Control: GCP > CIS v1 > 1 Identity and Access Management
Covers recommendations addressing Identity and Access Management.
Primary Policies
The following policies can be used to configure this control:
- 1 Identity and Access Management > 1.01 Ensure that corporate login credentials are used instead of Gmail accounts (Scored)
- 1 Identity and Access Management > 1.02 Ensure that multi-factor authentication is enabled for all non-service accounts (Not Scored)
- 1 Identity and Access Management > 1.02 Ensure that multi-factor authentication is enabled for all non-service accounts (Not Scored) > Attestation
- 1 Identity and Access Management > 1.03 Ensure that there are only GCP-managed service account keys for each service account (Scored)
- 1 Identity and Access Management > 1.03 Ensure that there are only GCP-managed service account keys for each service account (Scored) > Attestation
- 1 Identity and Access Management > 1.04 Ensure that ServiceAccount has no Admin privileges (Scored)
- 1 Identity and Access Management > 1.05 Ensure that IAM users are not assigned Service Account User role at project level (Scored)
- 1 Identity and Access Management > 1.06 Ensure user-managed/external keys for service accounts are rotated every 90 days or less (Scored)
- 1 Identity and Access Management > 1.07 Ensure that Separation of duties is enforced while assigning service account related roles to users (Not Scored)
- 1 Identity and Access Management > 1.08 Ensure Encryption keys are rotated within a period of 365 days (Scored)
- 1 Identity and Access Management > 1.09 Ensure that Separation of duties is enforced while assigning KMS related roles to users (Scored)
- 1 Identity and Access Management > 1.10 Ensure API keys are not created for a project (Not Scored)
- 1 Identity and Access Management > 1.10 Ensure API keys are not created for a project (Not Scored) > Attestation
- 1 Identity and Access Management > 1.11 Ensure API keys are restricted to use by only specified Hosts and Apps (Not Scored)
- 1 Identity and Access Management > 1.11 Ensure API keys are restricted to use by only specified Hosts and Apps (Not Scored) > Attestation
- 1 Identity and Access Management > 1.12 Ensure API keys are restricted to only APIs that application needs access (Not Scored)
- 1 Identity and Access Management > 1.12 Ensure API keys are restricted to only APIs that application needs access (Not Scored) > Attestation
- 1 Identity and Access Management > 1.13 Ensure API keys are rotated every 90 days (Scored)
- 1 Identity and Access Management > 1.13 Ensure API keys are rotated every 90 days (Scored) > Attestation
- 1 Identity and Access Management
Category
In Your Workspace
Developers
- tmod:@turbot/gcp-cisv1#/control/types/s01
- tmod:@turbot/cis#/control/categories/cis
- turbot graphql controls --filter "controlTypeId:tmod:@turbot/gcp-cisv1#/control/types/s01"
Get Controls
Control Type URI
Category URI
GraphQL
CLI