Back to controls

Ensure Artifact Registry repositories are not publicly accessible

### Overview

Category

Controls

High

Applies to

Google Cloud

Coverage

null controls, 1 queries

Asset types

1 covered

Overview

Overview

Artifact Registry repositories should not be exposed to unauthenticated or broadly authenticated principals such as allUsers or allAuthenticatedUsers. Public repositories increase the blast radius of accidental image disclosure and make supply-chain reconnaissance easier for attackers.

Remediation guidance

From Google Cloud Console

  1. Open the affected Artifact Registry repository.
  2. Review IAM bindings on the repository.
  3. Remove allUsers and allAuthenticatedUsers members.
  4. Grant only the specific principals or service accounts that require repository access.

Using gcloud

gcloud artifacts repositories remove-iam-policy-binding <repository> --location=<location> --member=<member> --role=<role>

Query logic

These are the stored checks tied to this control.

Publicly accessible Artifact Registry repositories

Connectors

Google Cloud

Covered asset types

ArtifactRegistryRepository

Expected check: eq []

{ artifactRegistryRepositories(where: { iamBindings_SOME: { OR: [ { members_INCLUDES: "allAuthenticatedUsers" }, { members_INCLUDES: "allUsers" } ] } }) { ...AssetFragment } }
Cyscale Logo
Cyscale is an agentless cloud-native application protection platform (CNAPP) that automates the contextual analysis of cloud misconfigurations, vulnerabilities, access, and data, to provide an accurate and actionable assessment of risk.

Stay connected

Receive new blog posts and product updates from Cyscale

By clicking Subscribe, I agree to Cyscale’s Privacy Policy


© 2026 Cyscale Limited

LinkedIn icon
Twitter icon
Facebook icon
crunch base icon
angel icon