Google Cloud exposed service account key

gcp

Classification:

attack

このページは日本語には対応しておりません。随時翻訳に取り組んでいます。翻訳に関してご質問やご意見ございましたら、お気軽にご連絡ください。

Goal

Detect when Google Cloud disables a key for being exposed.

Strategy

This rule monitors Cloud Audit Logs and detects when the principal gcp-compromised-key-response@system.gserviceaccount.com disabled a key. If Google Cloud detects an exposed key, it automatically disables the key.

Triage and response

  1. An abuse event is created in the Abuse Event logs.
  2. Investigate any other actions carried out by the compromised identity {{@data.protoPayload.request.name}} using the Cloud SIEM investigator.
PREVIEWING: brett0000FF/node-compatibility