What permissions are needed for the user of the storage of Google Cloud?
Introduction:
This knowledge base article provides information on what roles the user that maps the Google Cloud Storage should be.
Permissions Overview
For MDSS to operate correctly when integrating with Google Cloud Storage, the user account must have sufficient privileges. The documentation initially recommends that the user be granted the Owner role. This role provides comprehensive permissions across the Google Cloud project, including the ability to:
- Create, modify, and delete buckets and objects
- Configure access controls and security settings
- Manage project resources and billing
Important Note: While granting the Owner role ensures all necessary permissions are available, it is generally best practice to adhere to the principle of least privilege. In cases where only storage operations are required, consider using more specific roles such as:
- Storage Admin (roles/storage.admin): Grants full control over Cloud Storage resources without broader project permissions.
- Storage Object Admin (roles/storage.objectAdmin): Provides full control over objects in the storage buckets while limiting administrative capabilities on bucket settings.
Select the role based on the required functionality and security guidelines of your organization.
Detailed Configuration Steps
1. Evaluating Requirements
- Assess MDSS Needs: Determine if MDSS requires full project management capabilities or just access to storage resources. For most scenarios where the sole purpose is mapping storage, the Storage Admin role may suffice.
- Review Security Policies: Consult your organization's IT and security policies to ensure compliance with role assignments and the principle of least privilege.
2. Assigning Permissions via the Google Cloud Console
Log into the Google Cloud Console: Access your Google Cloud project.
Navigate to IAM & Admin: Select “IAM & Admin” from the navigation menu.
Locate the User Account: Find the user account that MDSS will use for mapping the storage.
Assign the Appropriate Role:
- For comprehensive permissions, assign the Owner role.
- Alternatively, assign Storage Admin or Storage Object Admin if full project permissions are not required.
Save Changes: Confirm and save the changes to update the permissions.
3. Verifying Permissions
- Test Storage Access: Use MDSS to perform operations such as creating, reading, updating, and deleting objects to verify that the assigned role meets the required functionality.
- Audit Logs: Regularly review the Cloud Audit Logs to ensure no unintended or unauthorized actions are performed.
Additional Considerations
- Security Best Practices: Always follow the principle of least privilege. Grant only the permissions that are necessary for the MDSS operations to minimize security risks.
- Periodic Review: Regularly review IAM roles and permissions in your Google Cloud project. Reassess whether the granted permissions still match the operational requirements of MDSS.
- Role Customization: If none of the predefined roles align with your needs, consider creating a custom role that aggregates only the required permissions for storage mapping. This approach can offer a more tailored security posture while meeting functional requirements.
Conclusion
Mapping Google Cloud Storage for MDSS requires careful consideration of the permissions assigned to the user account. While the initial recommendation is to use the Owner role, assessing the operational needs and following best security practices might suggest using more limited roles such as Storage Admin. By following the configuration steps and periodic reviews outlined in this article, you can ensure both functionality and security in your MDSS deployment.
If Further Assistance is required, please proceed to log a support case or chatting with our support engineer.