Google Cloud unauthorized service account activity

gcp

Classification:

compliance

Tactic:

Cette page n'est pas encore disponible en français, sa traduction est en cours.
Si vous avez des questions ou des retours sur notre projet de traduction actuel, n'hésitez pas à nous contacter.

Goal

Detect when there is unauthorized activity by a service account in GCP.

Strategy

Monitor Google Cloud logs and detect when a service account makes an API request and the request returns the status code equal to 7 within the log attribute @data.protoPayload.status.code. The status code 7 indicates the service account did not have permission to make the API call.

Triage and response

  1. Investigate the service account:{{@usr.id}} that made the unauthorized calls and confirm if there is a misconfiguration in IAM permissions or if an attacker compromised the service account.
  2. If unauthorized, revoke access of compromised service account and rotate credentials.

Changelog

22 June 2022 - Updated query, rule case and triage.

PREVIEWING: esther/docs-9518-update-example-control-sensitive-log-data