GCP-IAM-Users-have-overly-permissive-service-account-privileges
Severity: Medium
Description: This control identifies IAM users which have overly permissive service account privileges. Any user should not have Service Account Admin and Service Account User, both roles assigned at a time. Built-in/Predefined IAM role Service Account admin allows the user to create, delete, manage service accounts. Built-in/Predefined IAM role Service Account User allows the user to assign service accounts to Apps/Compute Instances.
Remediation Steps:
Perform following steps to correct the IAM user privileges :
Login to GCP Portal.
In the left panel, Go to IAM & Admin.
Select IAM.
From the list of users, choose the reported IAM user.
Click on Edit permissions pencil icon.
For member having 'Service Account admin' and 'Service Account User' roles granted/assigned, Click on the Delete Bin icon to remove the role from a member.
Important:
It is recommended to follow the principle of 'Separation of Duties' ensuring that one individual does not have all the necessary permissions to be able to complete a malicious action or meant to help avoid security or privacy incidents and errors.
Reference:
Â
Blue Hexagon Proprietary