We are looking at this link that outlines how to stage Snowflake output to a GCS bucket (https://docs.snowflake.com/en/user-guide/data-load-gcs-config.html). In step 3 of the article, you simply provide the name of the service account to the GCS bucket and once assigned with the right permissions, the snowflake account can obtain access.
My question is, if the name of that service account were compromised, what is stopping a potential hacker from impersonating that account and running a python/java program to connect to my GCS bucket where that account is allowed?
In that article, I don't see any requirement for keys, tokens, certs or other additional controls to restrict access. On the GCP side, it is just permissions and the name of the account that controls it?
Thanks and regards