More Info:

Ensure that there is a KMS Key in the Database-tier in order to protect the data-at-rest that is available in the web stack.

Risk Level

Medium

Address

Security

Compliance Standards

CBP

Triage and Remediation

Remediation

To remediate the KMS Key Should Have Unique Key In DB Tier misconfiguration in GCP using GCP Console, please follow the steps below:

  1. Login to the GCP Console and navigate to the Cloud KMS page.
  2. Select the key ring that contains the KMS key that is used in the DB tier.
  3. Click on the KMS key that is used in the DB tier.
  4. Click on the “Permissions” tab.
  5. Check if there are any unnecessary or redundant IAM roles or members that have access to the KMS key.
  6. Remove any unnecessary or redundant IAM roles or members by clicking on the “X” button next to their names.
  7. Click on the “Add Member” button to add a new member to the KMS key.
  8. Add the service account that is used by the DB tier to the KMS key and grant it the “Cloud KMS CryptoKey Encrypter/Decrypter” role.
  9. Click on the “Save” button to save the changes.

By following the above steps, you will ensure that the KMS key used in the DB tier has a unique key and is only accessible by the necessary service account.