Google > Iam >

No Project Level Service Account Impersonation

MEDIUM
Source
Trivy
ID
AVD-GCP-0011

Users should not be granted service account access at the project level

Users with service account access at project level can impersonate any service account. Instead, they should be given access to particular service accounts as required.

Impact

Privilege escalation, impersonation of any/all services

Follow the appropriate remediation steps below to resolve the issue.

Provide access at the service-level instead of project-level, if required

1
2
3
4
5
 resource "google_project_iam_binding" "project-123" {
 	project = "project-123"
 	role    = "roles/nothingInParticular"
 }