policy-library/policies/templates/gcp_iam_required_bindings_v1.yaml (94 lines of code) (raw):
# Copyright 2021 Google LLC
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
apiVersion: templates.gatekeeper.sh/v1alpha1
kind: ConstraintTemplate
metadata:
name: gcp-iam-required-bindings-v1
spec:
crd:
spec:
names:
kind: GCPIAMRequiredBindingsConstraintV1
validation:
openAPIV3Schema:
properties:
assetType:
description: "Restrict which asset type this policy applies to. E.g.
cloudresourcemanager.googleapis.com/Project would restrict to only
Project resources"
type: string
assetNames:
description: "CAI name of asset to restrict which specific assets this
policy applies to. assetNames must have the same assetType defined
above. E.g. '//cloudresourcemanager.googleapis.com/projects/project-123'"
type: array
items:
type: string
role:
description: "Role to restrict bindings for. Wildcards (*) supported.
E.g. roles/owner would only look at bindings for the owner role. E.g.
roles/* would look at all roles available."
type: string
members:
description: "Members that are required for the given role. This can
be specific users, groups, or domains. Wildcards (*) supported. E.g.
'user:*@google.com' would generate violations if there were no users
with domain @google.com. E.g. 'group:*@google.com' would generate
violations if there were no groups with domain @google.com. E.g. 'user:myuser111@google.com'
would generate violations if user:myuser111@google.com does not exist."
type: array
items:
type: string
targets:
validation.gcp.forsetisecurity.org:
rego: |
#
# Copyright 2021 Google LLC
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
#
package templates.gcp.GCPIAMRequiredBindingsConstraintV1
import data.validator.gcp.lib as lib
deny[{
"msg": message,
"details": metadata,
}] {
constraint := input.constraint
lib.get_constraint_params(constraint, params)
asset := input.asset
check_asset_type(asset, params)
# Check if resource is part of asset names to scan
include_list := lib.get_default(params, "assetNames", [])
is_included(include_list, asset.name)
binding := asset.iam_policy.bindings[_]
role := binding.role
params_member := params.members[_]
glob.match(params.role, ["/"], role)
no_matches_found := no_required_match(params_member, binding)
message := sprintf("Required IAM policy member %v is absent in resource %v for role %v", [params_member, asset.name, role])
metadata := {
"resource": asset.name,
"required_member": params_member,
"role": role,
}
}
###########################
# Rule Utilities
###########################
# Determine whether the required member is present
no_required_match(params_member, binding) {
matches_found := [is_required |
m := config_pattern(params_member)
is_required := glob.match(m, [], binding.members[_])
]
any_required := any(matches_found)
not any_required
}
check_asset_type(asset, params) {
lib.has_field(params, "assetType")
params.assetType == asset.asset_type
}
check_asset_type(asset, params) {
lib.has_field(params, "assetType") == false
}
is_included(include_list, asset_name) {
include_list != []
glob.match(include_list[_], ["/"], asset_name)
}
is_included(include_list, asset_name) {
include_list == []
}
# If the member in constraint is written as a single "*", turn it into super
# glob "**". Otherwise, we won't be able to match everything.
config_pattern(old_pattern) = "**" {
old_pattern == "*"
}
config_pattern(old_pattern) = old_pattern {
old_pattern != "*"
}
#ENDINLINE