Skip to main content

Google Cloud

Cloud Security and Compliance provides supports the following Use Cases and Lacework Features:

Use CasesLacework Feature(s)Data Source
Cloud Security Posture Management (CSPM)
Cloud Infrastructure Entitilement Management (CIEM)
Compliance Dashboard and Reports
Cloud Infrastructure Entitilement Management Dashboard
Attack Path Analysis and Exposure Polygraph
Google Cloud Configuration
User Entity Behaviour Analytics (UEBA)Cloud Anomaly Detection
Cloud Drift Detection
Cloud Audit Polygraph
Google Cloud Audit Logs
Vulnerability ManagementVulnerability Management DashboardGCR
GAR
Agentless Workload Scanning
User Entity Behaviour Analytics (UEBA)Kubernetes Audit Log Dashboard
Kubernetes Anomaly Detection
Kubernetes Audit Log Polygraph
GKE Audit

See below for information on planning Lacework integrations and the specific use cases for each integration:

Use CasesLacework Feature(s)Data Source
Cloud Security Posture Management (CSPM)
Cloud Infrastructure Entitilement Management (CIEM)
Compliance Dashboard and Reports
Cloud Infrastructure Entitilement Management Dashboard
Attack Path Analysis and Exposure Polygraph
Google Cloud Configuration
User Entity Behaviour Analytics (UEBA)Cloud Anomaly Detection
Cloud Drift Detection
Cloud Audit Polygraph
Google Cloud Audit Logs
Prerequisites 📎

Ingested Logs

Lacework ingests Admin Activity logs and Data Access logs. Admin Activity logs are enabled by GCP by default. You may have to enable Data Access logs at an additional cost from GCP to access the following event groups:

  • ADMIN_READ: access to Kubernetes metadata and configuration
  • DATA_READ: access to Kubernetes resources
  • DATA_WRITE: creation and changes to Kubernetes resources
Required Google Cloud APIs 📎

When you manually create a GCP Configuration or Audit Log integration, it is important to enable the required APIs in the correct way for the integration to work as expected.

API List​

Use this table as a reference when enabling the APIs in the How to Enable the APIs section below.

info

Lacework recommends that all the APIs listed below are enabled on the project that hosts the service account.

If they are not enabled, Lacework is not able to assess other projects that have these APIs enabled (or if they are enabled in the future).

API NameAPI URLIntegration Type
Cloud Resource Manager APIcloudresourcemanager.googleapis.comAudit Log
Configuration
Identity and Access Management (IAM) APIiam.googleapis.comAudit Log
Configuration
Service Usage APIserviceusage.googleapis.comAudit Log
Configuration
BigQuery APIbigquery.googleapis.comConfiguration
Cloud Asset APIcloudasset.googleapis.comConfiguration
Cloud DNS APIdns.googleapis.comConfiguration
Cloud Key Management Service (KMS) APIcloudkms.googleapis.comConfiguration
Cloud Logging APIlogging.googleapis.comConfiguration
Cloud Pub/Sub APIpubsub.googleapis.comAudit Log
Configuration
Cloud SQL Admin APIsqladmin.googleapis.comConfiguration
Cloud Storagestorage-component.googleapis.comConfiguration
Compute Engine APIcompute.googleapis.comConfiguration
Essential Contact APIessentialcontacts.googleapis.comConfiguration
Kubernetes Engine APIcontainer.googleapis.comConfiguration

How to Enable the APIs​

For the project that hosts the service account for the integration, enable each of the APIs listed in the API List by choosing one of the methods below.

Enable using the GCP Console​

  1. Log in to the GCP Console and click gcp_api_home.png.

  2. Select APIs & Services > Library.

  3. In the Search for APIs & Services field, enter the API URL listed in the table above such as iam.googleapis.com.

    gcp_api_lib.png

  4. Click on the result that matches the API name listed above, such as Identity and Access Management (IAM) API.

    gcp_iam_api.png

  5. Click Enable.

    gcp_edit_iam_api.png

  6. If you are prompted to enable billing, click Enable Billing.

  7. Repeat these steps for each GCP project that hosts a service account that you are using for your Lacework integration.

Enable using the gcloud CLI​

Ensure that the gcloud config is set to use a service account with the permissions required to enable APIs.

For further information about enabling APIs, see the Google Cloud documentation.

