[Action Advised] Review Google Cloud credential security best practices

2026年3月13日
Secure service account and API keys to prevent unauthorized access.

MY CONSOLE

お客様のアカウントで指定されている言語への翻訳が完了次第、このメールの翻訳版
をお送りいたします。1~2 週間お時間をいただきますが、今しばらくお待ちくださ
いますようお願い申し上げます。

Hello しゃるろっと,

We’re writing to provide you with security best practices regarding the
management of service account keys and API keys within your Google Cloud
environment.

Recent security trends indicate that long-lived credentials without proper
security best practices remain a top security risk for unauthorized access.
To ensure your environment remains secure, and to modernize your
authentication strategy, we strongly advise implementing the unified
security framework outlined below.

What you need to do

Action advised:

Secure the credential lifecycle: Apply standard security hygiene by
following these best practices:

Zero-Code Storage: Never commit keys to source code or version control. Use
Secret Manager to inject credentials at runtime.
Disable Dormant Keys: Audit your active keys and decommission any that show
no activity over the last 30 days.
Enforce API Restrictions: Never leave an API key unrestricted. Limit keys
to specific APIs (eg, Maps Java Script only) and apply environmental
restrictions (IP addresses, HTTP referrers, or bundle IDs).
Apply Least Privilege: Never give full permissions to a service account.
Use the IAM recommender to prune unused permissions for service accounts,
ensuring only the absolute minimum access required for their function.
Mandatory Rotation: Implement the iam.serviceAccountKeyExpiryHours policy
to enforce a maximum lifespan for all user-managed service account keys. If
service account keys are not needed, implement
iam.managed.disableServiceAccountKeyCreation to disable the creation of new
service account keys.

Improve operational safeguards: Ensure a rapid response to security
incidents by completing the following:

Set Essential Contacts: Verify that your Essential Contacts are up to date
to ensure critical security notifications reach the right people during an
incident.
Set Billing Anomaly and Budget Alerts: Ensure billing anomaly and budget
alerts notifications are acted on. A sudden spike in consumption is often
the first indicator of a compromised credential.

We’re here to help

We are committed to helping you maintain a secure environment. If you have
any questions or require assistance, please contact Google Cloud Support.

Thanks for choosing Google Cloud.

– The Google Cloud Team

DOCUMENTATION

SUPPORT

© 2026 Google LLC 1600 Amphitheatre Parkway, Mountain View, CA 94043

You’ve received this mandatory service announcement to update you about
important changes to Google Cloud or your account.

Visit Google Cloud blog Visit GCP on GitHub Visit Google Cloud on LinkedIn
Visit Google Cloud on Twitter

コメントを残す

メールアドレスが公開されることはありません。 が付いている欄は必須項目です

LINEでお問合せ