
Summary
This detection rule aims to identify requests for access tokens within Google Workspace, a popular cloud productivity suite. Access tokens are crucial for validating user identities and managing permissions in cloud environments. While the mere request for an access token is not inherently malicious, it becomes a potential risk point, especially if correlated with other activities indicating escalated privileges, such as domain-wide delegation grants. By monitoring token generation events through the specified Splunk logic, security teams can gather important telemetry and create alerts that serve as indicators for further investigation, effectively allowing them to track unusual token usage patterns or potential unauthorized access attempts. The rule specifically captures relevant data about the event, including timestamps, user accounts, sources of requests, and resource identification, ensuring comprehensive monitoring of cloud-based access controls.
Categories
- Cloud
- GCP
- Identity Management
Data Sources
- Cloud Service
- Application Log
ATT&CK Techniques
- T1078.004
Created: 2024-02-09