Lateral movement

User Privilege Escalation – Impersonation (Project Scope)

Risk Level

Hazardous (3)

Platform(s)
Compliance Frameworks

Description

The User '{GcpUser}' has an IAM policy containing permissions that allow privilege escalation, at the project level. The existing permissions allow the user to impersonate a service account with higher permissions than their own. The user can then utilize that service account to perform API calls that the user may not be authorized to perform. The role containing these permissions is '{GcpUser.PolicyBindings.Role}'
  • Recommended Mitigation

    Evaluate the user's permissions and consider removing the binding to {GcpUser.PolicyBindings.Role} or the following permission: iam.serviceAccounts.actAs