  1. Set the project that you wish to enable the APIs on:

    gcloud config set project target_project
  2. Enable the required APIs for your integration type:

    Configuration Integration
    gcloud services enable \
    cloudresourcemanager.googleapis.com \
    iam.googleapis.com \
    serviceusage.googleapis.com \
    bigquery.googleapis.com \
    cloudasset.googleapis.com \
    dns.googleapis.com \
    cloudkms.googleapis.com \
    logging.googleapis.com \
    pubsub.googleapis.com \
    sqladmin.googleapis.com \
    storage-component.googleapis.com \
    compute.googleapis.com \
    essentialcontacts.googleapis.com \
    container.googleapis.com
    Pub/Sub-Based Audit Log Integration
    gcloud services enable \
    pubsub.googleapis.com \
    cloudresourcemanager.googleapis.com \
    iam.googleapis.com \
    serviceusage.googleapis.com
    Storage-Based Audit Log Integration
    gcloud services enable \
    pubsub.googleapis.com \
    cloudresourcemanager.googleapis.com \
    iam.googleapis.com \
    serviceusage.googleapis.com
  3. Verify the APIs were successfully enabled:

    gcloud services list
Architecture 📎
Lacework Google Cloud Architecture

Single Project Integration

Permissions Required for Deployment 📎
Depending on the feature being deploy there will be a different set of minimal required permissions. The list below covers permissions required for deployment of Cloud Audit and Configuration via Terraform:

Cloud Audit and Config

The permissions outlined here are required when using the default terraform configuration and applicable to the target account for integration:
ScopePermission
projects/<LACEWORK_GOOGLECLOUD_PROJECT>compute.projects.get
projects/<LACEWORK_GOOGLECLOUD_PROJECT>iam.roles.create
projects/<LACEWORK_GOOGLECLOUD_PROJECT>iam.roles.delete
projects/<LACEWORK_GOOGLECLOUD_PROJECT>iam.roles.get
projects/<LACEWORK_GOOGLECLOUD_PROJECT>iam.roles.list
projects/<LACEWORK_GOOGLECLOUD_PROJECT>iam.roles.undelete
projects/<LACEWORK_GOOGLECLOUD_PROJECT>iam.roles.update
projects/<LACEWORK_GOOGLECLOUD_PROJECT>iam.serviceAccountKeys.create
projects/<LACEWORK_GOOGLECLOUD_PROJECT>iam.serviceAccountKeys.delete
projects/<LACEWORK_GOOGLECLOUD_PROJECT>iam.serviceAccountKeys.get
projects/<LACEWORK_GOOGLECLOUD_PROJECT>iam.serviceAccountKeys.list
projects/<LACEWORK_GOOGLECLOUD_PROJECT>iam.serviceAccounts.create
projects/<LACEWORK_GOOGLECLOUD_PROJECT>iam.serviceAccounts.delete
projects/<LACEWORK_GOOGLECLOUD_PROJECT>iam.serviceAccounts.get
projects/<LACEWORK_GOOGLECLOUD_PROJECT>iam.serviceAccounts.list
projects/<LACEWORK_GOOGLECLOUD_PROJECT>logging.sinks.create
projects/<LACEWORK_GOOGLECLOUD_PROJECT>logging.sinks.delete
projects/<LACEWORK_GOOGLECLOUD_PROJECT>logging.sinks.get
projects/<LACEWORK_GOOGLECLOUD_PROJECT>logging.sinks.list
projects/<LACEWORK_GOOGLECLOUD_PROJECT>pubsub.subscriptions.create
projects/<LACEWORK_GOOGLECLOUD_PROJECT>pubsub.subscriptions.delete
projects/<LACEWORK_GOOGLECLOUD_PROJECT>pubsub.subscriptions.get
projects/<LACEWORK_GOOGLECLOUD_PROJECT>pubsub.subscriptions.getIamPolicy
projects/<LACEWORK_GOOGLECLOUD_PROJECT>pubsub.subscriptions.list
projects/<LACEWORK_GOOGLECLOUD_PROJECT>pubsub.subscriptions.setIamPolicy
projects/<LACEWORK_GOOGLECLOUD_PROJECT>pubsub.topics.attachSubscription
projects/<LACEWORK_GOOGLECLOUD_PROJECT>pubsub.topics.create
projects/<LACEWORK_GOOGLECLOUD_PROJECT>pubsub.topics.delete
projects/<LACEWORK_GOOGLECLOUD_PROJECT>pubsub.topics.get
projects/<LACEWORK_GOOGLECLOUD_PROJECT>pubsub.topics.getIamPolicy
projects/<LACEWORK_GOOGLECLOUD_PROJECT>pubsub.topics.list
projects/<LACEWORK_GOOGLECLOUD_PROJECT>pubsub.topics.setIamPolicy
projects/<LACEWORK_GOOGLECLOUD_PROJECT>resourcemanager.projects.get
projects/<LACEWORK_GOOGLECLOUD_PROJECT>resourcemanager.projects.getIamPolicy
projects/<LACEWORK_GOOGLECLOUD_PROJECT>resourcemanager.projects.setIamPolicy
projects/<LACEWORK_GOOGLECLOUD_PROJECT>serviceusage.quotas.get
projects/<LACEWORK_GOOGLECLOUD_PROJECT>serviceusage.services.get
projects/<LACEWORK_GOOGLECLOUD_PROJECT>serviceusage.services.list
projects/<LACEWORK_GOOGLECLOUD_PROJECT>storage.buckets.create
projects/<LACEWORK_GOOGLECLOUD_PROJECT>storage.buckets.delete
projects/<LACEWORK_GOOGLECLOUD_PROJECT>storage.buckets.get
projects/<LACEWORK_GOOGLECLOUD_PROJECT>storage.buckets.getIamPolicy
projects/<LACEWORK_GOOGLECLOUD_PROJECT>storage.buckets.list
projects/<LACEWORK_GOOGLECLOUD_PROJECT>storage.buckets.setIamPolicy
projects/<LACEWORK_GOOGLECLOUD_PROJECT>storage.buckets.update
projects/<LACEWORK_GOOGLECLOUD_PROJECT>storage.objects.delete
Permissions Used in Operation 📎

