Ensure that IAM roles with administrative permissions are not assigned to IAM identities (users, groups, and service accounts) working with Google Cloud Eventarc resources. This helps enforce the Principle of Least Privilege (POLP) by granting members (principals) only the minimum access necessary to complete their tasks.
One of the most prevalent security vulnerabilities in Google Cloud is misconfigured access permissions. To minimize security risks, avoid assigning IAM roles with admin privileges to IAM members (principals) on a regular basis. IAM members with administrator roles (Owner, Editor, Eventarc Developer, or roles containing Admin or admin in their name) can create, modify, or delete Google Cloud Eventarc resources. To adhere to the Principle of Least Privilege (POLP), assign IAM members only the minimal permissions required for their tasks and remove any overly permissive administrator roles.
Audit
To determine whether the IAM identities working with Eventarc resources are using roles with administrative permissions, perform the following operations:
Remediation / Resolution
To ensure that IAM roles with administrative permissions are not used for Google Cloud Eventarc resources, perform the following operations:
References
- Google Cloud Platform (GCP) Documentation
- Access control with IAM
- IAM basic and predefined roles reference
- Manage access to projects, folders, and organizations
- GCP Command Line Interface (CLI) Documentation
- gcloud projects list
- gcloud projects get-iam-policy
- gcloud projects remove-iam-policy-binding
- gcloud projects add-iam-policy-binding