IAM Policies

How to Use this Page

This page lists the Google Cloud IAM Policies that Bridgecrew helps you enforce. You can browse this page, or search for a specific policy ID or short title. For each policy, press the link for more details about a policy and its remediation options.

Do Not Configure Instances to use Default Service Account
Violation ID: BC_GCP_IAM_1

Ensure Instances are Not Configured to use Default Service Account with Full Access to Cloud APIs
Violation ID: BC_GCP_IAM_2

Do not Assign IAM Users Service Account User or Service Account Token Creator Roles at Project Level
Violation ID: BC_GCP_IAM_3

Ensure Service Account has No Admin Privileges
Violation ID: BC_GCP_IAM_4

Updated 3 months ago


IAM Policies


Suggested Edits are limited on API Reference Pages

You can only suggest edits to Markdown body content, but not to the API spec.