More Info:

Ensure that no users have the KMS admin role and any one of the CryptoKey roles follows separation of duties, where no user have access to resources out of the scope of duty.

Risk Level

Critical

Address

Security

Compliance Standards

CISGCP, CBP, ISO27001

Triage and Remediation

Remediation

To remediate the misconfiguration “KMS Admin Roles Should Not Have CryptoKey Role” in GCP using GCP console, you can follow the below steps:

  1. Login to your GCP console and navigate to the IAM & Admin page.
  2. In the IAM & Admin page, select the “Roles” tab.
  3. Search for the “Cloud KMS Admin” role and click on it.
  4. Under the “Permissions” tab, search for the “cloudkms.cryptoKeyRoles.*” permission.
  5. Click on the pencil icon next to the “cloudkms.cryptoKeyRoles.*” permission to edit it.
  6. Uncheck the “cloudkms.cryptoKeyRoles.*” permission and click on the “Save” button.
  7. Verify that the “cloudkms.cryptoKeyRoles.*” permission is no longer present under the “Permissions” tab for the “Cloud KMS Admin” role.

By following the above steps, you have successfully remediated the misconfiguration “KMS Admin Roles Should Not Have CryptoKey Role” in GCP using GCP console.

Additional Reading: