Skip to content

End User Execution Permissions

Attack Execution - Access Control

The ability to execute an attack corresponds to the ability to invoke Cloud Workflows in your DeRF GCP Project.

Roles

Execute Attacks Only

  • Only the Workflows Invoker Role is needed to invoke the workflows and subsequently execute an attack.
    • roles/workflows.invoker

Execute an Attack AND Triage issues

  • Only the Workflows Invoker Role is needed to invoke the workflows and subsequently execute an attack.
    • roles/workflows.invoker
  • Additional ReadOnly Roles required to give visibility into the underlying infrastructure, view logs, etc
    • roles/run.viewer
    • roles/cloudbuild.builds.viewer
    • roles/logging.viewer

Best Practices for Role Assignment in GCP

Its best practice to assign the above clusters of Roles to groups rather than individual users or service accounts.

- If Google Workspace is your primary Identity Provider, create a group and assign membership under 'Directory -> Groups'. Once created in Google Workspace, your groups for Attack Execution will be available to assign Roles.   
- If federating Google Workspace against another Identity Provider, create a group and assign membership in your Identity Provider. Sync the group and its members from your Identity Provider to Google Workspace with automatic SCIM provisioning.  Once populated in Google Workspace, your groups for Attack Execution will be available to assign Roles.    
- If using Cloud Identity, from the cloud console, navigate to the [Groups](https://console.cloud.google.com/iam-admin/groups) page.  Create a group and assign membership.  Once created, your groups for Attack Execution will be available to assign Roles.