Assigned
Status Update
Comments
ka...@google.com <ka...@google.com>
ka...@google.com <ka...@google.com> #2
Thanks for the report. I will route this to the appropriate internal team and update this when I hear back from them.
Description
Please provide as much information as possible. At least, this should include a description of your issue and steps to reproduce the problem. If possible please provide a summary of what steps or workarounds you have already tried, and any docs or articles you found (un)helpful.
Problem you have encountered: We would like to know Is there a possibility of denying use of all or a few specific KMS keys’ (inside a GCP project) to most of the IAM principals (not all) who’ve the appropriate permissions already (via inheritance) from higher levels in the resource hierarchy? As per my understanding below are the permissions required to encrypt/decrypt data using a KMS key:
cloudkms.cryptoKeyVersions.useToDecrypt
cloudkms.cryptoKeyVersions.useToEncrypt
which, unfortunately, don’t seem to be supported by deny policies -
What you expected to happen:Add support for cloudkms.cryptoKeyVersions.useToDecrypt and cloudkms.cryptoKeyVersions.useToEncrypt permissions in IAM Deny policies.