Lateral movement

User Privilege Escalation – Authentication Key Management (Resource Scope)

Risk Level

Hazardous (3)

Compliance Frameworks


The User '{GcpUser}' has an IAM policy containing permissions that allow privilege escalation, at the resource level ({GcpUser.PolicyBindings.Policy.Scope}). One or more of the existing permissions allow the user to create authentication keys, or provide access to existing ones. The user can then utilize these keys to perform API calls that the user may not be authorized to perform. The role containing these permissions is '{GcpUser.PolicyBindings.Role}'
  • Recommended Mitigation

    Evaluate the user's permissions and consider removing the binding to {GcpUser.PolicyBindings.Role} or the following permissions: serviceusage.apiKeys.create, iam.serviceAccountKeys.create, storage.hmacKeys.create, iam.serviceAccounts.getAccessToken, iam.serviceAccounts.implicitDelegation, iam.serviceAccounts.signBlob, iam.serviceAccounts.signJwt, serviceusage.apiKeys.list