More Info:

Ensure that “Disable Workload Identity Cluster Creation” policy is enforced at the GCP organization level in order to require that any new Google Kubernetes Engine (GKE) clusters have the Workload Identity feature disabled at the time of their creation. This constraint policy is useful when you want to tightly control service account access in your organization by disabling Workload Identity in addition to service account creation and service account key creation.

Risk Level

Medium

Address

Security, Reliability

Compliance Standards

CBP

Triage and Remediation

Remediation

To remediate the misconfiguration of disabling workload identity at cluster creation on GCP using GCP console, you can follow these step-by-step instructions:

  1. Open the GCP console and navigate to the Kubernetes Engine page.
  2. Select the cluster on which you want to enable workload identity.
  3. Click on the “Edit” button at the top of the page.
  4. Scroll down to the “Workload Identity” section.
  5. Click on the “Enable” button to turn on workload identity for the cluster.
  6. Click on the “Save” button at the bottom of the page to apply the changes.

After completing these steps, workload identity will be enabled for your cluster, and you will be able to use it to securely authenticate your applications and services running on GCP.