<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>google cloud platform Archives - Big Data Processing</title>
	<atom:link href="https://bigdataproc.com/tag/google-cloud-platform/feed/" rel="self" type="application/rss+xml" />
	<link>https://bigdataproc.com/tag/google-cloud-platform/</link>
	<description>Big Data Solution for GCP, AWS, Azure and on-prem</description>
	<lastBuildDate>Fri, 05 Apr 2024 12:56:03 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>GCP Security &#8211; Finding Zero Trust Policy issues using IAM policy Recommander</title>
		<link>https://bigdataproc.com/gcp-security-finding-zero-trust-policy-issues-using-iam-policy-recommander/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=gcp-security-finding-zero-trust-policy-issues-using-iam-policy-recommander</link>
					<comments>https://bigdataproc.com/gcp-security-finding-zero-trust-policy-issues-using-iam-policy-recommander/#respond</comments>
		
		<dc:creator><![CDATA[Gaurang]]></dc:creator>
		<pubDate>Fri, 05 Apr 2024 12:56:02 +0000</pubDate>
				<category><![CDATA[GCP]]></category>
		<category><![CDATA[gcp]]></category>
		<category><![CDATA[google cloud platform]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://bigdataproc.com/?p=486</guid>

					<description><![CDATA[<p>In GCP (Google cloud platform) fix you zero trust policy issue with GCP's IAM recommander.  IAM recommander will help you identify users or service account with the permission they are not using anymore. </p>
<div class="more-link-wrapper"><a class="more-link" href="https://bigdataproc.com/gcp-security-finding-zero-trust-policy-issues-using-iam-policy-recommander/">Continue reading<span class="screen-reader-text">GCP Security &#8211; Finding Zero Trust Policy issues using IAM policy Recommander</span></a></div>
<p>The post <a href="https://bigdataproc.com/gcp-security-finding-zero-trust-policy-issues-using-iam-policy-recommander/">GCP Security &#8211; Finding Zero Trust Policy issues using IAM policy Recommander</a> appeared first on <a href="https://bigdataproc.com">Big Data Processing </a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>In our previous blog posts, we explored leveraging Google Recommender for cost optimization. Now, let&#8217;s dive into identifying security issues within your Google Cloud Platform (GCP) environment using Google Recommender. If you missed the previous <a href="https://bigdataproc.com/unlocking-gcp-cost-optimization-using-recommendation-and-bigquery-a-finsops-guide/">post</a> on redirecting recommendations to BigQuery, I highly recommend giving it a read, as it lays out the groundwork for our current discussion.</p>



<p>Adhering to the principles of a zero trust policy, it&#8217;s crucial to ensure that individuals or service accounts only possess the permissions they truly require. Google Recommender plays a pivotal role in this aspect. By examining policy insights, if it&#8217;s flagged that a principal holds unnecessary permissions within their role, the IAM Recommender steps in to evaluate whether these permissions can be revoked or if there&#8217;s a more suitable role available. If revocation is possible, the IAM Recommender generates a recommendation to revoke the role. Alternatively, if there&#8217;s a better-suited role, it suggests replacing the existing one with the suggested role. This replacement could entail a new custom role, an existing custom role, or predefined roles.</p>



<p>If you&#8217;ve already redirected all recommendations to BigQuery, you can run the following query to gain insights into any surplus permissions held by individuals or service accounts. Furthermore, it will provide recommendations regarding roles that may need to be removed or replaced with more stringent alternatives.</p>



<h2 class="wp-block-heading">SQL to find GCP IAM recommendation </h2>



<pre class="EnlighterJSRAW" data-enlighter-language="sql" data-enlighter-theme="" data-enlighter-highlight="" data-enlighter-linenumbers="" data-enlighter-lineoffset="" data-enlighter-title="" data-enlighter-group="">SELECT
  cloud_entity_type,
  cloud_entity_id,
  recommendation_details,
  recommender_subtype,
  JSON_VALUE(recommendation_details, "$.overview.member") AS user,
  JSON_VALUE(recommendation_details, "$.overview.removedRole") AS existing_role,
  JSON_QUERY_ARRAY(recommendation_details, "$.overview.addedRoles") AS new_role,
  priority,
  JSON_VALUE(recommendation_details, "$.overview.minimumObservationPeriodInDays") AS minimumObservationPeriodInDays
FROM
  your_project.recommendations.recommendations_export`
WHERE
  recommender = "google.iam.policy.Recommender"
  AND state = "ACTIVE"
  AND TIMESTAMP_TRUNC(_PARTITIONTIME, DAY) = (
    SELECT
      TIMESTAMP_TRUNC(MAX(_PARTITIONTIME), DAY)
    FROM
      your_project.recommendations.recommendations_export
  )</pre>



<ul>
<li><strong>minimumObservationPeriodInDays</strong>: Additionally, it&#8217;s worth noting that the IAM Recommender only begins generating role recommendations once it has gathered a certain amount of permission usage data. By default, the minimum observation period is set to 90 days. However, for project-level role recommendations, you have the flexibility to manually adjust it to 30 or 60 days. If you wish to modify this setting, you can do so by visiting the following link: <a href="https://cloud.google.com/policy-intelligence/docs/configure-role-recommendations">Configure Role Recommendations</a>.</li>



<li><strong>cloud_entity_type</strong>:  shows if issue is at org level, folder level or project level </li>



<li><strong>cloud_entity_id</strong>:  shows you the id of the org, project or folder. you can use this id in you GCP console to search for particular entity.</li>



<li><strong>recommender_subtype</strong>:  will show you weather to remove role or replace role with another role, or if someone service account is using default role. </li>



<li><strong>user</strong>: Principle (user or service account) for which recommandation has generated </li>



<li><strong>existing_role</strong>:  show you the existing role </li>



<li><strong>new_role</strong>: role you should replace existing role with, in case when recommand_subtype is remove_role this would be empty. </li>



<li><strong>priority</strong>:  priority of a particular recommandation.</li>
</ul>
<p>The post <a href="https://bigdataproc.com/gcp-security-finding-zero-trust-policy-issues-using-iam-policy-recommander/">GCP Security &#8211; Finding Zero Trust Policy issues using IAM policy Recommander</a> appeared first on <a href="https://bigdataproc.com">Big Data Processing </a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://bigdataproc.com/gcp-security-finding-zero-trust-policy-issues-using-iam-policy-recommander/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
