Primer on Google Cloud Platform IAM

Having worked with AWS IAM, I have always wanted to understand how other cloud providers design their IAM.

Google Cloud Platform (GCP) uses RBAC extensively.

There are a few types of principals, i.e. users. These are primarily:

Resources are any cloud resources that you create on GCP, for instance, a Compute Engine VM, a Pub/Sub topic, etc.

Permissions are attached to roles and never to principals. The permissions dictate the allowed actions on resources.

A principal is then associated with a role, and this role binding is called an IAM policy. Yes, it can be perplexing if you are coming from AWS.

In a linear flow:

  1. A principal, via IAM policy,
  2. is attached to a role, which, via permissions,
  3. decides permitted actions on resources.

There is a hierarchy in GCP:

-- Folder
   -- Project
      -- Resources

If a role is attached to a principal on a higher level, the principal will retain the same permission throughout the lower-level entities and resources.

So, you can attach a Pub/Sub admin role to a principal at the project level, and this principal will have admin access to all the Pub/Sub resources in the same project.

There are two ways to restrict Pub/Sub admin access to only a subset of Pub/Sub resources:

Yes, resources (not all types) can have their specific role binding.

You can attach a least-privilege role to a principal on a higher level and a permissive one on a specific resource. The effective permission on that resource is the union of both.