This image has an empty alt attribute; its file name is cpIyQ5AgpOquJfixKFjsvLF3ySKVi9JYmPVqZodzTAQljU6hZt5xn9p64F74W1AmOUDNfk5LOaIEzRi5as4aaZZf9JLK_9Alb_-OtWNvRlHDxmTovgxkamPnvkXzD9q5JpHJy-fl
Last Updated01 March 2022
Document Tagtch-research-next-gen-authz
Authorsimonm@thecyberhut.com
Part of Research ProductNext Generation Authorization Technology

Google Cloud Platform (GCP) break their security and identity capabilities into three categories:

Security, Identity and User Protection Service.

From an Identity perspective the following products and features are available:

ProductFeatures
BeyondCorp EnterpriseScalable zero trust platform with integrated threat and data protection.
Certificate Authority ServiceSimplify the deployment and management of private CAs.
Cloud IdentityUnified platform for IT admins to manage user devices and apps.
Identity and Access ManagementPermissions management system for Google Cloud resources.
Identity-Aware ProxyUse identity and context to guard access to your applications and VMs.
Identity PlatformAdd Google-grade identity and access management to your apps.
Managed Service for Microsoft Active DirectoryHardened service running Microsoft® Active Directory (AD).
Policy IntelligenceSmart access control for your Google Cloud resources.v
Resource ManagerHierarchical management for organizing resources on Google Cloud.
Titan Security KeyTwo-factor authentication device for user account protection.

All GCP product release notes are listed here.

The following are specific GCP IAM related updates with an authorization related component:

DateFeatureDetails
Dec 2021Improved Selected for Pre-Defined RolesIdentity and Access Management (IAM) provides multiple predefined roles for most Google Cloud services. Each predefined role contains the permissions that are needed to perform a task, or a group of related tasks.
Oct 2021Improved Credential Access Boundaries for OAuth2 Access TokensTo downscope permissions, you define a Credential Access Boundary that specifies which resources the short-lived credential can access, as well as an upper bound on the permissions that are available on each resource. You can then create a short-lived credential, then exchange it for a new credential that respects the Credential Access Boundary.
Oct 2021Lateral Movement InsightsIn addition to providing recommendations, Recommender uses machine learning (ML) to provide detailed insights. Insights are findings that highlight notable patterns in resource usage. For example, you can collect additional information about permission usage in your project, or identify unused service accounts. 
Sept 2021Role Recommendations Generally AvailableRole recommendations help you identify and remove excess permissions from your principals, improving your resources’ security configurations.
April 2021Policy Simulator Now AvailablePolicy Simulator lets you see how an IAM policy change might impact a principal’s access before you commit to making the change. You can use Policy Simulator to ensure that the changes you’re making won’t cause a principal to lose access that they need.
Feb 2021Limit Which Roles Sub-Admins Can AssignIn large organizations, it can be helpful to let teams independently manage the Identity and Access Management (IAM) policies for their resources. However, letting a principal grant or revoke all IAM roles can greatly increase your security risk.
Feb 2020IAM Conditions Now Generally AvailableWith IAM Conditions, you can choose to grant access to principals only if specified conditions are met. For example, you could grant temporary access to users so they can resolve a production issue, or you could grant access only to employees making requests from your corporate office.
Feb 2020IAM Recommender is Now Generally AvailableRole recommendations are one of the types of recommendations that Recommender generates.Each role recommendation suggests that you remove or replace a role that gives your principals excess permissions. At scale, these recommendations help you enforce the principle of least privilege by ensuring that principals have only the permissions that they actually need.

The following are GCP Cloud Identity Aware Proxy related updates with an authorization related component:

DateFeatureDetails
Feb 2020Programmatically Create OAuth2 Clients OAuth clients created by the API can only be modified by using the API. You cannot modify an OAuth client via the Cloud Console if you create it by using the API.Only 500 OAuth clients are allowed per project when using the API.
April 2019Context Aware Access Now Generally AvailableWith IAM Conditions, you can choose to grant access to principals only if specified conditions are met. For example, you could grant temporary access to users so they can resolve a production issue, or you could grant access only to employees making requests from your corporate office.

Categories:

Signup for New Content Updates