any overly permissive administrator roles.
Audit
To determine if your Google Cloud Tasks queues are configured with admin permissions, perform the following operations:
Remediation / Resolution
To ensure that your Google Cloud Tasks queues are not configured with admin permissions, perform the following operations:
References
- Google Cloud Platform (GCP) Documentation
- Understand Cloud Tasks
- Control access using IAM
- GCP Command Line Interface (CLI) Documentation
- gcloud projects list
- gcloud tasks queues list
- gcloud tasks queues get-iam-policy
- gcloud tasks queues remove-iam-policy-binding
- gcloud tasks queues add-iam-policy-binding