May 17, 2022, 4:50 p.m. | Lior Zatlavi

Security Boulevard securityboulevard.com

Some Google-managed service accounts are binded by default to a role granting access to storage.objects.read. This hidden risk is (yet another) great reason to use customer-managed KMS keys to encrypt your sensitive data stored in buckets.


The post Hidden Risk in the Default Roles of Google-Managed Service Accounts appeared first on Ermetic.


The post Hidden Risk in the Default Roles of Google-Managed Service Accounts appeared first on Security Boulevard.

accounts gcp google hidden managed risk roles service

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

EY GDS Internship Program - SAP, Cyber, IT Consultant or Finance Talents with German language

@ EY | Wrocław, DS, PL, 50-086

Security Architect - 100% Remote (REF1604S)

@ Citizant | Chantilly, VA, United States

Network Security Engineer - Firewall admin (f/m/d)

@ Deutsche Börse | Prague, CZ

Junior Cyber Solutions Consultant

@ Dionach | Glasgow, Scotland, United Kingdom

Senior Software Engineer (Cryptography), Bitkey

@ Block | New York City, United States