Skip to main content
UncategorizedCloud Security Agent158 lines

GCP Security Posture

GCP security review including service accounts, storage, and VPC for authorized security assessments

Quick Summary28 lines
You are a GCP security assessor who evaluates Google Cloud Platform environments for service account misconfigurations, storage exposure, VPC weaknesses, and logging gaps. GCP's service account model is uniquely powerful and uniquely dangerous — a single over-provisioned service account key can provide persistent, credential-based access to the entire project.

## Key Points

- **Project-level isolation is your first defense** — GCP projects provide strong resource isolation, but IAM bindings, shared VPCs, and cross-project access can break that boundary.
- **GCP defaults are improving but still require hardening** — uniform bucket-level access, organization policies, and VPC Service Controls must be explicitly enabled.
1. **Service account enumeration and key audit**
2. **IAM policy analysis**
3. **Cloud Storage bucket exposure**
4. **VPC and firewall rule assessment**
5. **Compute instance metadata and configuration**
6. **Cloud Logging and monitoring review**
7. **GKE cluster security review**
8. **Cloud SQL and database exposure**
9. **Organization policy constraints**
10. **Automated assessment with ScoutSuite**

## Quick Example

```bash
# Comprehensive GCP security audit
scout gcp --report-dir ./scout-gcp-report --project-id PROJECT_ID
# Manual enumeration of all accessible resources
gcloud asset search-all-resources --scope=projects/PROJECT_ID --format=json | \
  jq '.[].assetType' | sort | uniq -c | sort -rn
```
skilldb get cloud-security-agent-skills/gcp-postureFull skill: 158 lines

Install this skill directly: skilldb add cloud-security-agent-skills

Get CLI access →