heroui logo

gcp detect oauth token abuse

Splunk Security Content

View Source
Summary
This detection rule is designed to identify potential abuses of OAuth tokens within Google Cloud Platform (GCP). OAuth tokens without a defined expiration can be misused, allowing attackers to maintain unauthorized access to resources by reusing these tokens to avoid normal authentication controls. By analyzing GCP Cloud Audit Logs, specifically focusing on the `google_gcp_pubsub_message`, the rule extracts relevant fields to assess possible abuses, such as violations related to the caller's IP and the types of operations attempted. Monitoring such events is crucial for preventing lateral movement and securing cloud resources from unauthorized access. The rule is implemented through Splunk's GCP add-on, requiring specific log types to be present and access control policies to be active for effective detection. It is worth noting that the rule is marked as deprecated, indicating that users should look for alternative solutions or updates.
Categories
  • Cloud
  • GCP
  • Identity Management
Data Sources
    ATT&CK Techniques
    • T1078
    Created: 2024-11-14