Skip to main content

Agentless Workload Scanning for Google Cloud - IAM Permissions Required for Deployment

Overview

You can use the following Google Cloud Identity and Access Management (IAM) permissions to create custom IAM roles for the purposes of an Agentless Workload Scanning deployment.

Using the permissions provided ensures that least-privilege access is granted for the purposes of the Agentless Workload Scanning deployment.

High-Level Deployment Requirements

  • Set up Cloud Run jobs that will be triggered by the Cloud Scheduler.
  • Set up Cloud Scheduler that invokes the Cloud Run job every hour.
  • Create a new Cloud Storage bucket.
  • Create a new secret in the Google Cloud Secret Manager.
  • Create IAM role in each monitored project or at the organization level that allows listing instances, finding attached disks and cloning them to the scanning project.
  • Create IAM roles in the scanning project that allows the following:
    • manage (creating, deleting) clones and compute instances in the scanning project.
    • read and write to the scanning storage bucket.
    • run the Cloud Run job and Compute Engine instances in the scanning project.
  • Create service accounts in the scanning project associated with the IAM roles mentioned above.
  • Create a VPC, subnets, and add firewall rules for the Compute Engine instances.

How to Use

After you have created the custom role(s), you can then grant them to the principal/resource that will be used for the integration.

Ensure that you are on or using the relevant principal/resource prior to running Terraform.

Project Integration

Use the following link to download these permissions in JSON format and create a custom IAM role:

The tables below list all the required permissions.

ScopeIAM Permission
projects/PROJECT_IDcloudscheduler.jobs.create
projects/PROJECT_IDcloudscheduler.jobs.delete
projects/PROJECT_IDcloudscheduler.jobs.enable
projects/PROJECT_IDcloudscheduler.jobs.get
projects/PROJECT_IDcloudscheduler.jobs.list

Organization Integration

Use the following links to download these permissions in JSON format and create custom IAM roles:

The tables below list all the required permissions.

ScopeIAM Permission
projects/PROJECT_IDcloudscheduler.jobs.create
projects/PROJECT_IDcloudscheduler.jobs.delete
projects/PROJECT_IDcloudscheduler.jobs.enable
projects/PROJECT_IDcloudscheduler.jobs.get
projects/PROJECT_IDcloudscheduler.jobs.list

Next Steps

  1. (Optional) Explore the operational permissions used during an Agentless Workload Scanning integration in Google Cloud.
  2. Ensure that you have met all Integration Requirements.
  3. Proceed with the Agentless Workload Scanning integration: