GCP IAM & Admin

Overview
Critical
0
High
1
Medium
27
Low
10
Informational
0
Security issues (38)
Severity Non-Compliance Resource Issue Remediation Read more Action
Medium my-schedule Snapshot schedule is configured not to take application-consistent snapshots. To enable capturing pending writes that are in transit from memory to disk, make sure all disk snapshot schedules are application-consistent. More info
Medium CIS 1.1 Service accounts Non-corporate login credentials are in use: prevasio@gmail.com, peter@hotmail.com. To follow cloud security best practices, make sure only corporate login credentials are used to access Google Cloud Platform (GCP) resources. More info
Medium CIS 1.11 Service accounts User account prevasio@gmail.com has KMS admin role and a CryptoKey role at the same time. Ensure that separation of duties is enforced for all service account roles. More info
Low Service accounts User account prevasio@gmail.com uses a primitive role. For critical production environments, limit the use of primitive roles such as Owner, Editor, or Viewer for Cloud IAM members. More info
Low Service accounts Service account 853160546542@cloudservices.gserviceaccount.com uses a primitive role. For critical production environments, limit the use of primitive roles such as Owner, Editor, or Viewer for Cloud IAM members. More info
Medium CIS 1.11 service-853160546542@gcp-sa-firestore.iam.gserviceaccount.com Service account has KMS admin role and a CryptoKey role at the same time. Ensure that separation of duties is enforced for all service account roles. More info
Medium CIS 1.11 service-853160546542@gcp-sa-firestore.iam.gserviceaccount.com User account has both Service Account User and Service Account Admin roles attached. Ensure that separation of duties is enforced for all service account roles. More info
Low CIS 1.6 service-853160546542@gcp-sa-firestore.iam.gserviceaccount.com User account has a Service Account Token Creator role. For best security practices, ensure that no IAM users have Service Account Token Creator role More info
Low service-853160546542@gcp-sa-firestore.iam.gserviceaccount.com User account has a Service Account User role. It is not recommended to have Service Account User role attached to your service accounts, as that role enables access to all service accounts within the project. More info
Low 853160546542-compute@developer.gserviceaccount.com Service account uses a primitive role. For critical production environments, limit the use of primitive roles such as Owner, Editor, or Viewer for Cloud IAM members. More info
Low prevasio@sylvan-surf-339107.iam.gserviceaccount.com Service account uses a primitive role. For critical production environments, limit the use of primitive roles such as Owner, Editor, or Viewer for Cloud IAM members. More info
Low sylvan-surf-339107@appspot.gserviceaccount.com Service account uses a primitive role. For critical production environments, limit the use of primitive roles such as Owner, Editor, or Viewer for Cloud IAM members. More info
Low CIS 1.7 PCI DSS (Networking) HIPAA (Networking) d7cdf0e28512f79b6b5ac175bea7285a266e984b User-managed key has not been rotated in 224 days. Ensure that the user-managed keys associated with your service accounts are rotated every 90 days or less. More info
Medium CIS 1.4 d7cdf0e28512f79b6b5ac175bea7285a266e984b Service account key is not managed and rotated by Google. Check the restrictions to the accessibility of the service account keys, and make sure they are managed and rotated by Google. More info
Low sylvan-surf-339107 Project has no usage export feature enabled. To export detailed reports about the lifetime and usage of your resources to a storage bucket, enable usage export feature for your projects. More info
Medium sylvan-surf-339107 Project contains resources over the 75% limit: 'Snapshots' has 750 of 1000 resources, 'Networks' has 4 of 5 resources, 'URL maps' has 8 of 10 resources. Request an increase of resource quotas via GCP support, to make sure the number of available resources is within the per-account limits. More info