Cloud Audit and Config

ServiceAccounts

TypeNameAccountDisplay NameMembership
google_service_accountprojects/<GCP_PROJECT>/serviceAccounts/lw-at-<UNIQUE_ID>@<GCP_PROJECT>.iam.gserviceaccount.comprojects/<GCP_PROJECT>lw-at-<UNIQUE_ID>
[
"roles/storage.objectViewer"
]
google_service_accountprojects/<GCP_PROJECT>/serviceAccounts/lw-cfg-<UNIQUE_ID>@<GCP_PROJECT>.iam.gserviceaccount.comprojects/<GCP_PROJECT>lw-cfg-<UNIQUE_ID>
[
"roles/browser",
"roles/cloudasset.viewer",
"roles/iam.securityReviewer",
"projects/<GCP_PROJECT>/roles/lwComplianceRole_<UNIQUE_ID>"
]

Roles

TypeNameTitlePermissions
google_project_iam_custom_roleprojects/<GCP_PROJECT>/roles/lwComplianceRole_<UNIQUE_ID>Lacework Compliance Role
[
"bigquery.datasets.get",
"compute.projects.get",
"compute.sslPolicies.get",
"pubsub.topics.get",
"storage.buckets.get"
]

Single Project Integration (Pubsub)

Permissions Required for Deployment 📎
Depending on the feature being deploy there will be a different set of minimal required permissions. The list below covers permissions required for deployment of Cloud Audit and Configuration via Terraform:

Cloud Audit and Config (Pubsub Integration Type)

