Skip to content

Commit

Permalink
feat: add policyanalyzer.activityAnalysisViewer
Browse files Browse the repository at this point in the history
This role permits gcp-cfg-collector to gather additional service account key context (specifically recent usage)

PSP-2485
  • Loading branch information
hazedav committed Jul 17, 2024
1 parent 2e52c0a commit a828b26
Show file tree
Hide file tree
Showing 2 changed files with 6 additions and 2 deletions.
1 change: 1 addition & 0 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -21,6 +21,7 @@ e.g. `terraform state rm 'google_project_iam_binding.for_lacework_service_accoun
roles/browser
roles/iam.securityReviewer
roles/cloudasset.viewer
roles/policyanalyzer.activityAnalysisViewer
```

The following custom role is required depending on the integration level.
Expand Down
7 changes: 5 additions & 2 deletions main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -23,13 +23,15 @@ locals {
default_project_roles = local.skip_iam_grants ? [] : [
"roles/browser",
"roles/iam.securityReviewer",
"roles/cloudasset.viewer"
"roles/cloudasset.viewer",
"roles/policyanalyzer.activityAnalysisViewer"
]

default_organization_roles = local.skip_iam_grants ? [] : [
"roles/browser",
"roles/iam.securityReviewer",
"roles/cloudasset.viewer"
"roles/cloudasset.viewer",
"roles/policyanalyzer.activityAnalysisViewer"
]

// if org_integration is false, project_roles = local.default_project_roles
Expand All @@ -54,6 +56,7 @@ locals {
"roles/browser",
"roles/iam.securityReviewer",
"roles/cloudasset.viewer",
"roles/policyanalyzer.activityAnalysisViewer",
google_organization_iam_custom_role.lacework_custom_organization_role.0.name
]
) : (
Expand Down

0 comments on commit a828b26

Please sign in to comment.