Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Overview

Google Cloud Platform (GCP) is one of the largest cloud providers out there, and as such requires organizations to protect themselves with cloud security monitoring. Devo’s Threat Research Team’s content contains many GCP detections so your organization can monitor your GCP infrastructure, look for areas of risk, or help respond to threats as they emerge.

Destroying a crypto key is an unusual event that should be checked and considered in context with other suspicious events occurring in the same GCP project.

This alert filters Google Cloud Audit Logs with DestroyCryptoKeyVersion as methodName
Expand
titleGCP - KMS Key Destroy
SecOpsGCPSQLDatabaseModification

An attacker could intend to modify, or gain, privileges on a Cloud SQL Database.

Source table → cloud.gcp

Updating the state of a crypto key is an unusual event that should be checked and considered in context with other suspicious events occurring in the same GCP project.

This alert filters Google Cloud Audit Logs with UpdateCryptoKeyVersion as methodName. It extracts the keystate value set to the cryptokey and checks if it is DISABLED or ENABLED
Expand
title GCP - KMS Key Enabled Or Disabled
SecOpsGCPAuditUnauthorizedAPICalls

An attacker could be performing reconnaissance on a GCP project trying to enumerate permissions.

Source table → cloud.gcp

To list queues is one of the first steps taken by an attacker in order to enumerate a Google Cloud Platform project.

This detection filters by Google Audit log events in which the methodName parameter contains the string ListQueues.

Expand
titleGCP - Audit List Queues
SecOpsGCPPrivateCloudRouteCreation

An attacker may have created a new Route to bypass restrictions on traffic routing segregating trusted and untrusted networks.

Source table → cloud.gcp

Expand
title GCP - GCS Bucket EnumeratedSecOpsGCPPubSubTopicCreation

An attacker could be enumerating GCS buckets to gain more information regarding the Google Cloud project.This alert filters Google Cloud Audit Logs in order to find those which have storage.buckets.list as methodName. It also filters the main account so as to only get the actions performed by service accountsadversary could create a Google Cloud Pub/Sub topic to collect data.

Source table → cloud.gcp

Expand
titleGCP - GCS Bucket ModifiedSecOpsGCPPubSubTopicDeletion

An attacker could be modifying permissions, or accessibility, over a bucket.This alert filters Google Cloud Audit Logs in order to find those which have storage.buckets.update as methodName. It also extracts the name of the bucket being updated to include this value in the alert templateadversary could delete a Google Cloud Pub/Sub topic to impair event aggregation and analysis mechanisms.

Source table → cloud.gcp

Expand
titleGCP - Google Drive Shared PubliclySecOpsGCPPrivateCloudRouteDeletion

An attacker could be modifying permissions, or accessibility, over a bucket to make it public, or creating a public one.This alert filters Google Cloud Audit Logs in order to find those which have storage.buckets.create or storage.setIamPermissions as methodName. It also extracts the name of the bucket being updated to include this value in the alert template. It then retrieves the first five pairs of member and action fields within the bindingDeltas array, and checks in each pair if member is equal to allUsers and action is equal to ADDmay have deleted a VPC Route to interrupt the availability of systems and network resources.

Source table → cloud.gcp

An attacker could be creating a service account to gain persistence on the project.

This alert filters Google Cloud Audit Logs in order to find those who have google.iam.admin.v1.CreateServiceAccount as methodName and the resource type is a service account. It also extracts the description attached to the service account creation and the email of this account
Expand
titleGCP - IAM Service Account Created
SecOpsLog4ShellVulnerabilityCloudGCP

Alert that checks attempts to exploit CVE-2021-44228 known as Log4shell. The query looks for payload patterns associated with this vulnerability in the log raw message. This would include payloads included in the URL, user-agent header, referrer header, or POST and PUT HTTP bodies. [WARNING] This alert detects attack patterns and can generate a high volume of events due to the number of scanners currently testing systems on the Internet. It is therefore likely to need some kind of tunning.

Source table → cloud.gcp

Expand
titleGCP - Port ScanSecOpsGCPPortScan

An attacker could be performing reconnaissance against a network.This alert filters events from cloud.gcp.compute.firewall, checking if the source IP is public and the destination IP is private. It then groups by projects, locations, source IPs and destination IPs, and counts the different number or destination ports. The alert is triggered when this number is greater than five.

