Lateral movement

Service Account Privilege Escalation – Service Update (Project Scope)

Risk Level

Hazardous (3)

Platform(s)
Compliance Frameworks

Description

The Service account '{GcpIamServiceAccount}' has an IAM policy containing permissions that allow privilege escalation, at the project level. One or more of the existing permissions allow the service account to update existing services with higher permissions than their own. The service account can then utilize these services to perform API calls that the service account may not be authorized to perform. The role containing these permissions is '{GcpIamServiceAccount.PolicyBindings.Role}'
  • Recommended Mitigation

    Evaluate the Service Account's permissions and consider removing the binding to {GcpIamServiceAccount.PolicyBindings.Role} or the following permissions: iam.roles.update, cloudfunctions.functions.update, orgpolicy.policy.set