Ensure that IAM members do not use primitive roles such as owner, editor or viewer.
For best security practices, use only predefined IAM roles and do not use primitive roles to prevent any unauthorized access to your resources.
Ensure that no IAM member has a primitive role.