You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
'GCP NIST 3.11 IAM default audit log config should include \'DATA_READ\' and \'DATA_WRITE\' log types',
5
+
description:
6
+
'A best practice is to enable \'DATA_READ\' and \'DATA_WRITE\' data access log types as part of the default IAM audit log config, so that read and write operations on user-provided data are tracked across all relevant services. Please note that the \'ADMIN_WRITE\' log type and BigQuery data access logs are enabled by default.',
7
+
8
+
audit: '',
9
+
rationale: '',
10
+
remediation: `**From Console:**
11
+
12
+
1. Navigate to IAM & Admin, Audit Logs, or using https://console.cloud.google.com/iam-admin/audit
13
+
2. Click on Set Default Configuration at the top of the page.
14
+
34. In the Log Type tab, select the Data Write and Data Read boxes.
15
+
4. Click Save.
16
+
17
+
**From Command Line:**
18
+
1. Run the following command to read the project’s IAM policy:
2. Alternatively, the policy can be set at the organization or folder level. If setting the policy at the organization level, it is not necessary to also set it for each folder or project.
test('No Security Issue when there is a auditConfig with logtype set to DATA_WRITE and DATA_READ for all services, and exemptedMembers is empty',async()=>{
999
+
constdata: AuditConfig[]=[
1000
+
{
1001
+
auditLogConfigs: [
1002
+
{
1003
+
logType: 'DATA_WRITE',
1004
+
},
1005
+
{
1006
+
logType: 'DATA_READ',
1007
+
},
1008
+
],
1009
+
},
1010
+
]
1011
+
1012
+
awaittestRule(data,Result.PASS)
1013
+
})
1014
+
test('Security Issue when there is a auditConfig without logtype set to DATA_WRITE',async()=>{
1015
+
constdata: AuditConfig[]=[
1016
+
{
1017
+
auditLogConfigs: [
1018
+
1019
+
{
1020
+
logType: 'DATA_READ',
1021
+
},
1022
+
],
1023
+
},
1024
+
]
1025
+
1026
+
awaittestRule(data,Result.FAIL)
1027
+
})
1028
+
test('Security Issue when there is a auditConfig without logtype set to DATA_READ',async()=>{
0 commit comments