Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

How to make GCP Rolesets backing Service Accounts short-lived. #138

Open
obautista-clgx opened this issue Mar 11, 2022 · 0 comments
Open

Comments

@obautista-clgx
Copy link

obautista-clgx commented Mar 11, 2022

We are seeing that for each GCP Roleset that is configured, a backing service account is created in the target project, for example: vault-roleset-t-1612985739@org-roleset-test-poc-2d32.iam.gserviceaccount.com.
These backing SAs have all the IAM permissions defined in the GCP Roleset and therefore they are privileged SAs.
This is a show-stopper for us because there are many Terraform/GCP knowledgeable people in the Organization with access to the GCP Service Accounts in the destination project(s) who could very quickly find them, write a Terraform script that impersonates them and do something unauthorized like destroying a Virtual Machine or a bucket.
We understand GCP Rolesets in Vault require these privileged backing Service Accounts.
What would it take to make these backing service accounts short lived? ie. Create them, use them and remove them after being used?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant