GCP Additional Configuration

Depending on how your GCP environment is configured and/or the types of services you use, you may want to configure some additional things outside of the general InsightCloudSec onboarding process.

Additional configuration options

Review the sections below to determine what additional features or configurations may be applicable for your environment.

ConfigurationDescription
GCP Directory SupportInsightCloudSec has expanded our support for GCP Directory to harvest and display expanded IAM data via GCP's Domain-wide Delegation functionality.

By enabling Domain-wide Delegation in the GCP Console and configuring the service account ID email within InsightCloudSec, you can gain access to additional data from GCP including MFA Status, Group associations, last login, etc.
GCP Auto-BadgingInsightCloudSec includes auto-badging capabilities to create a 1:1 map of GCP project, folders, and organization tags and labels to Badges in InsightCloudSec. This capability allows any Clouds and Bots to be scoped to a badge that maps to the account tag.
GCP Recommended ActionsIf properly configured, InsightCloudSec can harvest GCP Recommendations as a resource (found under Identity & Management on the Resources page). Supported Recommendation subtypes can be acted upon from within InsightCloudSec, with the results/resolution being propagated to GCP for easier principal management.

GCP Directory Support

InsightCloudSec has expanded our support for GCP Directory to harvest and display expanded IAM data via GCP's Domain-wide Delegation functionality. While this capability is optional, we strongly encourage customers with GCP accounts to take advantage of this feature.

By enabling Domain-wide Delegation in the GCP Console and configuring the service account ID email within InsightCloudSec, you can gain access to additional data from GCP including MFA Status, Group associations, last login, etc., for two existing InsightCloudSec resource types:

Scopes that are included with this data are as follows:

Configure Directory Support

Configure domain-wide delegation for existing GCP accounts in GCP

Configure domain-wide delegation for existing GCP accounts in GCP

Within your GCP Console (e.g., https://console.cloud.google.com) you will need to locate the service account associated with your InsightCloudSec installation and ensure that you enable the Domain-wide Delegation feature.

  1. Copy the Service Account Client ID.
    1. Go to IAM & Admin > Service Accounts and select the newly configured service account.
    2. In the Advanced Settings section, in the Domain-wide Delegation field, copy the Client ID for your Service account.
    3. Under Client ID, click View Google Workspace Admin Console.
  2. Validate and enable domain-wide delegation.
    1. In the Google Workspace Admin Console, go to Security > Overview and expand API Controls.
    2. In Domain-wide Delegation, click Manage Domain Wide Delegation.
    3. Next you will either need to:
  3. Specify an email address for domain-wide delegation.
    1. Go to Directory > Users.
    2. Filter for Admin Role and select Super Admin to narrow the list of user accounts.
    3. Identify the email for the account you want to use to specify for Domain-wide Delegation.
      • The email address provided must be from an appropriately configured GCP Super-Admin from the correct Service Organization to ensure that the data can pass from the GCP Console to InsightCloudSec.
      • Save this email in a safe place, you will be using this address in the setup steps within InsightCloudSec.
Configure delegation for GCP accounts in InsightCloudSec

Configure delegation for GCP accounts in InsightCloudSec

You can configure delegation for existing or new GCP accounts in InsightCloudSec.

  1. In InsightCloudSec, go to Cloud > Clouds and open the Organizations tab.
  2. Select Edit for the GCP Organization you want to modify.
  3. Click the unlock button next to Credentials for harvesting Organization data to make the form editable.
  4. Scroll to the Email Delegation (Optional) field and update with the email address of your desired account. The email address provided must be from an appropriately configured GCP Super-Admin from the correct Service Organization to ensure that the data can pass from the GCP Console to InsightCloudSec.
  5. Click Update to finalize the changes.
Viewing GCP Directory Data

Viewing GCP Directory Data

Once configured and harvested the additional GCP Directory Data available through Domain-wide Delegation will be visible under Inventory > Resources on the Identity Management tab for both Cloud Domain Group and Cloud Domain User.

GCP Auto-Badging

InsightCloudSec includes auto-badging capabilities to create a 1:1 map of GCP project, folders, and organization tags & labels to Badges in InsightCloudSec. This allows Clouds and Bots to be scoped to a badge that maps to the account tag.

