Mods

Control: GCP > IAM > Service Account > Allowed > Custom

Take an action when a GCP IAM service account is not allowed based on custom rules.

The Allowed > Custom control checks if the serviceAccount is allowed based on the Allowed > Custom > * policies. If the serviceAccount is not allowed, this control raises an alarm and takes the defined enforcement action.

For any enforcement actions that specify if new, e.g., Enforce: Delete if not allowed and resource is new, this control will only take the enforcement actions for resources created within the last 60 minutes.

Resource Types

This control targets the following resource types:

Policies

The following policies can be used to configure this control:

This control type relies on these other policies when running actions:

Permissions

Cloud permissions used by this control and its actions:

  • iam.serviceAccounts.delete
  • iam.serviceAccounts.disable

Category

In Your Workspace

Developers