
Summary
This detection rule aims to monitor modifications and deletions of Google Cloud SQL databases within the Google Cloud Platform (GCP) environment. It focuses on identifying actions such as creating, deleting instances, or modifying user access to the SQL databases. The rule listens to specific audit logs associated with Cloud SQL activities, specifically targeting the GCP audit log methods: 'cloudsql.instances.create', 'cloudsql.instances.delete', 'cloudsql.users.update', and 'cloudsql.users.delete'. These actions could signify potential unauthorized access or misconfigurations that could lead to data loss or security breaches in managed SQL services. Users should also be aware of potential false positives, particularly regarding normal administrative activities. Proper identity verification and audit of user behavior are recommended to reduce unnecessary alerts while ensuring that suspicious modifications are thoroughly investigated.
Categories
- Cloud
- GCP
- Database
Data Sources
- Cloud Service
- Logon Session
- Application Log
Created: 2021-10-15