Hazardous (3)
Recommended Mitigation
Primitive roles should not be used to give users access to resources. Make sure to follow the principle of least privilege. Read more here: <a href="https://cloud.google.com/blog/products/identity-security/dont-get-pwned-practicing-the-principle-of-least-privilege." target="_blank" rel="noopener noreferrer">https://cloud.google.com/blog/products/identity-security/dont-get-pwned-practicing-the-principle-of-least-privilege.</a>