
Summary
This rule is designed to detect high-risk permissions within Google Cloud Platform (GCP) by monitoring specific permissions that could allow adversaries to escalate privileges or move laterally within an environment if they obtain access to compromised accounts. High-risk permissions include actions like `iam.serviceAccounts.getAccessToken`, `iam.serviceAccounts.setIamPolicy`, and resource-dependent permissions like creating Dataflow jobs or managing Composer environments. The search query leverages `google_gcp_pubsub_message` logs, focusing on authorization events and filtering results based on high-risk activity. The detection provides alerting capabilities when such permissions are used, crucial for security monitoring and incident response in cloud environments.
Categories
- Cloud
- GCP
Data Sources
- Cloud Service
ATT&CK Techniques
- T1078
Created: 2024-11-14