heroui logo

Unusual Country For a GCP Event

Elastic Detection Rules

View Source
Summary
This detection rule is designed to identify unusual GCP Audit event activities that originate from geographical locations inconsistent with expected user behavior. An anomaly threshold of 50 indicates that multiple events are needed to trigger an alert. The rule aims to catch potential misuse of compromised credentials or access keys by evaluating geolocation data against established patterns. Appropriate false positive considerations include temporary changes from authorized users caused by travel, remote work, or system reconfigurations. The alerting mechanism leverages machine learning for anomaly detection, necessitating the deployment of specific GCP audit integration and machine learning jobs within the Elastic ecosystem.
Categories
  • Cloud
  • GCP
  • Infrastructure
Data Sources
  • Group
  • Cloud Service
  • Application Log
  • Network Traffic
  • Cloud Storage
ATT&CK Techniques
  • T1078
  • T1078.004
Created: 2025-10-06