Source table → cloud.gcp

Expand
titleGCP - Port SweepSecOpsGCPGCSBucketModified

An attacker could be performing reconnaissance against a network.This alert filters events from cloud.gcp.compute.firewall, checking if the source IP is public and if the destination IP is private. It then groups by projects, locations, source IPs and ports, and counts the different numbers or destination IPs. The alert is triggered when this number is greater than five.modifying permissions, or accessibility, over a bucket.

Source table → cloud.gcp

Expand
titleSecOpsGCPKMSKeyDestroy

Destroying a crypto key is an unusual event that should be checked and considered in context with other suspicious events occurring at the same GCP project.

Source table → cloud.gcp

Expand
titleGCP - Secrets Manager High ActivitySecOpsGCPIAMServiceAccountCreated

An attacker could be attempting to access, or modify, the Secret Manager service.This alert filters Google Cloud Audit to find those that contain the string SecretManagerService in parameter protoPayload_methodName. This way we filter events coming from the Secret Manager service. It then counts the number of events and filters when it is greater than 10.creating a service account to gain persistence on the project.

Source table → cloud.gcp

Expand
title GCP - Possible Reconnaissance ActivitySecOpsGCPKubernetesSensitiveObjectAccess

An attacker could intend to enumerate the environment.This alert identifies GCP API requests using GET and LIST methods, that when observed in combination, could indicate that an actor is trying to enumerate the environment. These events are usually generated during normal operations so it is necessary to use this alert as context around other security incidentsgain access to a Secret or ConfigMap.

Source table → cloud.gcp

Expand
titleGCP - Audit Unauthorized API CallsSecOpsGCPIAMCustomRoleCreation

An attacker could be performing reconnaissance on a GCP project trying to enumerate permissions.This alert filters events from the cloud.gcp table, checking if protoPayload_status_code is equal to seven. This code corresponds to unauthorized requests to the API.  It then puts principal email into lower case and groups by resource_labels_project_id and lowerPrincipalEmail. The alert is triggered when the total of these events after grouping is greater than 10may have created a new Role to gain persistence.

Source table → cloud.gcp

Expand
titleGCP - New Public Storage BucketSecOpsGCPPortSweep

An attacker could intend to collect data, making public the data from a GCP Storage Bucket.

This alert detects when a user makes public the entire content of a storage bucket.

be performing reconnaissance against a network.

Source table → cloud.gcp

Expand
titleGCP - Kubernetes Cluster Pod Scan DetectionSecOpsGCPIAMCustomRoleDeletion

An adversary may attempt to enumerate the cloud services running on GCP Kubernetes cluster’s pods.

This alert is triggered when more than 10 unauthorized requests are detected in less than five minutes, against GCP Kubernetes cluster’s pods, from the same IP address.

could delete an IAM Custom Role to disrupt the availability of system and network resources by inhibiting access to accounts used by legitimate users.

Source table → cloud.gcp

Expand
titleGCP - GCE Firewall Rule CreationSecOpsGCPGCEFirewallRuleModification

An attacker may have tried to bypass perimeter security by creating modifying a firewall rule.

This alert detects any attempt to create a firewall rule in Google Cloud Compute Engine.

Source table → cloud.gcp

An attacker may have tried to bypass perimeter security by deleting a firewall rule.

This alert detects any attempt to delete a firewall rule in Google Cloud Compute Engine
Expand
titleGCP - GCE Firewall Rule Deletion
SecOpsGCPPubSubSubscriptionDeletion

An adversary could delete a Google Cloud Pub/Sub subscription to impair event aggregation and analysis mechanisms.

Source table → cloud.gcp

Expand
titleGCP - GCD Firewall Rule ModificationSecOpsGCPLoggingSinkModification

An attacker may have tried to bypass perimeter security by modifying a firewall rule.This alert detects any attempt to modify a firewall rule in Google Cloud Compute Enginecould be modifying a logging sink to avoid detection, or redirect logs to a different destination.

Source table → cloud.gcp

Expand
titleGCP - IAM Custom Role CreationSecOpsGCPIAMServiceAccountKeyDeletion

An attacker may have created a new role to gain persistence.This alert is triggered when a new Google Cloud IAM custom role is createdadversary could delete a IAM Service Account Key to manipulate the service account and maintain access to the systems.

