This section includes everything that is outside of the source code but is still critical to the security of the product that is being created. Because the issues covered by this kingdom are not directly related to source code, we separated it from the rest of the kingdoms.
service_account
block is missing.
resource "google_compute_instance" "instance-demo" {
name = "name-demo"
machine_type = "e2-micro"
boot_disk {
...
}
network_interface {
...
}
}
can_ip_forward
to true
.
resource "google_compute_instance" "compute_instance_demo" {
...
can_ip_forward = true
...
}
enable_confidential_compute
to false
.
resource "google_compute_instance" "default" {
...
confidential_instance_config {
enable_confidential_compute = false
}
...
}
disk_encryption_key
block is missing so there is no CSEK to protect the data encryption keys.
resource "google_compute_disk" "compute-disk-demo" {
name = "test-disk"
type = "pd-ssd"
}
block-project-ssh-keys
to false
in the metadata
argument.
resource "google_compute_instance" "compute_instance_demo" {
...
metadata = {
block-project-ssh-keys = false
...
}
...
}
serial-port-enable
to true
in the metadata
argument.
resource "google_compute_instance" "compute_instance_demo" {
...
metadata = {
serial-port-enable = true
...
}
...
}
enable_integrity_monitoring
to false
in the shielded_instance_config
block. Not all recommended Shield VM options are enabled.
resource "google_compute_instance" "compute_instance_demo" {
...
shielded_instance_config {
enable_integrity_monitoring = false
enable_secure_boot = true
enable_vtpm = true
}
...
}
https_redirect
to false
.
resource "google_network_services_edge_cache_service" "srv_demo" {
...
routing {
...
path_matcher {
...
route_rule {
...
url_redirect {
https_redirect = false
}
}
}
}
}
master_authorized_networks_config
block. As a result, the GKE control plane API endpoints are publicly accessible.
resource "google_container_cluster" "cluster_demo" {
name = "name-demo"
}
issue_client_certificate
to true
in the master_auth
block.
resource "google_container_cluster" "container_cluster_demo" {
...
master_auth {
client_certificate_config {
issue_client_certificate = true
...
}
...
}
...
}
username
and password
to non-empty values in the master_auth
block.
resource "google_container_cluster" "container_cluster_demo" {
...
master_auth {
username = "foo"
password = "bar"
}
...
}
enable_legacy_abac
to true
.
resource "google_container_cluster" "container_cluster_demo" {
...
enable_legacy_abac = true
...
}
auto_repair
to false
in the management
block.
resource "google_container_node_pool" "node-pool-demo" {
...
management {
auto_repair = false
...
}
...
}
enable_private_nodes
and enable_private_endpoint
are set to false
.
resource "google_container_cluster" "cluster-demo" {
...
private_cluster_config {
enable_private_endpoint = false
enable_private_nodes = false
}
...
}
image_type
is set to a non-COS image in the node_config
block.
resource "google_container_node_pool" "node_pool_demo" {
...
node_config {
image_type = "UBUNTU"
...
}
...
}
auto_upgrade
to false
in the management
block.
resource "google_container_node_pool" "node_pool_demo" {
...
management {
auto_upgrade = false
...
}
...
}
auto_create_network
to true
.
resource "google_project" "project-demo" {
...
auto_create_network = true
...
}
cloud-platform
, which allows access to most of the Google Cloud APIs. This greatly expands the attack surface accessible to any compromised Compute Engine instance and violates the least privilege principle.scopes
) of the service account to cloud-platform
.
resource "google_compute_instance" "compute-instance-demo" {
name = "name-demo"
machine_type = "e2-micro"
...
service_account {
email = "foobar.service.account@example.com"
scopes = ["cloud-platform"]
}
}
ssl_settings
block for the domain named example.com
. As a result, the custom domain for the App Engine application does not support HTTPS.
resource "google_app_engine_domain_mapping" "domain_mapping" {
domain_name = "example.com"
}