Looker Hardening Guide
Google BI security for model access, embed secrets, and database connections
Overview
Looker (Google Cloud) provides business intelligence with LookML modeling and data exploration. REST API, embed secrets, and database connections access enterprise data warehouses. Compromised access exposes business metrics, customer analytics, and data warehouse credentials.
Intended Audience
- Security engineers managing BI platforms
- Looker administrators
- GRC professionals assessing analytics security
- Third-party risk managers evaluating Google Cloud integrations
How to Use This Guide
- L1 (Baseline): Essential controls for all organizations
- L2 (Hardened): Enhanced controls for security-sensitive environments
- L3 (Maximum Security): Strictest controls for regulated industries
Scope
This guide covers Looker security configurations including authentication, access controls, and integration security.
Table of Contents
- Authentication & Access Controls
- Content Security
- Database Connection Security
- Monitoring & Detection
1. Authentication & Access Controls
1.1 Enforce SSO with MFA
Profile Level: L1 (Baseline) NIST 800-53: IA-2(1)
ClickOps Implementation
Step 1: Configure SAML SSO
- Navigate to: Admin → Authentication → SAML
- Configure SAML IdP
- Enable: Bypass login page
Step 2: Google OAuth
- Navigate to: Admin → Authentication → Google
- Enable Google OAuth
- Configure domain restrictions
1.2 Role-Based Access
Profile Level: L1 (Baseline) NIST 800-53: AC-3, AC-6
ClickOps Implementation
Step 1: Define Roles
| Role | Permissions |
|---|---|
| Admin | Full access |
| Developer | Model development |
| User | Explore and save |
| Viewer | View only |
Step 2: Configure Model Sets
- Navigate to: Admin → Roles
- Create custom roles
- Assign model/permission sets
2. Content Security
2.1 Configure Folder Permissions
Profile Level: L1 (Baseline) NIST 800-53: AC-3
Description
Control content access through folder hierarchy.
Rationale
Attack Scenario: Open folder permissions expose executive dashboards; shared folder access leaks competitive metrics.
ClickOps Implementation
Step 1: Folder Structure
Step 2: Configure Access
- Navigate to: Browse → Folder → Manage Access
- Set appropriate permissions
- Limit “View” access default
2.2 Embed Security
Profile Level: L2 (Hardened) NIST 800-53: AC-21
Implementation
Step 1: Manage Embed Secrets
- Navigate to: Admin → Platform → Embed
- Rotate embed secrets
- Configure embed domain allowlist
Step 2: SSO Embed
- Use signed embed URLs
- Set short session lengths
- Implement user attributes
3. Database Connection Security
3.1 Secure Database Connections
Profile Level: L1 (Baseline) NIST 800-53: IA-5
ClickOps Implementation
Step 1: Connection Security
- Navigate to: Admin → Database → Connections
- Use SSL/TLS connections
- Configure service account with read-only
Step 2: PDT Credentials
- Limit PDT write permissions
- Use separate credentials
- Restrict temp schema access
3.2 Query Cost Controls
Profile Level: L2 (Hardened) NIST 800-53: CM-7
Implementation
Step 1: Configure Limits
- Navigate to: Admin → General → Query
- Set query timeout
- Configure row limits
4. Monitoring & Detection
4.1 System Activity
Profile Level: L1 (Baseline) NIST 800-53: AU-2, AU-3
ClickOps Implementation
Step 1: Access System Activity
- Navigate to: Admin → System Activity
- Review dashboards:
- User Activity
- Query Performance
- Content Usage
Detection Focus
Appendix A: Edition Compatibility
| Control | Standard | Enterprise | Embed |
|---|---|---|---|
| SAML SSO | ✅ | ✅ | ✅ |
| Custom Roles | ✅ | ✅ | ✅ |
| System Activity | ✅ | ✅ | ✅ |
| SSO Embed | ❌ | ❌ | ✅ |
Appendix B: References
Official Looker / Google Cloud Documentation:
- Google Cloud Trust Center
- Looker Documentation
- How to Keep Looker Secure
- Google Cloud Compliance Reports Manager
API & Developer Resources:
Compliance Frameworks:
- SOC 2 Type II, SOC 3, ISO 27001 (as part of Google Cloud Platform) – via Google Cloud Compliance. Looker (Google Cloud) inherits GCP compliance certifications including SOC 2, ISO 27001, ISO 27017, ISO 27018, FedRAMP, and HIPAA.
Security Incidents:
- No major Looker-specific public security breaches identified. Looker inherits the security posture of Google Cloud Platform. Google Cloud publishes security bulletins at cloud.google.com/support/bulletins.
Changelog
| Date | Version | Maturity | Changes | Author |
|---|---|---|---|---|
| 2025-12-14 | 0.1.0 | draft | Initial Looker hardening guide | Claude Code (Opus 4.5) |