The permissions outlined here are required when using the default terraform configuration and applicable to the target account for integration:
ScopePermission
projects/<LACEWORK_GOOGLECLOUD_PROJECT>compute.projects.get
projects/<LACEWORK_GOOGLECLOUD_PROJECT>iam.roles.create
projects/<LACEWORK_GOOGLECLOUD_PROJECT>iam.roles.delete
projects/<LACEWORK_GOOGLECLOUD_PROJECT>iam.roles.get
projects/<LACEWORK_GOOGLECLOUD_PROJECT>iam.roles.list
projects/<LACEWORK_GOOGLECLOUD_PROJECT>iam.roles.undelete
projects/<LACEWORK_GOOGLECLOUD_PROJECT>iam.roles.update
projects/<LACEWORK_GOOGLECLOUD_PROJECT>iam.serviceAccountKeys.create
projects/<LACEWORK_GOOGLECLOUD_PROJECT>iam.serviceAccountKeys.delete
projects/<LACEWORK_GOOGLECLOUD_PROJECT>iam.serviceAccountKeys.get
projects/<LACEWORK_GOOGLECLOUD_PROJECT>iam.serviceAccountKeys.list
projects/<LACEWORK_GOOGLECLOUD_PROJECT>iam.serviceAccounts.create
projects/<LACEWORK_GOOGLECLOUD_PROJECT>iam.serviceAccounts.delete
projects/<LACEWORK_GOOGLECLOUD_PROJECT>iam.serviceAccounts.get
projects/<LACEWORK_GOOGLECLOUD_PROJECT>iam.serviceAccounts.list
projects/<LACEWORK_GOOGLECLOUD_PROJECT>logging.sinks.create
projects/<LACEWORK_GOOGLECLOUD_PROJECT>logging.sinks.delete
projects/<LACEWORK_GOOGLECLOUD_PROJECT>logging.sinks.get
projects/<LACEWORK_GOOGLECLOUD_PROJECT>logging.sinks.list
projects/<LACEWORK_GOOGLECLOUD_PROJECT>pubsub.subscriptions.create
projects/<LACEWORK_GOOGLECLOUD_PROJECT>pubsub.subscriptions.delete
projects/<LACEWORK_GOOGLECLOUD_PROJECT>pubsub.subscriptions.get
projects/<LACEWORK_GOOGLECLOUD_PROJECT>pubsub.subscriptions.getIamPolicy
projects/<LACEWORK_GOOGLECLOUD_PROJECT>pubsub.subscriptions.list
projects/<LACEWORK_GOOGLECLOUD_PROJECT>pubsub.subscriptions.setIamPolicy
projects/<LACEWORK_GOOGLECLOUD_PROJECT>pubsub.topics.attachSubscription
projects/<LACEWORK_GOOGLECLOUD_PROJECT>pubsub.topics.create
projects/<LACEWORK_GOOGLECLOUD_PROJECT>pubsub.topics.delete
projects/<LACEWORK_GOOGLECLOUD_PROJECT>pubsub.topics.get
projects/<LACEWORK_GOOGLECLOUD_PROJECT>pubsub.topics.getIamPolicy
projects/<LACEWORK_GOOGLECLOUD_PROJECT>pubsub.topics.list
projects/<LACEWORK_GOOGLECLOUD_PROJECT>pubsub.topics.setIamPolicy
projects/<LACEWORK_GOOGLECLOUD_PROJECT>resourcemanager.projects.get
projects/<LACEWORK_GOOGLECLOUD_PROJECT>resourcemanager.projects.getIamPolicy
projects/<LACEWORK_GOOGLECLOUD_PROJECT>resourcemanager.projects.setIamPolicy
projects/<LACEWORK_GOOGLECLOUD_PROJECT>serviceusage.quotas.get
projects/<LACEWORK_GOOGLECLOUD_PROJECT>serviceusage.services.get
projects/<LACEWORK_GOOGLECLOUD_PROJECT>serviceusage.services.list
Permissions Used in Operation 📎

Cloud Audit and Config (Pubsub Integration Type)

ServiceAccounts

TypeNameAccountDisplay NameMembership
google_service_accountprojects/<GCP_PROJECT>/serviceAccounts/lw-cfg-<UNIQUE_ID>@<GCP_PROJECT>.iam.gserviceaccount.comprojects/<GCP_PROJECT>lw-cfg-<UNIQUE_ID>
[
"roles/browser",
"roles/cloudasset.viewer",
"roles/iam.securityReviewer",
"projects/<GCP_PROJECT>/roles/lwComplianceRole_<UNIQUE_ID>"
]
google_service_accountprojects/<GCP_PROJECT>/serviceAccounts/lw-al-ps-<UNIQUE_ID>@<GCP_PROJECT>.iam.gserviceaccount.comprojects/<GCP_PROJECT>lw-al-ps-<UNIQUE_ID>
[
"roles/monitoring.viewer"
]

Roles

TypeNameTitlePermissions
google_project_iam_custom_roleprojects/<GCP_PROJECT>/roles/lwComplianceRole_<UNIQUE_ID>Lacework Compliance Role
[
"bigquery.datasets.get",
"compute.projects.get",
"compute.sslPolicies.get",
"pubsub.topics.get",
"storage.buckets.get"
]

Organization Level Integration

Permissions Required for Deployment 📎
Depending on the feature being deploy there will be a different set of minimal required permissions. The list below covers permissions required for deployment of Cloud Audit and Configuration via Terraform:

Cloud Audit and Config (Org Integration)

