Pierre-Loup 770348d041
Avoid OWASP Top 10 security-standard mismatch between metadata and description links (RULEAPI-798) (#3537)
* Add check for security standard mismatch

* Fix security standard mismatches

* Fix Resources/Standards links for secrets rules

* Fix check

* Fix links and update security standard mapping

* Fix maintanability issue

* Apply review suggestions

* Apply suggestions from code review

Co-authored-by: Egon Okerman <egon.okerman@sonarsource.com>

* Fix typo

Co-authored-by: Egon Okerman <egon.okerman@sonarsource.com>

---------

Co-authored-by: Egon Okerman <egon.okerman@sonarsource.com>
2024-01-17 17:20:28 +01:00

69 lines
1.8 KiB
Plaintext

The Google Cloud audit logs service records administrative activities and accesses to Google Cloud resources of the project. It is important to enable audit logs to be able to investigate malicious activities in the event of a security incident.
Some project members may be exempted from having their activities recorded in the Google Cloud audit log service, creating a blind spot and reducing the capacity to investigate future security events.
== Ask Yourself Whether
* The members exempted from having their activity logged have high privileges.
* Compliance rules require that audit log should be activated for all members.
There is a risk if you answered yes to any of those questions.
== Recommended Secure Coding Practices
It is recommended to have a consistent audit logging policy for all project members and therefore not to create logging exemptions for certain members.
== Sensitive Code Example
[source,terraform]
----
resource "google_project_iam_audit_config" "example" {
project = data.google_project.project.id
service = "allServices"
audit_log_config {
log_type = "ADMIN_READ"
exempted_members = [ # Sensitive
"user:rogue.administrator@gmail.com",
]
}
}
----
== Compliant Solution
[source,terraform]
----
resource "google_project_iam_audit_config" "example" {
project = data.google_project.project.id
service = "allServices"
audit_log_config {
log_type = "ADMIN_READ"
}
}
----
== See
* https://cloud.google.com/logging/docs/audit[GCP Documentation] - Cloud Audit Logs overview
ifdef::env-github,rspecator-view[]
'''
== Implementation Specification
(visible only on this page)
=== Message
Make sure excluding members activity from audit logs is safe here.
=== Highlighting
* Highlight the whole exempted_members array if not empty.
endif::env-github,rspecator-view[]