
Summary
This rule focuses on detecting the creation of custom IAM (Identity and Access Management) roles within Google Cloud Platform (GCP). By monitoring for the `createRole` event in GCP audit logs, the detection aims to identify instances where custom roles are deployed by users. Custom roles can pose a risk because adversaries may exploit this feature to escalate privileges or introduce unauthorized access rights within the cloud environment. The provided Splunk logic retrieves relevant log entries and organizes them for examination, emphasizing user actions and the resources involved. Investigating these events is critical for maintaining cloud security, as unfamiliar or unauthorized role creations could indicate a breach or malicious intent.
Categories
- Cloud
- GCP
Data Sources
- Cloud Service
- Group
ATT&CK Techniques
- T1078.004
Created: 2024-02-09