Skip to content

Commit 2bb1292

Browse files
authored
Remove countermeasures from GCP privilege escalation doc
Removed countermeasures section from GCP privilege escalation documentation.
1 parent 0be98dc commit 2bb1292

1 file changed

Lines changed: 0 additions & 6 deletions

File tree

src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-cloud-workstations-privesc.md

Lines changed: 0 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -105,11 +105,5 @@ nmap -sS -p 80,443,22 10.0.0.0/8
105105

106106
</details>
107107

108-
**Countermeasures:**
109-
110-
* Disable "Running as root" in the Workstation Configuration
111-
* Do not mount `/var/run/docker.sock` — use remote builders (e.g., Cloud Build) instead
112-
* Assign a **custom service account** with minimal permissions to workstation configurations (e.g., `roles/source.reader`, `roles/artifactregistry.reader`)
113-
* Place the workstation project inside a **VPC Service Controls** perimeter
114108

115109

0 commit comments

Comments
 (0)