Connect GCP account
Securing your cloud infrastructure is crucial to protecting your data. You can leverage Aikido's security checks to detect and address any misconfigurations in your infrastructure.
To view the list of security checks performed by Aikido on your cloud environment, go to the 'checks' tab on the cloud overview page at. Filter to GCP to see specific checks performed on your connected GCP project(s).
To get started, head to the cloud overview page on Aikido and click 'Connect cloud.' Follow the step-by-step setup wizard to connect your GCP project with Aikido.

First, you'll need to provide the project ID to help identify the correct project. Then, you'll be prompted to enable API access to specific GCP services. This is a critical step that enables Aikido to inspect the security of your cloud resources through API requests.
After enabling API access, the setup wizard will guide you through creating a service account with limited, read-only access to specific services in your GCP project. This account will be associated with the necessary roles and permissions, all of which are read-only. This ensures that Aikido can perform its security checks without the risk of unintended modifications to your resources.
If you do not want to assign the suggested roles during the setup. You can ensure the service account includes the following permissions to perform the scans:
bigtable.instances.list,
cloudasset.assets.listResource,
cloudfunctions.functions.list,
cloudkms.cryptoKeys.list,
cloudkms.keyRings.list,
cloudkms.cryptoKeys.getIamPolicy,
cloudsql.instances.list,
cloudsql.users.list,
compute.autoscalers.list,
compute.backendServices.list,
compute.disks.list,
compute.firewalls.list,
compute.healthChecks.list,
compute.instanceGroupManagers.list,
compute.instanceGroups.list,
compute.instances.getIamPolicy,
compute.instances.list,
compute.images.list,
compute.networks.list,
compute.projects.get,
compute.resourcePolicies.list,
compute.securityPolicies.list,
compute.snapshots.list,
compute.subnetworks.list,
compute.targetHttpProxies.list,
compute.urlMaps.list,
compute.routes.list,
container.clusters.list,
dns.managedZones.list,
iam.serviceAccountKeys.list,
iam.serviceAccounts.list,
logging.logMetrics.list,
logging.sinks.list,
monitoring.alertPolicies.list,
spanner.instances.list,
storage.buckets.getIamPolicy,
storage.buckets.list,
deploymentmanager.deployments.list,
dataproc.clusters.list,
artifactregistry.repositories.list,
composer.environments.list
Once the service account is created, you'll need to generate an access key and upload it to Aikido. This key will be used by Aikido to make the necessary API requests to scan your resources.
Finally, you can name your connected project in Aikido and specify the environment it operates in. This information helps Aikido prioritize findings based on the severity and impact to your business.

Within 1-2 minutes after connecting your account, Aikido will report misconfigurations that could pose a threat.
Advanced Rules
Besides the checks mentioned above, Aikido offers a suit of complementary checks/rules that you can enable. We call these advanced cloud rules and you can find them here. After enabling any of these rules, you can expect to see the results (as new issues in the feed) within a few seconds.
Just like the standard checks, these are evaluated with each scan of your cloud environments. Moreover, they are mapped to the compliance reports. By default, the advanced rules will appear as disabled in the compliance reports, unless you activate them.
GCP Advanced Rules Changelog
Cloud SQL instances do not have deletion protection enabled
Medium
Jul 25, 2025
GKE clusters have the Kubernetes Dashboard enabled
Medium
Jul 25, 2025
Storage buckets do not have uniform bucket-level access enabled
Medium
Jul 25, 2025
Compute instances have serial port access enabled
Medium
Jul 25, 2025
Compute instances have IP forwarding enabled
Medium
Jul 25, 2025
Compute instances have public IP addresses
Medium
Jul 25, 2025
Compute instances have Shielded VM disabled
Medium
Jul 25, 2025
Compute instances do not have OS Login enabled
Low
Jul 25, 2025
GKE clusters are not using automatic upgrades with stable release channels
Medium
Jul 25, 2025
GKE node pools use the default service account
Medium
Jul 25, 2025
GKE clusters do not have the GKE Metadata Server enabled
Medium
Jul 25, 2025
GKE node pools are not using Container-Optimized OS
Medium
Jul 25, 2025
GKE node pools do not have node auto-repair enabled
Medium
Jul 27, 2025
GKE node pools do not have node auto-upgrade enabled
Medium
Jul 27, 2025
GKE clusters do not have Shielded Nodes enabled
Medium
Jul 27, 2025
Last updated
Was this helpful?