|
1 | 1 | { |
2 | 2 | "Provider": "gcp", |
3 | 3 | "CheckID": "iam_audit_logs_enabled", |
4 | | - "CheckTitle": "Configure Google Cloud Audit Logs to Track All Activities", |
| 4 | + "CheckTitle": "GCP project has Cloud Audit Logs enabled", |
5 | 5 | "CheckType": [], |
6 | 6 | "ServiceName": "iam", |
7 | | - "SubServiceName": "Audit Logs", |
| 7 | + "SubServiceName": "", |
8 | 8 | "ResourceIdTemplate": "", |
9 | 9 | "Severity": "medium", |
10 | | - "ResourceType": "GCPProject", |
11 | | - "ResourceGroup": "governance", |
12 | | - "Description": "Ensure that Google Cloud Audit Logs feature is configured to track Data Access logs for all Google Cloud Platform (GCP) services and users, in order to enhance overall access security and meet compliance requirements. Once configured, the feature can record all admin related activities, as well as all the read and write access requests to user data.", |
13 | | - "Risk": "In order to maintain an effective Google Cloud audit configuration for your project, folder, and organization, all 3 types of Data Access logs (ADMIN_READ, DATA_READ and DATA_WRITE) must be enabled for all supported GCP services. Also, Data Access logs should be captured for all IAM users, without exempting any of them. Exemptions let you control which users generate audit logs. When you add an exempted user to your log configuration, audit logs are not created for that user, for the selected log type(s). Data Access audit logs are disabled by default and must be explicitly enabled based on your business requirements.", |
| 10 | + "ResourceType": "cloudresourcemanager.googleapis.com/Project", |
| 11 | + "Description": "**GCP project** has **Cloud Audit Logs** configured to capture administrative operations and data access events for services and principals (*per IAM Audit Logs*, including `ADMIN_READ`, `DATA_READ`, `DATA_WRITE`).", |
| 12 | + "Risk": "Absent or partial audit logging reduces visibility into who accessed data or changed configurations, hindering detection and forensics.\n\nMisused identities can alter IAM to persist access, exfiltrate data, or delete resources, impacting **confidentiality**, **integrity**, and **availability**.", |
14 | 13 | "RelatedUrl": "", |
| 14 | + "AdditionalURLs": [ |
| 15 | + "https://www.trendmicro.com/trendaivisiononecloudriskmanagement/knowledge-base/gcp/CloudIAM/record-all-activities.html", |
| 16 | + "https://cloud.google.com/logging/docs/audit/", |
| 17 | + "https://docs.cloud.google.com/logging/docs/audit/configure-data-access" |
| 18 | + ], |
15 | 19 | "Remediation": { |
16 | 20 | "Code": { |
17 | 21 | "CLI": "", |
18 | 22 | "NativeIaC": "", |
19 | | - "Other": "https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/CloudIAM/record-all-activities.html", |
20 | | - "Terraform": "https://docs.prowler.com/checks/gcp/logging-policies-1/ensure-that-cloud-audit-logging-is-configured-properly-across-all-services-and-all-users-from-a-project#terraform" |
| 23 | + "Other": "1. In the Google Cloud console, go to IAM & Admin > Audit Logs\n2. Click Set default configuration\n3. Under Permission types, check Admin Read, Data Read, and Data Write\n4. Click Save", |
| 24 | + "Terraform": "```hcl\n# Enable Cloud Audit Logs (Data Access) for all services\nresource \"google_project_iam_audit_config\" \"all\" {\n project = \"<example_resource_id>\"\n service = \"allServices\" # Critical: apply to all services\n\n # Critical: enable Data Access audit log types to pass the check\n audit_log_config { log_type = \"ADMIN_READ\" } # metadata/config reads\n audit_log_config { log_type = \"DATA_READ\" } # data reads\n audit_log_config { log_type = \"DATA_WRITE\" } # data writes\n}\n```" |
21 | 25 | }, |
22 | 26 | "Recommendation": { |
23 | | - "Text": "It is recommended that Cloud Audit Logging is configured to track all admin activities and read, write access to user data.", |
24 | | - "Url": "https://cloud.google.com/logging/docs/audit/" |
| 27 | + "Text": "Enable comprehensive **Cloud Audit Logs** for all services and principals, including `ADMIN_READ`, `DATA_READ`, `DATA_WRITE`. *Avoid exemptions.* Set org/folder defaults, centralize and retain logs, enforce least privilege on log access, protect logs from alteration, and alert on anomalous access.", |
| 28 | + "Url": "https://hub.prowler.com/check/iam_audit_logs_enabled" |
25 | 29 | } |
26 | 30 | }, |
27 | | - "Categories": [], |
| 31 | + "Categories": [ |
| 32 | + "logging", |
| 33 | + "forensics-ready" |
| 34 | + ], |
28 | 35 | "DependsOn": [], |
29 | 36 | "RelatedTo": [], |
30 | 37 | "Notes": "" |
|
0 commit comments