More Info:

Ensure that the creation of Cloud IAM service accounts is prevented within your Google Cloud organization through the “Disable Service Account Creation” organization policy. This allows you to easily centralize the management of your service accounts while not restricting the other permissions that your developers and administrators have on the projects within the organization. A Cloud IAM service account is a special account that can be used by services and applications running on your Compute Engine instances to interact with other Google Cloud APIs. Applications can use service account credentials to authorize themselves to a set of APIs and perform actions within the permissions granted to the service account.

Risk Level

Medium

Address

Security, Operational Maturity

Compliance Standards

CBP

Triage and Remediation

Remediation

To remediate the misconfiguration of preventing service account creation for Google Cloud Organizations, you can follow the below steps in the GCP console:

  1. Open the Google Cloud Console and select the organization for which you want to remediate the misconfiguration.

  2. Click on the “IAM & Admin” option from the left-hand menu.

  3. From the IAM dashboard, click on the “Roles” tab.

  4. Search for the “Service Account Admin” role and click on it.

  5. Click on the “Edit” button to edit the role.

  6. In the “Permissions” tab, search for the “iam.serviceAccounts.create” permission and remove it from the role.

  7. Click on the “Save” button to save the changes.

  8. Repeat the above steps for the “Service Account User” role.

By removing the “iam.serviceAccounts.create” permission from the “Service Account Admin” and “Service Account User” roles, you will remediate the misconfiguration of preventing service account creation for Google Cloud Organizations.