The permissions outlined here are required when using the default terraform configuration and applicable to the target account for integration:
ScopePermission
organizations/<GOOGLECLOUD_ORG_ACCOUNT>compute.projects.get
organizations/<GOOGLECLOUD_ORG_ACCOUNT>iam.roles.create
organizations/<GOOGLECLOUD_ORG_ACCOUNT>iam.roles.delete
organizations/<GOOGLECLOUD_ORG_ACCOUNT>iam.roles.get
organizations/<GOOGLECLOUD_ORG_ACCOUNT>iam.roles.list
organizations/<GOOGLECLOUD_ORG_ACCOUNT>iam.roles.undelete
organizations/<GOOGLECLOUD_ORG_ACCOUNT>iam.roles.update
organizations/<GOOGLECLOUD_ORG_ACCOUNT>logging.sinks.create
organizations/<GOOGLECLOUD_ORG_ACCOUNT>logging.sinks.delete
organizations/<GOOGLECLOUD_ORG_ACCOUNT>logging.sinks.get
organizations/<GOOGLECLOUD_ORG_ACCOUNT>logging.sinks.list
organizations/<GOOGLECLOUD_ORG_ACCOUNT>resourcemanager.organizations.get
organizations/<GOOGLECLOUD_ORG_ACCOUNT>resourcemanager.organizations.getIamPolicy
organizations/<GOOGLECLOUD_ORG_ACCOUNT>resourcemanager.organizations.setIamPolicy
organizations/<GOOGLECLOUD_ORG_ACCOUNT>serviceusage.quotas.get
organizations/<GOOGLECLOUD_ORG_ACCOUNT>serviceusage.services.get
organizations/<GOOGLECLOUD_ORG_ACCOUNT>serviceusage.services.list
projects/<LACEWORK_GOOGLECLOUD_PROJECT>compute.projects.get
projects/<LACEWORK_GOOGLECLOUD_PROJECT>iam.serviceAccountKeys.create
projects/<LACEWORK_GOOGLECLOUD_PROJECT>iam.serviceAccountKeys.delete
projects/<LACEWORK_GOOGLECLOUD_PROJECT>iam.serviceAccountKeys.get
projects/<LACEWORK_GOOGLECLOUD_PROJECT>iam.serviceAccountKeys.list
projects/<LACEWORK_GOOGLECLOUD_PROJECT>iam.serviceAccounts.create
projects/<LACEWORK_GOOGLECLOUD_PROJECT>iam.serviceAccounts.delete
projects/<LACEWORK_GOOGLECLOUD_PROJECT>iam.serviceAccounts.get
projects/<LACEWORK_GOOGLECLOUD_PROJECT>iam.serviceAccounts.list
projects/<LACEWORK_GOOGLECLOUD_PROJECT>pubsub.subscriptions.create
projects/<LACEWORK_GOOGLECLOUD_PROJECT>pubsub.subscriptions.delete
projects/<LACEWORK_GOOGLECLOUD_PROJECT>pubsub.subscriptions.get
projects/<LACEWORK_GOOGLECLOUD_PROJECT>pubsub.subscriptions.getIamPolicy
projects/<LACEWORK_GOOGLECLOUD_PROJECT>pubsub.subscriptions.list
projects/<LACEWORK_GOOGLECLOUD_PROJECT>pubsub.subscriptions.setIamPolicy
projects/<LACEWORK_GOOGLECLOUD_PROJECT>pubsub.topics.attachSubscription
projects/<LACEWORK_GOOGLECLOUD_PROJECT>pubsub.topics.create
projects/<LACEWORK_GOOGLECLOUD_PROJECT>pubsub.topics.delete
projects/<LACEWORK_GOOGLECLOUD_PROJECT>pubsub.topics.get
projects/<LACEWORK_GOOGLECLOUD_PROJECT>pubsub.topics.getIamPolicy
projects/<LACEWORK_GOOGLECLOUD_PROJECT>pubsub.topics.list
projects/<LACEWORK_GOOGLECLOUD_PROJECT>pubsub.topics.setIamPolicy
projects/<LACEWORK_GOOGLECLOUD_PROJECT>resourcemanager.projects.get
projects/<LACEWORK_GOOGLECLOUD_PROJECT>resourcemanager.projects.getIamPolicy
projects/<LACEWORK_GOOGLECLOUD_PROJECT>resourcemanager.projects.setIamPolicy
projects/<LACEWORK_GOOGLECLOUD_PROJECT>serviceusage.quotas.get
projects/<LACEWORK_GOOGLECLOUD_PROJECT>serviceusage.services.get
projects/<LACEWORK_GOOGLECLOUD_PROJECT>serviceusage.services.list
projects/<LACEWORK_GOOGLECLOUD_PROJECT>storage.buckets.create
projects/<LACEWORK_GOOGLECLOUD_PROJECT>storage.buckets.delete
projects/<LACEWORK_GOOGLECLOUD_PROJECT>storage.buckets.get
projects/<LACEWORK_GOOGLECLOUD_PROJECT>storage.buckets.getIamPolicy
projects/<LACEWORK_GOOGLECLOUD_PROJECT>storage.buckets.list
projects/<LACEWORK_GOOGLECLOUD_PROJECT>storage.buckets.setIamPolicy
projects/<LACEWORK_GOOGLECLOUD_PROJECT>storage.buckets.update
projects/<LACEWORK_GOOGLECLOUD_PROJECT>storage.objects.delete
Permissions Used in Operation 📎

