google_kms_crypto_key_iam_bindings
This resource is deprecated. Please use googlekmscryptokeyiam_policy instead
Use the google_kms_crypto_key_iam_bindings
InSpec audit resource to test properties of all, or a filtered group of, GCP KMS Crypto Key IAM Bindings.
Syntax
A google_kms_crypto_key_iam_bindings
resource block collects GCP KMS Crypto Key IAM Bindings then tests that group.
describe google_kms_crypto_key_iam_bindings(crypto_key_url: 'projects/project/locations/europe-west2/keyRings/key-ring/cryptoKeys/key-name') do
it { should exist }
end
Use this InSpec resource to enumerate roles then test in-depth using google_kms_key_ring_iam_binding
.
google_kms_crypto_key_iam_bindings(crypto_key_url: 'projects/project/locations/europe-west2/keyRings/key-ring/cryptoKeys/key-name').iam_binding_roles.each do |iam_binding_role|
describe google_kms_crypto_key_iam_binding(crypto_key_url: 'projects/project/locations/europe-west2/keyRings/key-ring/cryptoKeys/key-name', role: "roles/owner") do
it { should exist }
its('members') {should include 'user:someuser@domain.com' }
end
end
Examples
The following examples show how to use this InSpec audit resource.
Test that there are no more than a specified number of IAM bindings roles available for the crypto key
describe google_kms_crypto_key_iam_bindings(crypto_key_url: 'projects/project/locations/europe-west2/keyRings/key-ring/cryptoKeys/key-name') do
its('count') { should be <= 100}
end
Test that an expected IAM binding is available for the crypto key
describe google_kms_crypto_key_iam_bindings(crypto_key_url: 'projects/project/locations/europe-west2/keyRings/key-ring/cryptoKeys/key-name') do
its('iam_binding_roles') { should include "roles/storage.admin" }
end
Test that a particular role does not exist using filtering of the plural resource
describe google_kms_crypto_key_iam_bindings(crypto_key_url: 'projects/project/locations/europe-west2/keyRings/key-ring/cryptoKeys/key-name').where(iam_binding_role: "roles/iam.securityReviewer") do
it { should_not exist }
end
Filter Criteria
This resource supports the following filter criteria: iam_binding_role
. This may be used with where
, as a block or as a method.
Properties
-
iam_binding_roles
- an array of googlekmscryptokeyiam_binding role strings e.g.["roles/compute.admin", "roles/owner"]
GCP Permissions
Ensure the Cloud Key Management Service (KMS) API is enabled for the project where the resource is located.s