You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -52,9 +52,9 @@ For the full documentation please refer to our [wiki](https://github.com/BishopF
52
52
53
53
| Provider| CloudFox Commands |
54
54
| - | - |
55
-
| AWS | 34 |
56
-
| Azure | 4 |
57
-
| GCP |8|
55
+
| AWS | 34 |
56
+
| Azure | 4 |
57
+
| GCP |60|
58
58
| Kubernetes | Support Planned |
59
59
60
60
@@ -106,7 +106,53 @@ Additional policy notes (as of 09/2022):
106
106
|`arn:aws:iam::aws:policy/AdministratorAccess`| This will work just fine with CloudFox, but if you were handed this level of access as a penetration tester, that should probably be a finding in itself :) |
* Recommended permissions at appropriate hierarchy levels (see below)
115
+
116
+
#### GCP Permissions: Minimal vs Comprehensive
117
+
118
+
**Minimal Permissions (Single Project):**
119
+
120
+
For basic enumeration of a single project, the `roles/viewer` role provides read access to most resources (includes logging, monitoring, and compute/network viewing).
For thorough security assessments across an entire organization:
125
+
126
+
| Scope | Role | Purpose |
127
+
| - | - | - |
128
+
|**Organization**|`roles/resourcemanager.organizationViewer`| View organization structure and metadata |
129
+
|**Organization**|`roles/iam.securityReviewer`| Review IAM policies across the organization |
130
+
|**Organization**|`roles/cloudasset.viewer`| Query Cloud Asset Inventory for all resources |
131
+
|**Organization**|`roles/cloudidentity.groupsViewer`| Enumerate Google Groups and memberships |
132
+
|**Folder**|`roles/resourcemanager.folderViewer`| View folder hierarchy and metadata |
133
+
|**Project**|`roles/viewer`| Read access to most project resources (includes logging.viewer, monitoring.viewer, compute.viewer) |
134
+
|**Tooling Project**|`roles/serviceusage.serviceUsageAdmin`| (Optional) Manage API quotas for CloudFox operations |
135
+
136
+
> **Note:** The basic `roles/viewer` role includes permissions from `roles/logging.viewer`, `roles/monitoring.viewer`, and `roles/compute.networkViewer`, so these don't need to be granted separately.
137
+
138
+
#### GCP API Requirements
139
+
140
+
**APIs must be enabled in each project you want to assess.** GCP APIs are project-scoped.
141
+
142
+
| API | Service Name | Purpose |
143
+
| - | - | - |
144
+
| Cloud Identity API |`cloudidentity.googleapis.com`| Group enumeration, inherited role analysis |
145
+
| Cloud Asset API |`cloudasset.googleapis.com`| Cross-project resource discovery |
146
+
| Cloud Resource Manager API |`cloudresourcemanager.googleapis.com`| Organization mapping, IAM enumeration |
147
+
| IAM API |`iam.googleapis.com`| IAM analysis, privilege escalation detection |
148
+
| Compute Engine API |`compute.googleapis.com`| Instance enumeration, network security |
149
+
| Secret Manager API |`secretmanager.googleapis.com`| Secrets enumeration |
150
+
| Cloud Functions API |`cloudfunctions.googleapis.com`| Serverless enumeration |
151
+
| Cloud Run API |`run.googleapis.com`| Serverless enumeration |
152
+
| Kubernetes Engine API |`container.googleapis.com`| Container security analysis |
153
+
| BigQuery API |`bigquery.googleapis.com`| Data security analysis |
154
+
155
+
For detailed setup instructions, see the [GCP Setup Guide](https://github.com/BishopFox/cloudfox/wiki/GCP-Setup-Guide).
110
156
111
157
# AWS Commands
112
158
| Provider | Command Name | Description
@@ -159,22 +205,82 @@ Additional policy notes (as of 09/2022):
159
205
160
206
161
207
# GCP Commands
162
-
| Provider | Command Name | Description
208
+
209
+
For detailed documentation on each GCP command, see the [GCP Commands Wiki](https://github.com/BishopFox/cloudfox/wiki/GCP-Commands).
