heroui logo

GCP IAM serviceAccounts getAccessToken Privilege Escalation

Panther Rules

View Source
Summary
The rule identifies potential privilege escalation attempts in Google Cloud Platform (GCP) environments involving IAM service accounts. The IAM service is crucial for managing user identities and access permissions within GCP, and the detection focuses specifically on the permission `iam.serviceAccounts.getAccessToken`. If this permission is granted inappropriately, it could allow unauthorized access tokens to be generated, enabling a malicious user to escalate privileges within the environment. The rule uses GCP Audit Logs to monitor access attempts related to obtaining access tokens, ensuring that any granted tokens are legitimate and within defined policies. Analyzing log entries for whether the required permission is granted or denied enables proactive security measures. Users are encouraged to review the detailed audit trail referenced to understand how privilege escalation can occur in IAM configurations.
Categories
  • Cloud
  • GCP
  • Identity Management
Data Sources
  • Group
  • Cloud Service
  • Application Log
  • Logon Session
ATT&CK Techniques
  • T1548
Created: 2024-03-19