policy-library/policies/templates/gcp_iam_allowed_bindings.yaml (92 lines of code) (raw):
# Copyright 2021 Google LLC
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
apiVersion: templates.gatekeeper.sh/v1alpha1
kind: ConstraintTemplate
metadata:
name: gcp-iam-allowed-bindings-v3
spec:
crd:
spec:
names:
kind: GCPIAMAllowedBindingsConstraintV3
validation:
openAPIV3Schema:
properties:
mode:
description: "Enforcement mode, defaults to allowlist"
type: string
enum: [denylist, allowlist]
assetType:
description: "Restrict which asset type this policy applies to"
type: string
assetNames:
description: "CAI name of asset to restrict which specific assets this
policy applies to. assetNames must have the same assetType defined
above. E.g. '//bigquery.googleapis.com/projects/my-project/datasets/my-dataset'"
type: array
items:
type: string
role:
description: "Role to restrict bindings for, ex. roles/owner; Wildcards
(*) supported"
type: string
members:
description: "Members to either allow or deny for the given role, depending
on mode; Wildcards (*) supported"
type: array
items:
type: string
targets:
validation.gcp.forsetisecurity.org:
rego: |
#
# Copyright 2021 Google LLC
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
#
package templates.gcp.GCPIAMAllowedBindingsConstraintV3
import data.validator.gcp.lib as lib
deny[{
"msg": message,
"details": metadata,
}] {
constraint := input.constraint
lib.get_constraint_params(constraint, params)
asset := input.asset
check_asset_type(asset, params)
# Check if resource is part of asset names to scan
include_list := lib.get_default(params, "assetNames", [])
is_included(include_list, asset.name)
binding := asset.iam_policy.bindings[_]
member := binding.members[_]
role := binding.role
glob.match(params.role, ["/"], role)
mode := lib.get_default(params, "mode", "allowlist")
matches_found = [m | m = config_pattern(params.members[_]); glob.match(m, [], member)]
target_match_count(mode, desired_count)
count(matches_found) != desired_count
message := sprintf("IAM policy for %v grants %v to %v", [asset.name, role, member])
metadata := {
"resource": asset.name,
"member": member,
"role": role,
}
}
###########################
# Rule Utilities
###########################
# Determine the overlap between matches under test and constraint
target_match_count(mode) = 0 {
mode == "denylist"
}
target_match_count(mode) = 1 {
mode == "allowlist"
}
check_asset_type(asset, params) {
lib.has_field(params, "assetType")
params.assetType == asset.asset_type
}
check_asset_type(asset, params) {
lib.has_field(params, "assetType") == false
}
is_included(include_list, asset_name) {
include_list != []
glob.match(include_list[_], ["/"], asset_name)
}
is_included(include_list, asset_name) {
include_list == []
}
# If the member in constraint is written as a single "*", turn it into super
# glob "**". Otherwise, we won't be able to match everything.
config_pattern(old_pattern) = "**" {
old_pattern == "*"
}
config_pattern(old_pattern) = old_pattern {
old_pattern != "*"
}
#ENDINLINE