More Info:

IAM Roles with suspicious access to data services. Your team should be aware of this.

Risk Level

High

Address

Security

Compliance Standards

CBP

Triage and Remediation

Remediation

To remediate suspicious access to data services in GCP using the GCP console, follow these steps:

  1. Sign in to your GCP console at https://console.cloud.google.com.

  2. Navigate to the IAM & Admin page by clicking on the navigation menu on the top-left corner and selecting “IAM & Admin” under the “IAM” section.

  3. On the IAM & Admin page, you will see a list of projects. Select the project where the suspicious access is occurring.

  4. In the left-hand menu, click on “IAM” to access the IAM page for the selected project.

  5. On the IAM page, you will see a list of IAM roles and members. Review the roles and members to identify any suspicious or unauthorized access.

  6. To remove suspicious access, locate the member associated with the suspicious activity and click on the three vertical dots on the right side of the member row.

  7. From the dropdown menu, click on “Remove” to revoke the member’s access.

  8. A confirmation dialog will appear. Review the information and click “REMOVE” to revoke the access.

  9. Repeat steps 6-8 for any additional suspicious members.

  10. After removing the suspicious access, consider implementing the following best practices to enhance security:

  • Regularly review and audit IAM roles and members.
  • Use the principle of least privilege, granting only the necessary permissions to each user or service account.
  • Enable multi-factor authentication (MFA) for all user accounts.
  • Monitor and analyze logs for any suspicious activities.
  • Implement security policies and enforce them using Cloud Security Command Center or third-party tools.

By following these steps and implementing the best practices, you can remediate suspicious access to data services in GCP using the GCP console.