
Summary
This detection rule, authored by Elastic, focuses on the modification of IAM permissions for Google Cloud Platform (GCP) storage buckets. It aims to identify unauthorized changes to security settings that could endanger data integrity and accessibility. Adversaries might exploit IAM permissions modifications to circumvent security measures, leading to potential data exposure. The rule triggers alerts upon detecting successful changes to IAM permissions, highlighting the need for security audits and potential misconfigurations. Relevant investigation steps include reviewing event logs for permission changes, confirming outcomes, and analyzing the identity behind changes to ensure alignment with expected administrative activities. The rule accounts for and mitigates false positives, commonly arising from routine administrative operations, by allowing exceptions during maintenance windows. In the response phase, immediate revocation of unauthorized changes is crucial, alongside enhanced monitoring of affected resources to prevent future incidents. This proactive approach ensures that storage bucket permissions align with security best practices while swiftly addressing potential threats.
Categories
- Cloud
- Infrastructure
- Identity Management
Data Sources
- Group
- Cloud Service
- User Account
ATT&CK Techniques
- T1222
Created: 2020-09-21