Cloud Audit and Config (Org Integration)

ServiceAccounts

TypeNameAccountDisplay NameMembership
google_service_accountprojects/<GCP_PROJECT>/serviceAccounts/lw-at-<UNIQUE_ID>@<GCP_PROJECT>.iam.gserviceaccount.comprojects/<GCP_PROJECT>lw-at-<UNIQUE_ID>
[
"roles/storage.objectViewer",
"roles/resourcemanager.organizationViewer"
]
google_service_accountprojects/<GCP_PROJECT>/serviceAccounts/lw-cfg-<UNIQUE_ID>@<GCP_PROJECT>.iam.gserviceaccount.comprojects/<GCP_PROJECT>lw-cfg-<UNIQUE_ID>
[
"roles/browser",
"roles/cloudasset.viewer",
"roles/iam.securityReviewer",
"organizations/<GCP_ORG_ACCOUNT>/roles/lwOrgComplianceRole_<UNIQUE_ID>"
]

Roles

TypeNameTitlePermissions
google_organization_iam_custom_roleorganizations/<GCP_ORG_ACCOUNT>/roles/lwOrgComplianceRole_<UNIQUE_ID>Lacework Org Compliance Role
[
"bigquery.datasets.get",
"compute.projects.get",
"compute.sslPolicies.get",
"pubsub.topics.get",
"storage.buckets.get"
]

Organization Level Integration (PubSub)

Permissions Required for Deployment 📎
Depending on the feature being deploy there will be a different set of minimal required permissions. The list below covers permissions required for deployment of Cloud Audit and Configuration via Terraform:

Cloud Audit and Config (Pubsub and Org Integration Type)

