From Sprawl to Control: How CNA Governs Service Accounts and NHIs in GCP
Shashwat Sehgal
•
Jan 7, 2025
Shashwat Sehgal
•
Jan 7, 2025
Background: CNA Insurance has 1000+ projects in GCP. Over time, developers created thousands of service accounts in them for a variety of purposes.
For example, CNA uses Palo Alto Networks’ Prisma Cloud to scan their GCP instances for misconfigurations. To integrate to GCP, Prisma Cloud needs a GCP service account that can read GCP logs. This service account requires a key or static credential, which is created in the GCP console by CNA’s DevOps team and stored in Prisma Cloud by the Prisma admin.
Problem: The sprawl of service accounts (40,000+, growing 5% monthly) and static keys (30,000+) presented a significant security risk for CNA. Per industry reports, credential leakage and over-privileged accounts were behind 75% of cloud breaches in 2022.
Governance of these service accounts created several operational challenges:
Current IGA (Sailpoint): CNA used Sailpoint to govern access to their on-prem stack and, to a limited extent, for GCP. However, Sailpoint does not have capabilities for governing non-human identities, such as service accounts and static keys in GCP
Native GCP tooling: As a best practice, Google recommends customers:
These were impractical for a number of reasons:
CSPMs (such as Wiz): These provide visibility into the risk posture of the service accounts but fall short in other areas:
Comprehensive Discovery
Proactive Risk Posture Analysis
Governance at scale
P0’s deployment was straightforward and consisted of connecting CNA’s GCP APIs to P0 and adding all 1000+ projects via a script in P0’s web GUI. The process took less than an hour, and no additional infrastructure was required to be deployed.
Out of the box, P0 started providing visibility into every GCP identity. Over a period of a few weeks, CNA’s security team began managing 40,000+ service accounts via P0, thereby eliminating all static keys and over-privileged access. This process would have ordinarily taken several months and likely would have resulted in only around 70% of risk reduction. More importantly, CNA can operationalize an ongoing governance program, ensuring that new service accounts are governed from the outset.
Control and govern privileged access across all identities with P0 Security.