Skip to main content

google_kms_key_ring_iam_bindings resource

This resource is deprecated. Please use google_kms_key_ring_iam_policy instead

Use the google_kms_key_ring_iam_bindings InSpec audit resource to test properties of all, or a filtered group of, GCP KMS key ring IAM bindings.


A google_kms_key_ring_iam_bindings resource block collects GCP KMS key ring IAM bindings then tests that group.

describe google_kms_key_ring_iam_bindings(key_ring_url: 'projects/project/locations/europe-west2/keyRings/key-ring') do
  it { should exist }

Use this InSpec resource to enumerate roles then test in-depth using google_kms_key_ring_iam_binding.

google_kms_key_ring_iam_bindings(key_ring_url: 'projects/project/locations/europe-west2/keyRings/key-ring').iam_binding_roles.each do |iam_binding_role|
  describe google_kms_key_ring_iam_binding(key_ring_url: 'projects/project/locations/europe-west2/keyRings/key-ring',  role: "roles/owner") do
    it { should exist }
    its('members') {should include '' }


The following examples show how to use this InSpec audit resource.

Test that there are no more than a specified number of IAM bindings roles available for the key ring

describe google_kms_key_ring_iam_bindings(key_ring_url: 'projects/project/locations/europe-west2/keyRings/key-ring') do
  its('count') { should be <= 100}

Test that an expected IAM binding is available for the key ring

describe google_kms_key_ring_iam_bindings(key_ring_url: 'projects/project/locations/europe-west2/keyRings/key-ring') do
  its('iam_binding_roles') { should include "roles/storage.admin" }

Test that a particular role does not exist using filtering of the plural resource

describe google_kms_key_ring_iam_bindings(key_ring_url: 'projects/project/locations/europe-west2/keyRings/key-ring').where(iam_binding_role: "roles/iam.securityReviewer") do
  it { should_not exist }

Filter Criteria

This resource supports the following filter criteria: iam_binding_role. This may be used with where, as a block or as a method.


  • iam_binding_roles - an array of google_kms_key_ring_iam_binding role strings e.g. ["roles/compute.admin", "roles/owner"]

GCP Permissions

Ensure the Cloud Key Management Service (KMS) API is enabled for the project where the resource is located.s

Edit this page on GitHub.

Thank you for your feedback!


Search Results