The permissions outlined here are required when using the default terraform configuration and applicable to the target account for integration:
ScopePermission
organizations/<GOOGLECLOUD_ORG_ACCOUNT>compute.projects.get
organizations/<GOOGLECLOUD_ORG_ACCOUNT>iam.roles.create
organizations/<GOOGLECLOUD_ORG_ACCOUNT>iam.roles.delete
organizations/<GOOGLECLOUD_ORG_ACCOUNT>iam.roles.get
organizations/<GOOGLECLOUD_ORG_ACCOUNT>iam.roles.list
organizations/<GOOGLECLOUD_ORG_ACCOUNT>iam.roles.undelete
organizations/<GOOGLECLOUD_ORG_ACCOUNT>iam.roles.update
organizations/<GOOGLECLOUD_ORG_ACCOUNT>logging.sinks.create
organizations/<GOOGLECLOUD_ORG_ACCOUNT>logging.sinks.delete
organizations/<GOOGLECLOUD_ORG_ACCOUNT>logging.sinks.get
organizations/<GOOGLECLOUD_ORG_ACCOUNT>logging.sinks.list
organizations/<GOOGLECLOUD_ORG_ACCOUNT>resourcemanager.organizations.get
organizations/<GOOGLECLOUD_ORG_ACCOUNT>resourcemanager.organizations.getIamPolicy
organizations/<GOOGLECLOUD_ORG_ACCOUNT>resourcemanager.organizations.setIamPolicy
organizations/<GOOGLECLOUD_ORG_ACCOUNT>serviceusage.quotas.get
organizations/<GOOGLECLOUD_ORG_ACCOUNT>serviceusage.services.get
organizations/<GOOGLECLOUD_ORG_ACCOUNT>serviceusage.services.list
projects/<LACEWORK_GOOGLECLOUD_PROJECT>compute.projects.get
projects/<LACEWORK_GOOGLECLOUD_PROJECT>iam.serviceAccountKeys.create
projects/<LACEWORK_GOOGLECLOUD_PROJECT>iam.serviceAccountKeys.delete
projects/<LACEWORK_GOOGLECLOUD_PROJECT>iam.serviceAccountKeys.get
projects/<LACEWORK_GOOGLECLOUD_PROJECT>iam.serviceAccountKeys.list
projects/<LACEWORK_GOOGLECLOUD_PROJECT>iam.serviceAccounts.create
projects/<LACEWORK_GOOGLECLOUD_PROJECT>iam.serviceAccounts.delete
projects/<LACEWORK_GOOGLECLOUD_PROJECT>iam.serviceAccounts.get
projects/<LACEWORK_GOOGLECLOUD_PROJECT>iam.serviceAccounts.list
projects/<LACEWORK_GOOGLECLOUD_PROJECT>pubsub.subscriptions.create
projects/<LACEWORK_GOOGLECLOUD_PROJECT>pubsub.subscriptions.delete
projects/<LACEWORK_GOOGLECLOUD_PROJECT>pubsub.subscriptions.get
projects/<LACEWORK_GOOGLECLOUD_PROJECT>pubsub.subscriptions.getIamPolicy
projects/<LACEWORK_GOOGLECLOUD_PROJECT>pubsub.subscriptions.list
projects/<LACEWORK_GOOGLECLOUD_PROJECT>pubsub.subscriptions.setIamPolicy
projects/<LACEWORK_GOOGLECLOUD_PROJECT>pubsub.topics.attachSubscription
projects/<LACEWORK_GOOGLECLOUD_PROJECT>pubsub.topics.create
projects/<LACEWORK_GOOGLECLOUD_PROJECT>pubsub.topics.delete
projects/<LACEWORK_GOOGLECLOUD_PROJECT>pubsub.topics.get
projects/<LACEWORK_GOOGLECLOUD_PROJECT>pubsub.topics.getIamPolicy
projects/<LACEWORK_GOOGLECLOUD_PROJECT>pubsub.topics.list
projects/<LACEWORK_GOOGLECLOUD_PROJECT>pubsub.topics.setIamPolicy
projects/<LACEWORK_GOOGLECLOUD_PROJECT>resourcemanager.projects.get
projects/<LACEWORK_GOOGLECLOUD_PROJECT>resourcemanager.projects.getIamPolicy
projects/<LACEWORK_GOOGLECLOUD_PROJECT>resourcemanager.projects.setIamPolicy
projects/<LACEWORK_GOOGLECLOUD_PROJECT>serviceusage.quotas.get
projects/<LACEWORK_GOOGLECLOUD_PROJECT>serviceusage.services.get
projects/<LACEWORK_GOOGLECLOUD_PROJECT>serviceusage.services.list
Permissions Used in Operation 📎

Cloud Audit and Config (Pubsub and Org Integration Type)

ServiceAccounts

TypeNameAccountDisplay NameMembership
google_service_accountprojects/<GCP_PROJECT>/serviceAccounts/lw-cfg-<UNIQUE_ID>@<GCP_PROJECT>.iam.gserviceaccount.comprojects/<GCP_PROJECT>lw-cfg-<UNIQUE_ID>
[
"roles/browser",
"roles/cloudasset.viewer",
"roles/iam.securityReviewer",
"organizations/<GCP_ORG_ACCOUNT>/roles/lwOrgComplianceRole_<UNIQUE_ID>"
]
google_service_accountprojects/<GCP_PROJECT>/serviceAccounts/lw-al-ps-<UNIQUE_ID>@<GCP_PROJECT>.iam.gserviceaccount.comprojects/<GCP_PROJECT>lw-al-ps-<UNIQUE_ID>
[
"roles/monitoring.viewer",
"roles/resourcemanager.organizationViewer"
]

Roles

TypeNameTitlePermissions
google_organization_iam_custom_roleorganizations/<GCP_ORG_ACCOUNT>/roles/lwOrgComplianceRole_<UNIQUE_ID>Lacework Org Compliance Role
[
"bigquery.datasets.get",
"compute.projects.get",
"compute.sslPolicies.get",
"pubsub.topics.get",
"storage.buckets.get"
]