Turbot Guardrails Hub 
Hub
  • Mods
  • Policy Packs
  • Docs
  • Home
ModsPolicy PacksDocsHome
Mods
GCP
Loading controls...

Control: GCP > CIS v1 > 1 Identity and Access Management > 1.11 Ensure API keys are restricted to use by only specified Hosts and Apps (Not Scored)

Configures auditing against a CIS Benchmark item.

Level: 1 (Not Scored)

Unrestricted keys are insecure because they can be viewed publicly, such as from within a browser, or they can be accessed on a device where the key resides. It is recommended to restrict API key usage only from trusted hosts, HTTP referrers and apps.

Resource Types

This control targets the following resource types:

  • GCP > Project

Policies

This control type relies on these other policies when running actions:

  • GCP > CIS v1 > Maximum Attestation Duration
  • GCP > CIS v1
  • GCP > CIS v1 > 1 Identity and Access Management > 1.11 Ensure API keys are restricted to use by only specified Hosts and Apps (Not Scored)
  • GCP > CIS v1 > 1 Identity and Access Management > 1.11 Ensure API keys are restricted to use by only specified Hosts and Apps (Not Scored) > Attestation

Category

  • CIS > Controls v7 > 16 Account Monitoring and Control

In Your Workspace

  • Controls by Resource report
  • Controls by Control Type report

Developers

    Control Type URI
    • tmod:@turbot/gcp-cisv1#/control/types/r0111
  • Category URI
    • tmod:@turbot/cis#/control/categories/v0716
  • GraphQL
    • query controlType(id: "tmod:@turbot/gcp-cisv1#/control/types/r0111") { … }
    • query controls(filter: "controlTypeId:'tmod:@turbot/gcp-cisv1#/control/types/r0111'") { … }
  • CLI
    • Get Controls
    • turbot graphql controls --filter "controlTypeId:tmod:@turbot/gcp-cisv1#/control/types/r0111"
Guardrails
Guardrails Hub
  • Hub
  • Docs
  • Blog
  • Changelog
Products
  • GuardrailsGuardrails
  • PipesPipes
  • SteampipeSteampipe
  • PowerpipePowerpipe
  • FlowpipeFlowpipe
  • TailpipeTailpipe
Turbot
  • Home
  • About us
  • We're hiring!
  • Contact us
Community

Our community of practitioners love to discuss cloud governance & security.

Slack logoJoin us on Slack →

System StatusLegalSecurity
Terms of UseSecurityPrivacy
39
Mods
130
Resource Types
2,226
Policies
1,100
Controls
35
Quick Actions
83
IAM