High sylvan-surf-339107 Project contains resources over the 90% limit: 'Static addresses' has 8 of 8 resources, 'Target HTTPS proxies' has 9 of 10 resources, 'Target HTTP proxies' has 10 of 10 resources, 'Firewalls' has 92 of 100 resources, 'In-use addresses' has 8 of 8 resources... Request an increase of resource quotas via GCP support, to make sure the number of available resources is within the per-account limits. More info
Low sylvan-surf-339107 Project has OS login disabled. To fulfill PCI compliance requirements for additional security features and to provide you with centralized and automated SSH key pair management, enable OS Login in project-wide metadata. More info
Medium prevasio.click 'Define Allowed External IPs for VM Instances' constraint is not enforced at the organization level. To minimize your instances' exposure to the Internet, ensure 'Define Allowed External IPs for VM Instances' constraint is enforced to allow you to define the VM instances that are allowed to use external IP addresses. More info
Medium prevasio.click 'Disable Automatic IAM Grants for Default Service Accounts' is not enforced at the organization level. To improve access security, ensure 'Disable Automatic IAM Grants for Default Service Accounts' is enforced. More info
Medium prevasio.click 'Detailed Audit Logging Mode' is not enforced at the organization level. To fulfill compliance requirements such as SEC Rule 17a-4(f), CFTC Rule 1.31(c)-(d), and FINRA Rule 4511(c), ensure 'Detailed Audit Logging Mode' is enforced. More info
Medium prevasio.click 'Disable Automatic IAM Grants for Default Service Accounts' is not enforced at the organization level. To improve access security, ensure 'Disable Automatic IAM Grants for Default Service Accounts' is enforced. More info
Medium prevasio.click 'Disable Guest Attributes of Compute Engine Metadata' is not enforced at the organization level. For security reasons, ensure 'Disable Guest Attributes of Compute Engine Metadata' is enforced. More info
Medium prevasio.click 'Disable Workload Identity Cluster Creation' is not enforced at the organization level. To tightly control service account access in your organization, ensure 'Disable Workload Identity Cluster Creation' is enforced. More info
Medium prevasio.click 'Disable Service Account Key Creation' is not enforced at the organization level. To minimize the risk of mishandling user-managed keys, ensure 'Disable Service Account Key Creation' is enforced. More info
Medium prevasio.click 'Disable Service Account Key Upload' is not enforced at the organization level. To minimize the risk of mishandling user-managed keys, ensure 'Disable Service Account Key Upload' is enforced. More info
Medium prevasio.click 'Disable VM serial port access' is not enforced at the organization level. Due to security and compliance regulations, ensure 'Disable VM serial port access' is enforced. More info
Medium prevasio.click 'Restrict VM IP Forwarding' is not enforced at the organization level. To improve security and achieve regulatory compliance by explicitly defining the resource name of the VM instances allowed to use IP forwarding, ensure 'Restrict VM IP Forwarding' is enforced. More info
Medium prevasio.click 'Resource Location Restriction' is not enforced at the organization level. To achieve regulatory compliance by explicitly defining the locations allowed to deploy Google Cloud resources for your organization, ensure 'Resource Location Restriction' is enforced. More info
Medium prevasio.click 'Require OS Login' is not enforced at the organization level. To have centralized and automated SSH key pair management, ensure 'Require OS Login' is enforced. More info
Medium prevasio.click 'Restrict Authorized Networks on Cloud SQL instances' is not enforced at the organization level. To deny IAM members to add authorized networks in order to provide access to your security-critical SQL database instances, ensure 'Restrict Authorized Networks on Cloud SQL instances' is enforced. More info
