More Info:

Ensure that Cloud KMS cryptokeys are not anonymously or publicly accessible.

Risk Level

Critical

Address

Security

Compliance Standards

CISGCP, CBP

Triage and Remediation

Remediation

Sure, here are the step-by-step instructions to remediate the “KMS Cryptokeys Should Not Be Public” misconfiguration in GCP using the GCP console:

  1. Open the GCP console and navigate to the “Cloud KMS” page.

  2. Select the key ring that contains the public key that needs to be remediated.

  3. Click on the key that contains the public key that needs to be remediated.

  4. Click on the “Permissions” tab.

  5. Under the “Members” section, locate the user or group that has public access to the key.

  6. Click on the drop-down menu next to the user or group and select “Remove”.

  7. Click on the “Save” button to save the changes.

  8. Repeat steps 5-7 for any other users or groups that have public access to the key.

  9. Once all public access has been removed, click on the “IAM” tab.

  10. Check the IAM policies for the key and ensure that only authorized users or groups have access.

  11. Remove any unnecessary or overly permissive IAM policies.

  12. Click on the “Save” button to save the changes.

By following these steps, you will have successfully remediated the “KMS Cryptokeys Should Not Be Public” misconfiguration in GCP using the GCP console.