Skip to content
Discussion options

You must be logged in to vote

Hi @NetaHa!
Yes, this is by design.
The check kms_key_not_publicly_accessible exists for both AWS and GCP in Prowler, but each implementation is specific to its respective cloud provider:
For AWS, the check evaluates AWS KMS key policies to ensure that no keys are publicly accessible (for example, by having a policy that allows "Principal": "*" without proper conditions).

For GCP, the check looks at Cloud KMS CryptoKey IAM policies to ensure that no keys are accessible to allUsers or allAuthenticatedUsers, which would make them public.

While both checks share the same ID and a similar security goal (ensuring KMS keys are not publicly accessible), they are implemented separately for each p…

Replies: 1 comment

Comment options

You must be logged in to vote
0 replies
Answer selected by NetaHa
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Category
Q&A
Labels
None yet
2 participants