Securing access to resources with IAM
Kubernetes users and service accounts need permissions to manage Config Connector resources. With Config Connector, your project's control plane can be managed by identities that use Kubernetes Role-Based Access Control (RBAC). You can also reference Identity and Access Management (IAM) Policies.
Resources that can reference IAMPolicy and IAMPolicyMember are listed in the Resource reference. These resources have the property "Can Be Referenced by IAMPolicy/IAMPolicyMember".
This topic explains how to secure access to Google Cloud resources using Identity and Access Management.
Before you begin
Install Config Connector on your cluster.
Securing control plane access with RBAC
In this example, you will create a service account and grant it permissions to
manage a PubSubTopic. This service account cannot manage other types of
Config Connector resources.
Create a file named
pubsub-topic-service-account.yamlwith the following contents:apiVersion: v1 kind: ServiceAccount metadata: name: pubsub-topic-service-account namespace: defaultApply this to create the
pubsub-topic-service-accountservice account:kubectl apply -f pubsub-topic-service-account.yaml --namespace CC_NAMESPACE
Replace
CC_NAMESPACEwith the namespace Config Connector manages resources from.Confirm
pubsub-topic-service-accountcannot createPubSubTopicresources by verifying the output of the following command containsno:kubectl auth can-i get pubsubtopics --as=system:serviceaccount:default:pubsub-topic-service-account
Next, create a
ClusterRolethat allows Pub/Sub topic creation.The ClusterRole can only manage resources that have values specified in
rules.apiGroupsandrules.resources. To find values forapiGroupsandresources, see the reference for your resources.Create a file named
pubsub-topic-editor-role.yamlwith the following contents:apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: creationTimestamp: null name: pubsub-topic-editor rules: - apiGroups: - pubsub.cnrm.cloud.google.com resources: - pubsubtopics verbs: - get - list - watch - create - update - patch - deleteApply
pubsub-topic-editor.yamlto create theClusterRole:kubectl apply -f pubsub-topic-editor-role.yaml --namespace CC_NAMESPACE
Replace
CC_NAMESPACEwith the namespace Config Connector manages resources from.Next, create a RoleBinding between the ClusterRole and your service account. Create a file named
pubsub-topic-editor-rolebinding.yamlwith the following contents:apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: name: pubsub-topic-editor-rolebinding. subjects: - kind: ServiceAccount name: pubsub-topic-service-account roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: pubsub-topic-editorApply
pubsub-topic-editor-rolebinding.yamlto your cluster.kubectl apply -f pubsub-topic-editor-rolebinding.yaml --namespace CC_NAMESPACE
Replace
CC_NAMESPACEwith the namespace Config Connector manages resources from.Confirm the
pubsub-topic-service-accountis allowed to createPubSubTopicresources by confirming the output of the following command isyes:kubectl auth can-i get pubsubtopics \ --as=system:serviceaccount:default:pubsub-topic-service-account
Cleaning up
Use kubectl delete to remove the Service Account, IAM Role and
Rolebinding.
kubectl delete -f pubsub-topic-editor-rolebinding.yaml --namespace CC_NAMESPACE
kubectl delete -f pubsub-topic-editor-role.yaml --namespace CC_NAMESPACE
kubectl delete -f pubsub-topic-service-account.yaml --namespace CC_NAMESPACE
Replace CC_NAMESPACE with the namespace Config Connector
manages resources from.
Securing the data plane with IAM Policies
In this example, you use the permissions granted earlier to create a
PubSubTopic and limit access to it with an IAMPolicyMember resource.
Create a file named
pubsub-topic-sample.yamlwith the following content:apiVersion: pubsub.cnrm.cloud.google.com/v1beta1 kind: PubSubTopic metadata: name: pubsubtopic-sampleApply
pubsub-topic-sample.yamlwithkubectl:kubectl apply -f pubsub-topic-sample.yaml --namespace CC_NAMESPACE
Replace
CC_NAMESPACEwith the namespace Config Connector manages resources from.Create a file named
iampolicymember.yamlwith the following content, replacingEMAIL_ADDRESSwith your Google Cloud account's email address:apiVersion: iam.cnrm.cloud.google.com/v1beta1 kind: IAMPolicyMember metadata: name: iampolicymember-sample spec: resourceRef: apiVersion: pubsub.cnrm.cloud.google.com/v1beta1 kind: PubSubTopic name: pubsubtopic-sample role: roles/pubsub.admin member: "user:EMAIL_ADDRESS"Apply the
iampolicymember.yaml.kubectl apply -f iampolicymember.yaml --namespace CC_NAMESPACE
Replace
CC_NAMESPACEwith the namespace Config Connector manages resources from.Confirm the policy has been applied to Google Cloud by running this command and looking for your email address in the output, replacing
PROJECT_IDwith your project ID:gcloud beta pubsub topics get-iam-policy projects/PROJECT_ID/topics/pubsubtopic-sample
Access to your Pub/Sub topics is now protected with an IAMPolicyMember.
Cleaning up
Use kubectl delete to remove the Pub/Sub topic and IAMPolicyMember
from your Google Cloud Project.
kubectl delete -f iampolicymember.yaml --namespace CC_NAMESPACE
kubectl delete -f pubsub-topic-sample.yaml --namespace CC_NAMESPACE
What's next
Use Secrets to pass information securely to Google Cloud resources.