How to resolve Sprinto check to ensure GCP KMS crypto keys are not anonymously or publicly accessible
About:
Purpose:
How to fix this check:
Before you begin
Updating via GCP Cloud CLI

gcloud kms keys list --keyring=[key_ring_name] --location=global --format=json | jq '.[].name'gcloud kms keys remove-iam-policy-binding [key_name] --keyring=[key_ring_name] --location=global --member='allAuthenticatedUsers' –role='[role]' gcloud kms keys remove-iam-policy-binding [key_name] -- keyring=[key_ring_name] --location=global --member='allUsers' --role='[role]'
PreviousHow to resolve Sprinto check to enable SSL connection enforcement for standard MySQL Database serverNextHow to resolve Sprinto check to set the rotation period to be less than 90 days for GCP KMS encryption keys
Last updated

