This document includes the best practices and guidelines for Identity and Access Management (IAM) when running generative AI workloads on Google Cloud. Use IAM with Vertex AI to controls who can perform specific actions on your generative workload resources, such as creating, editing, or deleting them.
Required IAM controls
The following controls are strongly recommended when using IAM.
Disable automatic Identity and Access Management (IAM) grants for default service accounts
| Google control ID | IAM-CO-4.1 |
|---|---|
| Category | Required |
| Description | Use the |
| Applicable products |
|
| Path | constraints/iam.automaticIamGrantsForDefaultServiceAccounts |
| Operator | Is |
| Value |
|
| Type | Boolean |
| Related NIST-800-53 controls |
|
| Related CRI profile controls |
|
| Related information |
Block the creation of external service account keys
| Google control ID | IAM-CO-4.2 |
|---|---|
| Category | Required |
| Description | Use the |
| Applicable products |
|
| Path | constraints/iam.disableServiceAccountKeyCreation |
| Operator | Is |
| Value |
|
| Type | Boolean |
| Related NIST-800-53 controls |
|
| Related CRI profile controls |
|
| Related information |
Block service account key uploads
| Google control ID | IAM-CO-4.3 |
|---|---|
| Category | Required |
| Description | Use the |
| Applicable products |
|
| Path | constraints/iam.disableServiceAccountKeyUpload |
| Operator | Is |
| Value |
|
| Type | Boolean |
| Related NIST-800-53 controls |
|
| Related CRI profile controls |
|
| Related information |
Recommended controls based on generative AI use case
Depending on your use cases around generative AI, you might require additional IAM controls.
Implement tags to efficiently assign Identity and Access Management (IAM) policies and organization policies
| Google control ID | IAM-CO-6.1 |
|---|---|
| Category | Recommended |
| Description | Tags provide a way to create annotations for resources, and in some cases conditionally allow or deny policies based on whether a resource has a specific tag. Use tags and conditional policy enforcement for fine-grained control across your resource hierarchy. |
| Applicable products |
|
| Related NIST-800-53 controls |
|
| Related CRI profile controls |
|
| Related information |
Audit high-risk changes to Identity and Access Management (IAM)
| Google control ID | IAM-CO-7.1 |
|---|---|
| Category | Recommended |
| Description | Use Cloud Audit Logs to monitor for high-risk activity, such as accounts being granted high-risk roles like Organization Admin and Super Admin. Set up alerts for this type of activity. |
| Applicable products |
|
| Related NIST-800-53 controls |
|
| Related CRI profile controls |
|
| Related information |
Optional common controls
You can optionally implement the following controls based on your organization's requirements.
Configure Context-Aware Access for Google consoles
| Google control ID | IAM-CO-8.2 |
|---|---|
| Category | Optional |
| Description | With Context-Aware Access, you can create granular access control security policies for applications based on attributes such as user identity, location, device security status, and IP address. We recommend that you use Context-Aware Access to restrict access to the the Google Cloud console (https://console.cloud.google.com/) and the Google Admin console (https://admin.cloud.google.com). |
| Applicable products |
|
| Related NIST-800-53 controls |
|
| Related CRI profile controls |
|
| Related information |