GCP Logging Sink Modification

Identifies a modification to a Logging sink in Google Cloud Platform (GCP). Logging compares the log entry to the sinks in that resource. Each sink whose filter matches the log entry writes a copy of the log entry to the sink's export destination. An adversary may update a Logging sink to exfiltrate logs to a different export destination.

Elastic rule (View on GitHub)

 1[metadata]
 2creation_date = "2020/09/22"
 3integration = ["gcp"]
 4maturity = "production"
 5updated_date = "2024/05/21"
 6
 7[rule]
 8author = ["Elastic"]
 9description = """
10Identifies a modification to a Logging sink in Google Cloud Platform (GCP). Logging compares the log entry to the sinks
11in that resource. Each sink whose filter matches the log entry writes a copy of the log entry to the sink's export
12destination. An adversary may update a Logging sink to exfiltrate logs to a different export destination.
13"""
14false_positives = [
15    """
16    Logging sink modifications may be done by a system or network administrator. Verify whether the user email, resource
17    name, and/or hostname should be making changes in your environment. Sink modifications from unfamiliar users or
18    hosts should be investigated. If known behavior is causing false positives, it can be exempted from the rule.
19    """,
20]
21index = ["filebeat-*", "logs-gcp*"]
22language = "kuery"
23license = "Elastic License v2"
24name = "GCP Logging Sink Modification"
25note = """## Setup
26
27The GCP Fleet integration, Filebeat module, or similarly structured data is required to be compatible with this rule."""
28references = ["https://cloud.google.com/logging/docs/export#how_sinks_work"]
29risk_score = 21
30rule_id = "184dfe52-2999-42d9-b9d1-d1ca54495a61"
31severity = "low"
32tags = [
33    "Domain: Cloud",
34    "Data Source: GCP",
35    "Data Source: Google Cloud Platform",
36    "Use Case: Log Auditing",
37    "Tactic: Exfiltration",
38]
39timestamp_override = "event.ingested"
40type = "query"
41
42query = '''
43event.dataset:gcp.audit and event.action:google.logging.v*.ConfigServiceV*.UpdateSink and event.outcome:success
44'''
45
46
47[[rule.threat]]
48framework = "MITRE ATT&CK"
49[[rule.threat.technique]]
50id = "T1537"
51name = "Transfer Data to Cloud Account"
52reference = "https://attack.mitre.org/techniques/T1537/"
53
54
55[rule.threat.tactic]
56id = "TA0010"
57name = "Exfiltration"
58reference = "https://attack.mitre.org/tactics/TA0010/"

Setup

The GCP Fleet integration, Filebeat module, or similarly structured data is required to be compatible with this rule.

References

Related rules

to-top