
Summary
This detection rule identifies events within Google Cloud Platform (GCP) where a service account has been either disabled or deleted. The rule relies on audit logs generated by GCP, specifically looking for API calls that end with `.serviceAccounts.disable` or `.serviceAccounts.delete`. Such actions can indicate potential misuse or attacks against a cloud infrastructure, as service accounts often have elevated privileges. The rule is designed to trigger alerts for administrators when these actions occur, thereby enabling them to investigate whether such actions are legitimate or indicative of potential compromise. Anomalous activity by users who are not expected to modify service accounts should be scrutinized, as this may represent malicious intent or misconfigured permissions within the GCP environment. The rule stresses a moderate level of caution and should be used in tandem with other monitoring practices to ensure secure operations within the cloud infrastructure.
Categories
- Cloud
- GCP
- Infrastructure
Data Sources
- Cloud Service
- Cloud Storage
Created: 2021-08-14