Detections
- Home
- - Detections
- -DT116
- ID: DT116
- Created: 29th April 2025
- Updated: 29th April 2025
- Platform: Google Cloud Platform (GCP)
- Contributor: The ITM Team
GCP Unauthorized System or Service Modification
Monitor Google Cloud Audit Logs to detect unauthorized creation or modification of compute, storage, and IAM resources. Subjects creating GCP resources without authorization may be staging infrastructure for exfiltration or persistent insider access.
Where to Configure/Access
- Google Cloud Logging (Audit Logs): https://console.cloud.google.com/logs
- Admin Activity Logs Documentation: https://cloud.google.com/logging/docs/audit
Detection Methods
Monitor Admin Activity logs for key methods:
compute.instances.insert
(VMs)storage.buckets.create
(Buckets)compute.disks.insert
(Persistent disks)iam.serviceAccounts.create
(Service Accounts)
Use Log-Based Metrics and Cloud Monitoring alerting for policy violations.
Monitor project and folder-level activity for resource creation.
Indicators
- VMs or services created in unauthorized folders or projects.
- New service accounts with high privileges.
- Missing mandatory labels (environment, owner, compliance status).
Sections
ID | Name | Description |
---|---|---|
IF009.006 | Installing Crypto Mining Software | The subject installs and operates unauthorized cryptocurrency mining software on organizational systems, leveraging compute, network, and energy resources for personal financial gain. This activity subverts authorized system use policies, degrades operational performance, increases attack surface, and introduces external control risks.
Characteristics
Example ScenarioA subject installs a customized |