GCP IAM Role Deletion
Identifies an Identity and Access Management (IAM) role deletion in Google Cloud Platform (GCP). A role contains a set of permissions that allows you to perform specific actions on Google Cloud resources. An adversary may delete an IAM role to inhibit access to accounts utilized by legitimate users.
Elastic rule (View on GitHub)
1[metadata]
2creation_date = "2020/09/22"
3integration = ["gcp"]
4maturity = "production"
5updated_date = "2024/05/21"
6
7[rule]
8author = ["Elastic"]
9description = """
10Identifies an Identity and Access Management (IAM) role deletion in Google Cloud Platform (GCP). A role contains a set
11of permissions that allows you to perform specific actions on Google Cloud resources. An adversary may delete an IAM
12role to inhibit access to accounts utilized by legitimate users.
13"""
14false_positives = [
15 """
16 Role deletions may be done by a system or network administrator. Verify whether the user email, resource name,
17 and/or hostname should be making changes in your environment. Role deletions by unfamiliar users or hosts should be
18 investigated. If known behavior is causing false positives, it can be exempted from the rule.
19 """,
20]
21index = ["filebeat-*", "logs-gcp*"]
22language = "kuery"
23license = "Elastic License v2"
24name = "GCP IAM Role Deletion"
25note = """## Setup
26
27The GCP Fleet integration, Filebeat module, or similarly structured data is required to be compatible with this rule."""
28references = ["https://cloud.google.com/iam/docs/understanding-roles"]
29risk_score = 21
30rule_id = "e2fb5b18-e33c-4270-851e-c3d675c9afcd"
31severity = "low"
32tags = [
33 "Domain: Cloud",
34 "Data Source: GCP",
35 "Data Source: Google Cloud Platform",
36 "Use Case: Identity and Access Audit",
37 "Tactic: Impact",
38]
39timestamp_override = "event.ingested"
40type = "query"
41
42query = '''
43event.dataset:gcp.audit and event.action:google.iam.admin.v*.DeleteRole and event.outcome:success
44'''
45
46
47[[rule.threat]]
48framework = "MITRE ATT&CK"
49[[rule.threat.technique]]
50id = "T1531"
51name = "Account Access Removal"
52reference = "https://attack.mitre.org/techniques/T1531/"
53
54
55[rule.threat.tactic]
56id = "TA0040"
57name = "Impact"
58reference = "https://attack.mitre.org/tactics/TA0040/"
Setup
The GCP Fleet integration, Filebeat module, or similarly structured data is required to be compatible with this rule.
References
Related rules
- GCP Service Account Deletion
- GCP Service Account Disabled
- GCP IAM Custom Role Creation
- GCP IAM Service Account Key Deletion
- GCP Service Account Creation