Source table → cloud.gcp

Expand
titleGCP - IAM Custom Role DeletionSecOpsGCPLoggingSinkDeletion

An adversary could delete an IAM custom role to disrupt the availability of system and network resources by inhibiting access to accounts used by legitimate users.

This alert is triggered when a Google Cloud IAM custom role is deleted.

attacker could be deleting a logging sink to avoid detection.

Source table → cloud.gcp

Expand
titleGCP - IAM Service Account Key DeletionSecOpsGCPIAMServiceAccountKeyCreation

An adversary could delete create a IAM Service account key Account Key to manipulate the a service account and maintain access to the systems.

Source table → cloud.This alert is triggered when a Google Cloud IAM Service Account Key is deletedgcp

Expand
titleSecOpsGCPPubSubSubscriptionCreation

An adversary could create a Google Cloud Pub/Sub Subscription to collect data.

Source table → cloud.gcp

Expand
title GCP - Logging Bucket DeletionSecOpsGCPLoggingBucketDeletion

An adversary could remove a Google Cloud Logging Bucket to impair event aggregation and analysis mechanisms.This alert is triggered when a Google Cloud Logging Bucket is deleted

Source table → cloud.gcp

Expand
titleSecOpsGCPAuditListQueues

Accessing list queues is one of the first steps taken by an attacker in order to enumerate a Google Cloud Platform project.

Source table → cloud.gcp

Expand
title GCP - Pub Sub Subscription CreationSecOpsGCPGCSBucketEnumerated

An adversary could create a Google Cloud Pub/Sub Subscription to collect data.This alert is triggered when a Google Cloud Pub/Sub Subscription is createdattacker could be enumerating GCS buckets to gain more information regarding the Google Cloud project.

Source table → cloud.gcp

Expand
titleGCP - Pub Sub Subscription DeletionSecOpsGCPStorageBucketPermissionsModification

An adversary could delete a Google Cloud Pub/Sub subscription to impair event aggregation and analysis mechanisms.This alert is triggered when a Google Cloud Pub/Sub subscription is deletedmay modify Storage Bucket Permissions to evade access control lists (ACLs) and access protected files.

Source table → cloud.gcp

Expand
titleSecOpsGCPGCPloitExploitationFrameworkActivity

GCPPloit is a framework to audit GCP accounts, this could be used by attackers in order to find security issues.

Source table → cloud.gcp

Expand
title GCP - Pub Sub Topic CreationSecOpsGCPPrivateCloudNetworkDeletion

An adversary attacker could create delete a Google Cloud Pub/Sub topic to collect data.This alert is triggered when a Google Cloud Pub/Sub topic is createdVirtual Private Cloud Network (VPC) to interrupt availability of systems and network resources.

Source table → cloud.gcp

Expand
titleGCP - Pub Sub Topic DeletionSecOpsGCPStorageBucketDeletion

An adversary could delete a Google Cloud Pub/Sub topic to impair event aggregation and analysis mechanisms.This alert is triggered when a Google Cloud Pub/Sub topic is deletedStorage Bucket to destroy data and files on specific systems or in large numbers on a network to interrupt availability to systems, services, and network resources.

Source table → cloud.gcp

Expand
titleGCP - IAM Service Account DeletionSecOpsGCPNewPublicStorageBucket

An attacker could delete a Service Account to interrupt the availability of systems and network resources by inhibiting access to accounts utilized by legitimate users.This alert is triggered when a Google Cloud IAM service account is deletedintend to collect data, making public the data from a GCP Storage Bucket.

Source table → cloud.gcp

Expand
title GCP - IAM Service Account DisabledSecOpsGCPPossibleReconnaissanceActivity

An adversary could disable a IAM Service Account to manipulate the service account and maintain access to the systems.

This alert is triggered when a Google Cloud IAM service account is disabled.

attacker could intend to enumerate the environment.

Source table → cloud.gcp

Expand
title GCP - IAM Service Account Key CreationSecOpsGCPIAMServiceAccountDisabled

An adversary could create disable a IAM Service Account Key to manipulate a the service account and maintain access to the systems.

