Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Limiting GCP Workload Identity Access to Specific Azure Sentinel Connectors #11251

Closed
ghanashvi opened this issue Oct 10, 2024 · 5 comments
Closed
Assignees
Labels
Connector Connector specialty review needed

Comments

@ghanashvi
Copy link

I need to ingest GCP audit logs into Azure Sentinel using the GCP Pub/Sub audit log connector, with authentication handled through GCP Workload Identity. I have already set up the configuration, and it is working fine. In this setup, while configuring the provider issuer, one of the allowed audiences must match what is specified in the official Microsoft documentation. I have followed this configuration as required.

However, we now need to restrict authentication with the Workload Identity to only a specific data connector, ensuring that other connectors cannot authenticate. For example, if there are two connectors, only one should be allowed to authenticate, while the other should not.

I have not found a way to restrict the Workload Identity to a specific connector, which poses a security risk, as other GCP connectors could potentially authenticate using the same Workload Identity.

@v-rusraut v-rusraut added the Connector Connector specialty review needed label Oct 11, 2024
@v-sudkharat
Copy link
Contributor

Hi @ghanashvi, Thanks for flagging this issue, we will investigate this issue and get back to you with some updates. Thanks!

@ghanashvi
Copy link
Author

Hi @v-rusraut and @v-sudkharat, Do you have any updates on the issue I raised?

@v-sudkharat
Copy link
Contributor

Hi @ghanashvi, Sorry for delay in response.
Could you please check with GCP support once for the required roles and authentication for Workload Identity, as the services managed by GCP, so they can assist you or share the doc to configure the settings for Workload Identity to meet your requirement.
Thanks!

@ghanashvi
Copy link
Author

Thank you for the response @v-sudkharat. From the GCP side, we are able to authenticate to the data connector. However, on the Azure side, we can create different GCP data connectors, and all of them will be able to authenticate to workload identity.

Regarding documentation, in GCP there is no documentation for workload identity and Azure Sentinel authentication. However, there is documentation for Azure AD and GCP workload identity authentication. But configuring authentication between workload identity and Azure Sentinel data connection, we have to specify issuer and allowed audience, which is mentioned in the Microsoft documentation. We cannot use our account tenant ID and application ID in workload identity and Azure Sentinel data connector authentication, as it will result in an error if we use our own account ID.
For authentication between Azure AD and workload identity, refer to this document:
https://cloud.google.com/iam/docs/workload-identity-federation-with-other-clouds?hl=en#mappings-and-conditions

So, is there any way in Azure to restrict workload identity authentication to a specific GCP data connector or a specific Log Analytics workspace where we are configuring the data connector?

@v-sudkharat
Copy link
Contributor

Hi @ghanashvi, As of now there is not such doc or way we found to meet your request. But we will note it your query if we get any info on your request, we will share with you.
so, Closing this issue from GitHub. If you still need support for this issue, feel free to re-open it any time. Thank you for your co-operation.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Connector Connector specialty review needed
Projects
None yet
Development

No branches or pull requests

3 participants