Lateral movement

User Privilege Escalation – Service Creation (Project Scope)

Risk Level

Hazardous (3)

Compliance Frameworks


The User '{GcpUser}' has an IAM policy containing permissions that allow privilege escalation, at the project level. One or more of the existing permissions allow the user to create new services with higher permissions than their own. The user can then utilize these services to perform API calls that the user may not be authorized to perform. The role containing these permissions is '{GcpUser.PolicyBindings.Role}'
  • Recommended Mitigation

    Evaluate the user's permissions and consider removing the binding to {GcpUser.PolicyBindings.Role} or the following permissions: cloudbuild.builds.create, deploymentmanager.deployments.create, cloudfunctions.functions.create, compute.instances.create,,