
Summary
This rule detects when a Virtual Private Cloud (VPC) route is deleted in Google Cloud Platform (GCP), which can impact the flow of network traffic between virtual machine instances and other destinations. The rationale for monitoring this activity is that adversaries may delete routes to disrupt network operations or evade defenses. The rule uses GCP audit logs to monitor for successful route deletions (identified by the event.action: v*.compute.routes.delete) and flags these events for further review. Investigation steps include verifying the user account that deleted the route, the implications of the deletion on network traffic, and determining any unauthorized activity. False positives may arise from routine administrative actions, necessitating the need for mitigating exceptions in such cases. Recommendations for response include isolating the affected VPC, restoring the deleted routes, reviewing user access permissions, and documenting incidents for future reference.
Categories
- Cloud
Data Sources
- Group
- Application Log
- Network Traffic
ATT&CK Techniques
- T1562
- T1562.007
Created: 2020-09-22