Auto-Badging in GCP Organizations

Auto-Badging in GCP Organizations

For GCP Organizations that have auto-badging of projects enabled, all clouds corresponding with a project that do not have a parent folder will have a cloud_org_path badge with a value of / to signify they are at the root.
Selecting the "Auto Badge Projects" option will also provide automatic badging for Organizations that use folders through the gcp_folder badge. This badge can be extremely helpful for managing scope around Insights, Bots, and the Compliance Scorecard views for organizational units and lines of business within your cloud footprint.

Organization-level tags can be harvested by InsightCloudSec as badges. For example, an organization-level tag in GCP might look like this: organization-name/tag-key/tag-value. This tag will be returned in InsightCloudSec as org/organization-name/tag-key:tag-value\. All projects within this organization should be returned with this badge.

Auto-Badging in GCP Projects

Auto-Badging in GCP Projects

For GCP Projects that are not part of an Organization and have auto-badging of projects enabled InsightCloudSec will automatically create badges from the GPC project-level labels. Note: If you add a GCP Organization that includes a previously standalone GCP Project at a later point, the Organization will assimilate the project into the Organization configuration.

Project-level tags can be harvested by InsightCloudSec as badges. For example, a project-level tag in GCP looks similar to an organization-level tag in GCP, but the tag will be returned in InsightCloudSec as organization-name/tag-key:tag-value.

Folders

Folders

Folder tags can also be harvested by InsightCloudSec as badges, with top-level folder tags and nested folder tags being returned slightly differently. For example, a nested folder structure within GCP might look like this: organization-name/top-level-folder/nested-folder-1/project-name. A top-level or nested folder tag looks similar to an organization-level or project-level tag in GCP, but the top-level folder tag will be returned in InsightCloudSec as organization-name/folders/top-level-folder-name/tag-key:tag-value. The nested folder tag will be returned in InsightCloudSec as organization-name/folders/top-level-folder-name/nested-folder-1/tag-key:tag-value.

Top level folder tags will be returned by any projects that are held in any sub-folders/the folder itself. Nested folder tags will be returned by any projects that are held in any sub-folders/the folder itself.

Auto-badging

Auto-badging

As an enhancement to support for provider-based organizations InsightCloudSec includes auto badging capabilities. The purpose of auto-badging is to create a 1:1 map of AWS account-level tags to Badges in InsightCloudSec. This allows Clouds to be scoped to a badge that maps to the account tag.

After the tags and labels are harvested into InsightCloudSec as badges - you cannot delete them in InsightCloudSec - they must be deleted in AWS and the changes will propagate to InsightCloudSec.

Auto-badging takes place in two stages.

StageDescription
Retrieves tags and labels from each account and project and compares them with ResourceTags associated with the cloud account in the InsightCloudSec database.If there are any changes detected, the ResourceTags in the database are overwritten with the values from the account/project.

This means that Cloud Account tags should not be locally modified since any local changes will be overwritten the next time the process runs. Additionally, any local changes that are made to Cloud Account tags are not pushed back up to the cloud provider.
Retrieves all ResourceTags from the local database that are associated with the accounts managed by an organization.For each cloud the list of tags for that cloud is compared with the current list of Badges and for each Key/Value pair of tags:

  • Existing Badges with a Key prefix of system. are skipped.
  • If the corresponding Badge with the Key/Value pair for that cloud does not already exist, it is created.
  • If a tag Value changes, the Badge with the corresponding Key will be updated to that value.
  • If a Badge no longer has a tag with a corresponding Key, it will be deleted.
  • All Badges that have a corresponding tag will have their autogenerated column set to ‘true’ even if they were previously set to ‘false’.

If properly configured, InsightCloudSec can harvest GCP Recommendations as a resource (found under Identity & Management on the Resources page). Supported Recommendation subtypes (see below) can be acted upon from within InsightCloudSec, with the results/resolution being propagated to GCP for easier principal management. InsightCloudSec supports applying recommendations for both Organizations and Projects.

Supported Recommender subtypes

Currently supported Recommender subtypes are:

  • REMOVE_ROLE
  • REMOVE_ROLE_STORAGE_BUCKET
  • REPLACE_ROLE
  • REPLACE_ROLE_STORAGE_BUCKET
  • SERVICE_AGENT_WITH_DEFAULT_ROLE
  • SERVICE_AGENT_WITHOUT_DEFAULT_ROLE