
Summary
This rule monitors for significant spikes in failure rates within Google Cloud Platform (GCP) Audit messages, which can indicate potential security issues such as privilege escalation, lateral movement, or reconnaissance activities commonly associated with attacks. The underlying mechanism is a machine learning job that analyzes the frequency and nature of audit log failures over a recent time frame (the last 60 minutes), reporting anomalies every 15 minutes. False positives may occur due to benign changes in cloud automation or service usage practices. The rule requires the presence of specific GCP Audit log data and appropriate machine learning jobs to function correctly. Setup instructions guide users in integrating GCP Audit logs with the Elastic Agent, emphasizing the importance of careful configuration to ensure detection efficacy.
Categories
- Cloud
- GCP
- Infrastructure
Data Sources
- Group
- Cloud Service
- Logon Session
- Network Traffic
- Application Log
ATT&CK Techniques
- T1526
- T1580
Created: 2025-10-06