Medium prevasio.click 'Restrict Load Balancer Creation for Types' is not enforced at the organization level. To allow only compliant load balancer types to be used to create Google Cloud load balancers for the GCP projects and folders within your organization, ensure 'Restrict Load Balancer Creation for Types' is enforced. More info
Medium prevasio.click 'Restrict Shared VPC Subnetworks' is not enforced at the organization level. To allow only a set of shared VPC subnetworks that eligible Google Cloud resources can use, ensure 'Restrict Shared VPC Subnetworks' is enforced. More info
Medium prevasio.click 'Restrict VPC Peering' is not enforced at the organization level. To allow only a set of VPC networks that are allowed to be peered with the networks created for your project, folder, or organization, ensure 'Restrict VPC Peering' is enforced. More info
Medium prevasio.click 'Restrict VPN Peer IPs' is not enforced at the organization level. To allow only a set of trusted IPv4 addresses can be configured as VPN peer IPs within your Google Cloud organization, ensure 'Restrict VPN Peer IPs' is enforced. More info
Medium prevasio.click 'Skip Default Network Creation' is not enforced at the organization level. To follow security best practices and meet networking requirements, ensure 'Skip Default Network Creation' is enforced. More info
Medium prevasio.click 'Define Trusted Image Project' is not enforced at the organization level. To allow only a set of images from trusted GCP projects to be used for boot disks for new VM instances, ensure 'Define Trusted Image Project' is enforced. More info
Medium prevasio.click 'Enforce uniform bucket-level access' is not enforced at the organization level. To enforce uniform bucket-level access for all Google Cloud Storage buckets available in your organization, ensure 'Enforce uniform bucket-level access' is enforced. More info
Service Accounts (4)
Service account name Email Description OAuth2 client ID Key ID Key created Security issues
App Engine default service accountsylvan-surf-339107@appspot.gserviceaccount.com102219150792705800257 1 Low (details)
Prevasioprevasio@sylvan-surf-339107.iam.gserviceaccount.comPrevasio API Access104257299298134699817d7cdf0e28512f79b6b5ac175bea7285a266e984b 1 Low (details)
Compute Engine default service account853160546542-compute@developer.gserviceaccount.com116154531079879876049 1 Low (details)
Compute Engine Firestore default service accountservice-853160546542@gcp-sa-firestore.iam.gserviceaccount.com216154531079879876049 2 Medium + 2 others (details)
Service Account Keys (6)
Key ID Service account Valid after Valid before Key algorithm Key origin Key type Security issues
4a67217cdba24233d00b2704718ba18af450319esylvan-surf-339107@appspot.gserviceaccount.com 2048-bit RSA keyKey is provided by GoogleSystem-managed key (managed and rotated by Google)
61d65e9acc32b806790132860deed729b050bd5fprevasio@sylvan-surf-339107.iam.gserviceaccount.com 2048-bit RSA keyKey is provided by GoogleSystem-managed key (managed and rotated by Google)
6d3421f20f7280713c8b00aa9c68fc59fb4720f1prevasio@sylvan-surf-339107.iam.gserviceaccount.com 2048-bit RSA keyKey is provided by GoogleSystem-managed key (managed and rotated by Google)
d7cdf0e28512f79b6b5ac175bea7285a266e984bprevasio@sylvan-surf-339107.iam.gserviceaccount.com 2048-bit RSA keyKey is provided by GoogleUser-managed key (managed and rotated by the user) 1 Medium + 1 other (details)
758103ce3c6835ae98838aa9d4e7840bdad351ec853160546542-compute@developer.gserviceaccount.com 2048-bit RSA keyKey is provided by GoogleSystem-managed key (managed and rotated by Google)
e41378a3aa14f1f99a0d64c6d7cf8f0aa8d89c92853160546542-compute@developer.gserviceaccount.com 2048-bit RSA keyKey is provided by GoogleSystem-managed key (managed and rotated by Google)
Resource Policies (2)
Policy name Region Created Status Security issues
schedule-1us-central1 Ready
my-schedulenorthamerica-northeast1 Ready 1 Medium (details)
Projects (1)
Name Status Network tier Default service account Created Security issues
sylvan-surf-339107Unspecified xpn project statusPremium853160546542-compute@developer.gserviceaccount.com 1 High + 3 others (details)
Organization (1)
Name ID Created Status Security issues
608845214082 Active 20 Medium (details)