Ensure GCP project audit logging is configured properly across all services and all users in a project

Error: GCP project audit logging is not configured properly across all services and all users in a project

Bridgecrew Policy ID: BC_GCP_LOGGING_5
Checkov Check ID: CKV2_GCP_5
Severity: LOW

GCP project audit logging is not configured properly across all services and all users in a project

Description

It is recommended that Cloud Audit Logging is configured to track all admin activities and read, write access to user data.
Cloud Audit Logging maintains two audit logs for each project, folder, and organization: Admin Activity and Data Access.

  1. Admin Activity logs contain log entries for API calls or other administrative actions that modify the configuration or metadata of resources. Admin Activity audit logs are enabled for all services and cannot be configured.
  2. Data Access audit logs record API calls that create, modify, or read user-provided data. These are disabled by default and should be enabled.
    There are three kinds of Data Access audit log information:
  • Admin read: Records operations that read metadata or configuration information. Admin Activity audit logs record writes of metadata and configuration information that cannot be disabled.
  • Data read: Records operations that read user-provided data. o Data write: Records operations that write user-provided data.
    It is recommended to have an effective default audit config configured in such a way that:
  1. logtype is set to DATA_READ (to log user activity tracking) and DATA_WRITES (to log changes/tampering to user data).
  2. audit config is enabled for all the services supported by the Data Access audit logs feature.
  3. Logs should be captured for all users, i.e., there are no exempted users in any of the audit config sections. This will ensure overriding the audit config will not contradict the requirement.

Fix - Buildtime

Terraform

  • Resource: google_project
  • Argument: google_project_iam_audit_config
resource "google_project" "good_project" {
  name = "good"
  project_id = "123456"
}

resource "google_project" "bad_project" {
  name = "bad"
  project_id = "123456"
}

resource "google_project_iam_audit_config" "project_good_audit" {
  project = google_project.good_project.id
+ service = "allServices"
  audit_log_config {
    log_type = "ADMIN_READ"
  }
  audit_log_config {
    log_type = "DATA_READ"
  }
}

resource "google_project_iam_audit_config" "project_bad_audit" {
  project = google_project.bad_project.id
- service = "someService"
  audit_log_config {
    log_type = "ADMIN_READ"
  }
  audit_log_config {
    log_type = "DATA_READ"
-   exempted_members = [
-     "user:[email protected]",
-   ]
  }
}

Did this page help you?