More Info:

Ensure that cloud Storage buckets do not allow All Users to have Ownership (“allUsers” must not have “OWNER” roles)

Risk Level

Critical

Address

Security

Compliance Standards

HITRUST, SOC2, NISTCSF, PCIDSS

Triage and Remediation

Remediation

To remediate the misconfiguration “Buckets Should Not Allow Public Ownership” for GCP using GCP console, please follow the below steps:

  1. Open the GCP console and navigate to the Cloud Storage page.

  2. Select the bucket that you want to remediate.

  3. Click on the “Permissions” tab.

  4. Under the “Members” section, look for any member or group that has the “Storage Object Viewer” or “Storage Object Admin” role assigned.

  5. Remove the member or group by clicking on the “X” icon next to their name.

  6. Repeat Step 4 and Step 5 for all members or groups that have any Storage Object role assigned.

  7. Click on the “Add” button to add a new member or group.

  8. In the “Add members” dialog box, enter the email address of the member or group that you want to grant access to.

  9. Select the appropriate role for the member or group from the “Select a role” drop-down menu.

  10. Click on the “Add” button to add the member or group to the bucket.

  11. Repeat Step 8 to Step 10 for all members or groups that need access to the bucket.

  12. Click on the “Save” button to save the changes.

By following these steps, you have successfully remediated the misconfiguration “Buckets Should Not Allow Public Ownership” for GCP using GCP console.