This alert is triggered when a Google Cloud IAM Service Account Key is created.

Source table → cloud.gcp

Expand
titleGCP - Storage Bucket DeletionSecOpsGCPGoogleDriveSharedPublicly

An adversary could delete a Google Cloud Storage Bucket to destroy data and files on specific systems or in large numbers on a network to interrupt availability to systems, services, and network resources.This alert is triggered when a Google Cloud Storage Bucket is deletedattacker could be modifying permissions, or accessibility, over a bucket to make it public, or creating a public one.

Source table → cloud.gcp

An adversary may modify Storage Bucket Permissions to evade access control lists (ACLs) and access protected files.

This alert is triggered when the Identity and IAM permissions are modified for a Google Cloud Platform (GCP) storage bucket.
Expand
titleGCP - Storage Bucket Permissions Modification
SecOpsGCPSecretsManagerHighActivity

An attacker could be attempting to access, or modify, the Secret Manager service

Source table → cloud.gcp

Expand
titleGCP - Detect Accounts With High Risk Roles By ProjectSecOpsGCPDetectAccountsWithHighRiskRolesByProject

A high - risk role has have been assigned to a user, this could indicate that a malicious actor could be trying to escalate privileges within a project.

This alert filters Google Cloud Audit Logs to find those which have the method name equal to SetIamPolicy. The alert then parses the different roles and actions from the binding deltas in the protopayload. This alert will only consider the first five actions and roles: any following actions, or roles, will be disregarded. This alert triggers when one of the pairs action-role meets the following criteria: the action is equal to ADD and the roles are one of the following: roles/owner, roles/editor, roles/iam.serviceAccountUser, roles/iam.serviceAccountAdmin, roles/iam.serviceAccountTokenCreator, roles/dataflow.developer, roles/dataflow.admin, roles/composer.admin, roles/dataproc.admin or roles/dataproc.editor.

Source table → cloud.gcp

Expand
title GCP - Private Cloud Route DeletionSecOpsGCPGCEFirewallRuleCreation

An attacker may have deleted a VPC Route to interrupt the availability of systems and network resources.

This alert is triggered when a Google Cloud Virtual Private Cloud Route has been deleted.

Source table → cloud.gcp

Expand
titleGCP - Private Cloud Route Creation

An attacker may have created a new route to bypass restrictions on traffic routing segregating trusted and untrusted networks.

This alert is triggered when a new Google Cloud Virtual Private Cloud route has been createdtried to bypass perimeter security by creating a firewall rule.

Source table → cloud.gcp

Expand
titleGCP - Private Cloud Network DeletionSecOpsGCPIAMServiceAccountDeletion

An attacker could delete a Virtual Private Cloud Network (VPC) Service Account to interrupt availability of systems and network resources .This alert filters Google Cloud Audit Logs with a method name equal to "v*.compute.networks.delete" to detect when a Google cloud VPC is deleted.by inhibiting access to accounts utilized by legitimate users.

Source table → cloud.gcp

An attacker could be modifying a logging sink to avoid detection, or redirect logs to a different destination.

This alert filters Google Cloud Audit Logs to find the log entries that have the method name equal to google.logging.v2.ConfigServiceV2.UpdateSink.
Expand
titleGCP - Logging Sink Modification
SecOpsGCPKubernetesClusterPodScanDetection

An adversary may attempt to enumerate the cloud services running on GCP Kubernetes cluster’s pods

Source table → cloud.gcp

Expand
title GCP - Logging Sink DeletionSecOpsGCPGCEFirewallRuleDeletion

An attacker could be deleting a logging sink to avoid detection.

This alert filters Google Cloud Audit Logs to find the log entries that have the method name equal to google.logging.v2.ConfigServiceV2.DeleteSink.

may have tried to bypass perimeter security by deleting a firewall rule.

Source table → cloud.gcp

This alert detects when a Cloud SQL Database has been modified or deleted, and if any user has gained privileges on a database or any of its tables
Expand
titleGCP -SQL Database Modification
SecOpsGCPKMSKeyEnabledOrDisabled

Updating the state of a crypto key is an unusual event that should be checked and considered in context with other suspicious events occurring in the same GCP project.

Source table → cloud.gcp