Policy: GCP > CIS v1 > 1 Identity and Access Management
Covers recommendations addressing Identity and Access Management.
Resource Types
This policy targets the following resource types:
Primary Policy
This policy is used with the following primary policy:
Related Policies
- 1.01 Ensure that corporate login credentials are used instead of Gmail accounts (Scored)
- 1.02 Ensure that multi-factor authentication is enabled for all non-service accounts (Not Scored)
- 1.03 Ensure that there are only GCP-managed service account keys for each service account (Scored)
- 1.04 Ensure that ServiceAccount has no Admin privileges (Scored)
- 1.05 Ensure that IAM users are not assigned Service Account User role at project level (Scored)
- 1.06 Ensure user-managed/external keys for service accounts are rotated every 90 days or less (Scored)
- 1.07 Ensure that Separation of duties is enforced while assigning service account related roles to users (Not Scored)
- 1.08 Ensure Encryption keys are rotated within a period of 365 days (Scored)
- 1.09 Ensure that Separation of duties is enforced while assigning KMS related roles to users (Scored)
- 1.10 Ensure API keys are not created for a project (Not Scored)
- 1.11 Ensure API keys are restricted to use by only specified Hosts and Apps (Not Scored)
- 1.12 Ensure API keys are restricted to only APIs that application needs access (Not Scored)
- 1.13 Ensure API keys are rotated every 90 days (Scored)
Controls
Policy Specification
Schema Type |
|
---|---|
Default |
|
Valid Values [YAML] |
|
Examples [YAML] |
|
Category
In Your Workspace
Developers
- tmod:@turbot/cis#/control/categories/cis
- tmod:@turbot/gcp-cisv1#/policy/types/s01
- turbot graphql policy-type --id "tmod:@turbot/gcp-cisv1#/policy/types/s01"
- turbot graphql policy-settings --filter "policyTypeId:tmod:@turbot/gcp-cisv1#/policy/types/s01"
Get Policy TypeGet Policy Settings
Category URI
Policy Type URI
GraphQL
CLI