As jy 'n GCP-omgewing wil pentest, moet jy genoeg toestemmings vra om alle of die meeste dienste wat in GCP gebruik word, te ondersoek. Ideaal gesproke, moet jy die klient vra om die volgende te skep:
Skep 'n nuwe projek
Skep 'n Diensrekening binne daardie projek (kry json-legitimasie) of skep 'n nuwe gebruiker.
Gee die Diensrekening of die gebruiker die rolle wat later genoem word, oor die ORGANISASIE
Aktiveer die API's wat later in hierdie pos genoem word in die geskepte projek
Stel van toestemmings om die voorgestelde gereedskap te gebruik:
From https://github.com/nccgroup/ScoutSuite/wiki/Google-Cloud-Platform#permissions
roles/Viewer
roles/iam.securityReviewer
roles/stackdriver.accounts.viewer
CloudSploit is an open-source security scanner designed specifically for cloud environments. It provides a comprehensive set of checks to identify security vulnerabilities and misconfigurations in your cloud infrastructure. CloudSploit supports multiple cloud providers, including GCP.
CloudSploit can be used to scan your GCP environment and identify potential security issues. It checks for various misconfigurations, such as open ports, weak access controls, unused resources, and more. By running regular scans with CloudSploit, you can proactively identify and address security risks in your GCP environment.
To use CloudSploit with GCP, you need to configure the cloud provider settings in the CloudSploit configuration file. This includes providing the necessary credentials and permissions for CloudSploit to access your GCP environment. Once configured, you can run scans using the CloudSploit command-line interface or integrate it into your CI/CD pipeline for continuous monitoring.
CloudSploit provides detailed reports and recommendations for each security check it performs. It also supports custom policies, allowing you to define your own security rules and checks. By leveraging CloudSploit's capabilities, you can enhance the security of your GCP environment and ensure compliance with best practices and industry standards.
From https://lyft.github.io/cartography/modules/gcp/config.html
roles/iam.securityReviewer
roles/resourcemanager.organizationViewer
roles/resourcemanager.folderViewer
From https://github.com/JupiterOne/graph-google-cloud/blob/main/docs/development.md
roles/iam.securityReviewer
roles/iam.organizationRoleViewer
roles/bigquery.metadataViewer