
Summary
This detection rule monitors the Google Cloud Platform (GCP) for unauthorized privilege escalation activity through the creation of compute instances. Specifically, it listens for audit log entries corresponding to the `compute.instances.create` method. The rule is designed to flag instances where a user attempts to create a new compute instance that might exceed their granted permissions, potentially indicating an exploitation attempt or misuse of credentials. It is important to confirm whether such activities are legitimate changes authorized by administrative processes. The rule operates by evaluating the actions taken by specified users along with their permissions to ensure that they align with expected behaviors in GCP's security policy.
Categories
- Cloud
- GCP
- Infrastructure
Data Sources
- Group
- User Account
- Logon Session
- Application Log
ATT&CK Techniques
- T1548
Created: 2024-02-13