210
+
211
+
| Provider | Command Name | Description
163
212
| - | - | - |
164
-
| GCP |[whoami](https://github.com/BishopFox/cloudfox/wiki/GCP-Commands#whoami)| Display the email address of the GCP authenticated user |
165
-
| GCP |[all-checks](https://github.com/BishopFox/cloudfox/wiki/GCP-Commands#all-checks)| Runs all available GCP commands |
166
-
| GCP |[artifact-registry](https://github.com/BishopFox/cloudfox/wiki/GCP-Commands#artifact-registry)| Display GCP artifact registry information |
167
-
| GCP |[bigquery](https://github.com/BishopFox/cloudfox/wiki/GCP-Commands#bigquery)| Display Bigquery datasets and tables information |
168
-
| GCP |[buckets](https://github.com/BishopFox/cloudfox/wiki/GCP-Commands#buckets)| Display GCP buckets information |
169
-
| GCP |[iam](https://github.com/BishopFox/cloudfox/wiki/GCP-Commands#iam)| Display GCP IAM information |
170
-
| GCP |[instances](https://github.com/BishopFox/cloudfox/wiki/GCP-Commands#instances)| Display GCP Compute Engine instances information |
171
-
| GCP |[secrets](https://github.com/BishopFox/cloudfox/wiki/GCP-Commands#secrets)| Display GCP secrets information |
213
+
| GCP |[whoami](https://github.com/BishopFox/cloudfox/wiki/GCP-Commands#whoami)| Display identity context for the authenticated GCP user/service account |
214
+
| GCP |[iam](https://github.com/BishopFox/cloudfox/wiki/GCP-Commands#iam)| Enumerate GCP IAM principals across organizations, folders, and projects |
215
+
| GCP |[permissions](https://github.com/BishopFox/cloudfox/wiki/GCP-Commands#permissions)| Enumerate ALL permissions for each IAM entity with full inheritance explosion |
216
+
| GCP |[serviceaccounts](https://github.com/BishopFox/cloudfox/wiki/GCP-Commands#serviceaccounts)| Enumerate GCP service accounts with security analysis |
217
+
| GCP |[service-agents](https://github.com/BishopFox/cloudfox/wiki/GCP-Commands#service-agents)| Enumerate Google-managed service agents |
218
+
| GCP |[keys](https://github.com/BishopFox/cloudfox/wiki/GCP-Commands#keys)| Enumerate all GCP keys (SA keys, HMAC keys, API keys) |
219
+
| GCP |[resource-iam](https://github.com/BishopFox/cloudfox/wiki/GCP-Commands#resource-iam)| Enumerate IAM policies on GCP resources (buckets, datasets, secrets, etc.) |
220
+
| GCP |[domain-wide-delegation](https://github.com/BishopFox/cloudfox/wiki/GCP-Commands#domain-wide-delegation)| Find service accounts with Domain-Wide Delegation to Google Workspace |
| GCP |[hidden-admins](https://github.com/BishopFox/cloudfox/wiki/GCP-Commands#hidden-admins)| Identify principals who can modify IAM policies (hidden admins) |
| GCP |[dns](https://github.com/BishopFox/cloudfox/wiki/GCP-Commands#dns)| Enumerate Cloud DNS zones and records with security analysis |
247
+
| GCP |[endpoints](https://github.com/BishopFox/cloudfox/wiki/GCP-Commands#endpoints)| Enumerate all network endpoints (external and internal) with IPs, ports, and hostnames |
248
+
| GCP |[private-service-connect](https://github.com/BishopFox/cloudfox/wiki/GCP-Commands#private-service-connect)| Enumerate Private Service Connect endpoints and service attachments |
| GCP |[lateral-movement](https://github.com/BishopFox/cloudfox/wiki/GCP-Commands#lateral-movement)| Map lateral movement paths, credential theft vectors, and pivot opportunities |
269
+
| GCP |[data-exfiltration](https://github.com/BishopFox/cloudfox/wiki/GCP-Commands#data-exfiltration)| Identify data exfiltration paths, potential vectors, and missing security hardening |
270
+
| GCP |[public-access](https://github.com/BishopFox/cloudfox/wiki/GCP-Commands#public-access)| Find resources with allUsers/allAuthenticatedUsers access across 16 GCP services |
271
+
| GCP |[cross-project](https://github.com/BishopFox/cloudfox/wiki/GCP-Commands#cross-project)| Analyze cross-project IAM bindings, logging sinks, and Pub/Sub exports for lateral movement |
272
+
| GCP |[foxmapper](https://github.com/BishopFox/cloudfox/wiki/GCP-Commands#foxmapper)| Run FoxMapper (graph-based IAM analysis) for privilege escalation path discovery |
273
+
| GCP |[logging-enum](https://github.com/BishopFox/cloudfox/wiki/GCP-Commands#logging-enum)| Scan Cloud Logging entries for sensitive data (credentials, tokens, PII) |
274
+
| GCP |[bigquery-enum](https://github.com/BishopFox/cloudfox/wiki/GCP-Commands#bigquery-enum)| Scan BigQuery datasets, tables, and columns for sensitive data indicators |
275
+
| GCP |[bigtable-enum](https://github.com/BishopFox/cloudfox/wiki/GCP-Commands#bigtable-enum)| Scan Bigtable instances, tables, and column families for sensitive data indicators |
276
+
| GCP |[spanner-enum](https://github.com/BishopFox/cloudfox/wiki/GCP-Commands#spanner-enum)| Scan Spanner database schemas for sensitive table and column names |
0 commit comments