
Summary
This detection rule monitors changes to custom IAM roles within Google Cloud Platform (GCP). It captures events related to the creation, deletion, or updating of custom roles, providing insights into potential privilege escalation scenarios. The rule is triggered based on GCP audit logs that document these changes, specifically monitoring methods such as 'google.iam.admin.v1.CreateRole', which reports when new roles are established. Although classified under informational severity, tracking such role changes is crucial for maintaining an organization's security posture and compliance with best practices. The rule's output can include details about the roles modified, permissions granted, and the associated user actions, allowing administrators to understand and audit access to sensitive resources in their GCP environment.
Categories
- Cloud
- GCP
- Identity Management
Data Sources
- Group
- Application Log
- Cloud Service
ATT&CK Techniques
- T1078
Created: 2022-09-02