heroui logo

Google Cloud VPN Tunnel Modified or Deleted

Sigma Rules

View Source
Summary
This detection rule identifies modifications or deletions made to VPN tunnels within the Google Cloud Platform (GCP). By monitoring specific method names related to VPN tunnel manipulation, this rule alerts security teams to potentially unauthorized changes. It targets actions taken via the GCP audit logs, specifically looking for the 'compute.vpnTunnels.insert' and 'compute.vpnTunnels.delete' method calls. A medium-level alert is triggered when these actions are detected, suggesting that while some modifications may be legitimate, they could also signal potential malicious activity. The rule emphasizes that administrators or authorized personnel may carry out legitimate changes, hence false positives may occur. It is crucial for security teams to verify user identities and agent behaviors before concluding an event as malicious. Investigations should focus on any alterations made by unfamiliar users or in unexpected contexts, as these scenarios may represent security threats.
Categories
  • Cloud
  • GCP
  • Infrastructure
Data Sources
  • Cloud Service
  • Logon Session
Created: 2021-08-16