Skip to content

[Feature Request] Implement Workload Identity / Service Account Impersonation #52

@aghassemlouei

Description

@aghassemlouei

Feature Description

Replace the generation of long-lived, static user-managed Service Account keys with Workload Identity Federation or Service Account Impersonation.

Use Case

Long-lived, static credentials pose a massive security risk as they do not automatically expire and are highly susceptible to being leaked. This feature ensures secure, short-lived access.

Proposed Solution

Remove the google_service_account_key resource blocks from modules/iam-service-account/main.tf and modules/iam-service-account/iam.tf. Grant the necessary identities the roles/iam.serviceAccountTokenCreator role to allow temporary impersonation instead of exporting physical key files.

Compliance & Deployment Context

  • Target Deployment Type(s):
    • US Region Restricted (e.g., Access Policy constraint)
    • FedRAMP Medium
    • FedRAMP High
    • DoD IL4
    • DoD IL5
    • All / General

Reusability Check

Stellar Engine prioritizes reusability.

  • I have checked if this functionality can be achieved by extending an existing module or blueprint.
  • I have verified that this does not duplicate existing functionality.

Alternatives Considered

Continuing to use JSON key files, which triggers automatic API rejections via Organization Policies in Assured Workloads environments.

Additional Context

N/A

Metadata

Metadata

Assignees

No one assigned

    Labels

    enhancementNew feature or requestsecuritySomething is insecure or can be secured

    Projects

    Status

    Todo

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions