
Summary
This rule generates detection alerts for Google SecOps alerts recorded in configured indices, specifically targeting `logs-google_secops.alert-*`. It processes alert events every minute, utilizing a Kuery query that identifies events with the kind 'alert'. The primary purpose is to streamline investigations into Google SecOps alerts by allowing analysts to react quickly to potential threats in cloud environments. The rule incorporates guidelines for triaging alerts, analyzing potential false positives, and executing a response plan. It advises on examining event timelines, cross-referencing logs, and ensuring procedures are in place to handle alerts from known benign sources effectively. Furthermore, it details steps for response and remediation, including isolating affected systems, resetting compromised credentials, and enhancing monitoring capabilities.
Importantly, potential for false positives should be considered, especially concerning routine administrative tasks or automated scripts. It lays out best practices for reviewing and managing exceptions to maintain security integrity while preventing unnecessary noise in alert monitoring.
Categories
- Cloud
- Infrastructure
- GCP
- Kubernetes
- Containers
Data Sources
- Cloud Service
- Application Log
- Network Traffic
Created: 2025-07-31