GoogleCloudPlatform / terraform-google-pam

Deploy Privileged Access Manager
https://registry.terraform.io/modules/GoogleCloudPlatform/pam/google
Apache License 2.0
1 stars 3 forks source link
gcp-iam iam just-in-time-access pam pam-module privilege

Cloud Privileged Access Manager (PAM) Module

This module makes it easy to set up Privileged Access Manager. Privileged Access Manager (PAM) is a Google Cloud native, managed solution to secure, manage and audit privileged access while ensuring operational velocity and developer productivity. PAM enables just-in-time, time-bound, approval-based access elevations, and auditing of privileged access elevations and activity. PAM lets you define the rules of who can access, what they can access, and if they should be granted access with or without approvals based on the sensitivity of the access and emergency of the situation.

Functional examples are included in the examples directory

Usage

# Configure Cloud Privilege Access Management (PAM)
module "entitlement_project" {
  source  = "GoogleCloudPlatform/pam/google"
  version = "~> 2.0"

  entitlement_id                  = "example-entitlement-project"
  parent_id                       = var.project_id
  parent_type                     = "project"
  grant_service_agent_permissions = true

  organization_id = var.org_id

  entitlement_requesters = [
    "serviceAccount:${var.entitlement_requester}",
  ]
  entitlement_approvers = [
    "domain:google.com",
  ]
  role_bindings = [
    {
      role                 = "roles/storage.admin"
      condition_expression = "request.time < timestamp(\"2024-04-23T18:30:00.000Z\")"
    },
    {
      role = "roles/bigquery.admin"
    }
  ]
}

Inputs

Name Description Type Default Required
entitlement_approval_notification_recipients List of email addresses to be notified when a request is granted list(string) [] no
entitlement_approvers Required List of users, groups or domain who can approve this entitlement. Can be one or more of Google Account email, Google Group or Google Workspace domain list(string) n/a yes
entitlement_availability_notification_recipients List of email addresses to be notified when a entitlement is created. These email addresses will receive an email about availability of the entitlement list(string) [] no
entitlement_id The ID to use for this Entitlement. This will become the last part of the resource name. This value should be 4-63 characters. This value should be unique among all other Entitlements under the specified parent string n/a yes
entitlement_requesters Required List of users, groups, service accounts or domains who can request grants using this entitlement. Can be one or more of Google Account email, Google Group, Service account or Google Workspace domain list(string) n/a yes
grant_service_agent_permissions Whether or not to grant roles/privilegedaccessmanager.serviceAgent role to PAM service account bool false no
location The region of the Entitlement resource string "global" no
max_request_duration_hours The maximum amount of time for which access would be granted for a request. A requester can choose to ask for access for less than this duration but never more number 1 no
organization_id Organization id string n/a yes
parent_id The ID of organization, folder, or project to create the entitlement in string n/a yes
parent_type Parent type. Can be organization, folder, or project to create the entitlement in string n/a yes
requester_justification If the requester is required to provide a justification bool true no
require_approver_justification Do the approvers need to provide a justification for their actions bool true no
role_bindings The maximum amount of time for which access would be granted for a request. A requester can choose to ask for access for less than this duration but never more
list(object({
role = string
condition_expression = optional(string)
}))
n/a yes

Outputs

Name Description
entitlement Entitlement created

Requirements

These sections describe requirements for using this module.

Software

The following dependencies must be available:

Service Account and User Permissions

A service account with the following roles must be used to provision the resources of this module:

The [Project Factory module][project-factory-module] and the [IAM module][iam-module] may be used in combination to provision a service account with the necessary roles applied.

APIs

A project with the following APIs enabled must be used to host the resources of this module:

The [Project Factory module][project-factory-module] can be used to provision a project with the necessary APIs enabled.

Contributing

Refer to the contribution guidelines for information on contributing to this module.