More Info:

User should have access via their official corporate email id and not their personal id.

Risk Level

Medium

Address

Security, Reliability

Compliance Standards

CISGCP, CBP, SOC2, NISTCSF, PCIDSS

Triage and Remediation

Remediation

To remediate the misconfiguration “Users Should Use Work Email For Access” in GCP using GCP console, you can follow these steps:

  1. Go to the GCP Console and select the project for which you need to remediate the misconfiguration.
  2. Click on the “IAM & Admin” menu from the left-hand side navigation menu.
  3. Click on the “IAM” tab to view the list of IAM roles and members.
  4. Select the user for whom you want to remediate the misconfiguration.
  5. Click on the “Edit” button next to the user’s email address.
  6. In the “Edit member” dialog box, scroll down to the “Role” section.
  7. Click on the “Add Another Role” button to add a new role.
  8. In the “Select a Role” dialog box, search for the “Organization Policy User” role and select it.
  9. Click on the “Save” button to add the new role to the user.
  10. Repeat the above steps for all the users who have access to the project.

By adding the “Organization Policy User” role to the users, you are enforcing the organization policy that requires users to use their work email for access. This will ensure that only authorized users with valid work emails can access the GCP resources.

Additional Reading: