Policy: GCP > CIS v2.0 > 1 - Identity and Access Management > 1.06 - Ensure That IAM Users Are Not Assigned the Service Account User or Service Account Token Creator Roles at Project Level
Configures auditing against a CIS Benchmark item.
Level: 1
It is recommended to assign the Service Account User (iam.serviceAccountUser)
and Service Account Token Creator (iam.serviceAccountTokenCreator)
roles to a user for a specific service account rather than assigning the role to a user at project level.
Resource Types
This policy targets the following resource types:
Primary Policy
This policy is used with the following primary policy:
Controls
- GCP > CIS v2.0
- GCP > CIS v2.0 > 1 - Identity and Access Management > 1.06 - Ensure That IAM Users Are Not Assigned the Service Account User or Service Account Token Creator Roles at Project Level
- GCP > CIS v2.0 > 1 - Identity and Access Management
Policy Specification
Schema Type |
|
---|---|
Default |
|
Valid Values [YAML] |
|
Category
In Your Workspace
Developers
- tmod:@turbot/cis#/control/categories/v071406
- tmod:@turbot/gcp-cisv2-0#/policy/types/r0106
- turbot graphql policy-type --id "tmod:@turbot/gcp-cisv2-0#/policy/types/r0106"
- turbot graphql policy-settings --filter "policyTypeId:tmod:@turbot/gcp-cisv2-0#/policy/types/r0106"
Get Policy TypeGet Policy Settings
Category URI
Policy Type URI
GraphQL
CLI