AVD-GCP-0011: False positive for role assignments to service account or group #9468
Replies: 1 comment 1 reply
-
|
Hi @manuelbernhardt ! Yes, in this case the role is assigned to a service account rather than a human user, but the underlying risk is the same: the assigned service account can impersonate any service account in the project. The same principle applies when assigning the role to a group instead of a user: — any member of that group (or any service account within it) would inherit the ability to impersonate all service accounts at the project level. The key point is that project-level We should improve the messages for certain checks related to service account access to avoid causing confusion. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
IDs
AVD-GCP-0011
Description
The following role assignment (non-authorative, as doing otherwise would interfere with other IAM bindings) is detected as one that gives users access to service account impersonation:
However, the assignment is itself done for a
serviceAccount:(see themember), not a user.The same issue happens when assigning a
group:rather than auser:.Reproduction Steps
1. Scan the configuration given in the exampleTarget
Filesystem
Scanner
Misconfiguration
Target OS
No response
Debug Output
Version
Checklist
-f jsonthat shows data sources and confirmed that the security advisory in data sources was correctBeta Was this translation helpful? Give feedback.
All reactions