
Summary
This rule detects potential privilege escalation attacks related to Google's Cloud Build service. If a user has permission to initiate a new build, they can access and potentially abuse the Cloud Build Service Account, leading to unauthorized access within the environment. The rule looks for logs of operations where the 'cloudbuild.builds.create' permission has been granted, indicating that the user may gain heightened access. The detection is crucial as users granted this permission will inherit all capabilities of the Cloud Build Service Account, which can be detrimental if not monitored or controlled appropriately.
Categories
- Cloud
- GCP
Data Sources
- Cloud Service
- Logon Session
ATT&CK Techniques
- T1548
Created: 2024-01-30