no-public-access
Explanation
Using 'allAuthenticatedUsers' provides any GCP user - even those outside of your organisation - access to your BigQuery dataset.
Possible Impact
Exposure of sensitive data to the public iniernet
Suggested Resolution
Configure access permissions with higher granularity
Insecure Example
The following example will fail the google-bigquery-no-public-access check.
resource "google_bigquery_dataset" "bad_example" {
dataset_id = "example_dataset"
friendly_name = "test"
description = "This is a test description"
location = "EU"
default_table_expiration_ms = 3600000
labels = {
env = "default"
}
access {
role = "OWNER"
special_group = "allAuthenticatedUsers"
}
access {
role = "READER"
domain = "hashicorp.com"
}
}
Secure Example
The following example will pass the google-bigquery-no-public-access check.
resource "google_bigquery_dataset" "good_example" {
dataset_id = "example_dataset"
friendly_name = "test"
description = "This is a test description"
location = "EU"
default_table_expiration_ms = 3600000
labels = {
env = "default"
}
access {
role = "OWNER"
user_by_email = google_service_account.bqowner.email
}
access {
role = "READER"
domain = "hashicorp.com"
}
}
resource "google_service_account" "bqowner" {
account_id = "bqowner"
}