
Summary
The provided rule identifies modifications made to firewall rules within Google Cloud Platform (GCP) for Virtual Private Cloud (VPC) and App Engine applications. These modifications can pose security risks as they may allow adversaries to weaken network defenses and create permissive ingress or egress flow. The detection mechanism leverages audit logs to monitor changes to firewall configurations, specifically looking for actions related to the patching of firewall rules in compute resources and App Engine firewall updates. The rule highlights the importance of investigating any alterations in firewall settings, including reviewing audit logs, identifying the user accounts responsible for changes, assessing the impact of these modifications, and determining if the alterations facilitate potential unauthorized access. Additionally, the rule outlines steps for managing false positives, such as routine administrative updates and automated scripts, which may produce alerts that require careful evaluation. The overall goal of the detection rule is to alert security teams of potential defense evasion tactics used by malicious actors, ensuring that prompt investigation and remediation steps can be followed to maintain the integrity of the cloud environment.
Categories
- Cloud
- GCP
- Infrastructure
Data Sources
- Cloud Service
- Network Traffic
- Firewall
ATT&CK Techniques
- T1562
Created: 2020-09-21