Which Service Account Permissions are required when onboarding GCP Organizations and Projects into Prisma Cloud?

Which Service Account Permissions are required when onboarding GCP Organizations and Projects into Prisma Cloud?

2183
Created On 09/15/23 08:33 AM - Last Modified 07/14/25 21:25 PM


Question


Which Service Account Permissions are required when onboarding GCP Organizations and Projects into Prisma Cloud?

Environment


  • Prisma Cloud Enterprise Edition (SaaS)
  • GCP
  • Service Account Permissions


Answer


When onboarding a GCP Organization or Project into Prisma Cloud, is necessary to add certain permissions to our Service Account, in order for Prisma Cloud can ingest data and allow the capabilities such as Security Capabilities and Permissions and Additional Capabilities.



image.png

The permissions that the Prisma Cloud service account needs to monitor your GCP resources depend on your cloud protection needs:

  • If you are onboarding a GCP organization , you must assign the roles to the IAM policy for the organization.

  • If you are onboarding a GCP project , you must assign the roles to the IAM policy for each project.

  • If you are using a master service account (MSA), you have two options:

    • (Recommended) Add permissions to the IAM policy for the organization.

    • Assign the roles to the IAM policy for each project individually

The roles for read or read-write access permission that the service account requires are:
 

  • Viewer—Primitive role on GCP.


image.png
 

  • Prisma Cloud Viewer—Custom role. Prisma Cloud needs this custom role to grant cloud storage bucket permission to read storage bucket metadata and update bucket IAM policies. This role requires storage.buckets.get to retrieve your list of storage buckets, and storage.buckets.getIampolicy to retrieve the IAM policy for the specified bucket.
    • For the case you can not executed the terraform script that will create the custom role with the necesarry permissions. Alternatively you can create a YAML file and add the granular permissions for the custom role.
    • Use this YAML format as an example. You must add the permissions for onboarding your GCP organization or project, from the link above, to this file:
title: prisma-custom-role 
description: prisma-custom-role 
stage: beta 
includedPermissions: 
- compute.networks.list 
- compute.backendServices.list
.
.
.
  • Compute Security Admin—Predefined role on GCP. An optional privilege that is required only if you want to enable auto-remediation.


image.png

  • Organization Role Viewer—Predefined role on GCP. This role is required for onboarding a GCP Organization.

image.png

  • Dataflow Admin—Predefined role on GCP. An optional privilege that is required for dataflow logs compression using the Dataflow service. See Flow Logs Compression on GCP for details.

image.png

  • Folder Viewer—Predefined role on GCP. An optional privilege that is required only if you want to onboard GCP Folder metadata, select specific folders (include or exclude folders), and to automatically create account groups based on the folder hierarchy.

image.png

 


Additional Information




Actions
  • Print
  • Copy Link

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000XgVoCAK&lang=en_US&refURL=http%3A%2F%2Fknowledgebase.paloaltonetworks.com%2FKCSArticleDetail&refURL=http%3A%2F%2Fknowledgebase.paloaltonetworks.com%2FKCSArticleDetail

Choose Language