
Summary
The detection rule is designed to monitor Google Workspace environments for the addition of applications through the Google Workspace Marketplace. This can be a tactic employed by adversaries to establish persistence within a target's ecosystem by inserting malicious applications that can exfiltrate data. The rule focuses specifically on events indicating an application has been added by a user with administrative privileges. False positives may occur when legitimate applications are added by system administrators; therefore, a thorough investigation of the context and user actions surrounding the event is essential. The investigation involves checking user roles, reviewing audit logs, and assessing the permissions of added applications to ensure compliance with organizational policies. Additionally, security best practices and incident response protocols should be initiated if the detection results suggest malicious activity. The rule leverages data from Google Workspace audit logs and requires proper setup to minimize event lag and ensure timely detection.
Categories
- Cloud
- Identity Management
Data Sources
- User Account
- Application Log
- Cloud Service
Created: 2020-11-17