BACKUP_HOSTS_DELETE_HOST
Cloud Audit Logs:
BACKUP_EXPIRE_IMAGE
Cloud Audit Logs:
BACKUP_REMOVE_PLAN
Cloud Audit Logs:
BACKUP_EXPIRE_IMAGES_ALL
Cloud Audit Logs:
BACKUP_TEMPLATES_DELETE_TEMPLATE
Cloud Audit Logs:
BACKUP_TEMPLATES_DELETE_POLICY
Cloud Audit Logs:
BACKUP_PROFILES_DELETE_PROFILE
Cloud Audit Logs:
BACKUP_APPLIANCES_REMOVE_APPLIANCE
Cloud Audit Logs:
BACKUP_STORAGE_POOLS_DELETE
Cloud Audit Logs:
BACKUP_REDUCE_BACKUP_EXPIRATION
Cloud Audit Logs:
BACKUP_REDUCE_BACKUP_FREQUENCY
Cloud Audit Logs:
BACKUP_DELETE_VAULT
Cloud Audit Logs:
BACKUP_DELETE_VAULT_BACKUP
Cloud Audit Logs:
BACKUP_DELETE_BACKUP_PLAN_ASSOCIATION
Cloud Audit Logs:
BRUTE_FORCE_SSH
authlog An actor successfully gained SSH access on a host through brute force techniques. Findings are classified as High severity by default. Cloud IDS: THREAT_IDENTIFIER CLOUD_IDS_THREAT_ACTIVITY
Cloud IDS logs
Cloud IDS detected threat events.
Cloud IDS detects layer 7 attacks by analyzing mirrored packets and, when a threat event is detected, sends a threat-class finding to Security Command Center. Finding category names start with "Cloud IDS" followed by the Cloud IDS threat identifier.
The Cloud IDS integration with Event Threat Detection does not include Cloud IDS vulnerability detections. Findings are classified as Low severity by default.
To learn more about Cloud IDS detections, see Cloud IDS Logging information.
Privilege Escalation: External Member Added To Privileged GroupEXTERNAL_MEMBER_ADDED_TO_PRIVILEGED_GROUP
Google Workspace Logs:
DATA_READ
An external member was added to a privileged Google Group (a group granted sensitive roles or permissions). A finding is generated only if the group doesn't already contain other external members from the same organization as the newly added member. To learn more, see Unsafe Google Group changes.
This finding isn't available for project-level activations. Findings are classified as High or Medium severity, depending on the sensitivity of the roles associated with the group change. For more information, see Sensitive IAM roles and permissions.
Privilege Escalation: Privileged Group Opened To PublicPRIVILEGED_GROUP_OPENED_TO_PUBLIC
Google Workspace:
DATA_READ
A privileged Google Group (a group granted sensitive roles or permissions) was changed to be accessible to the general public. To learn more, see Unsafe Google Group changes.
This finding isn't available for project-level activations. Findings are classified as High or Medium severity, depending on the sensitivity of the roles associated with the group change. For more information, see Sensitive IAM roles and permissions.
Privilege Escalation: Sensitive Role Granted To Hybrid GroupSENSITIVE_ROLE_TO_GROUP_WITH_EXTERNAL_MEMBER
Cloud Audit Logs:
Sensitive roles were granted to a Google Group with external members. To learn more, see Unsafe Google Group changes.
Findings are classified as High or Medium severity, depending on the sensitivity of the roles associated with the group change. For more information, see Sensitive IAM roles and permissions.
Defense Evasion: Breakglass Workload Deployment Created (Preview)BINARY_AUTHORIZATION_BREAKGLASS_WORKLOAD_CREATE
Cloud Audit Logs:
BINARY_AUTHORIZATION_BREAKGLASS_WORKLOAD_UPDATE
Cloud Audit Logs:
GCS_BUCKET_IP_FILTERING_MODIFIED
Cloud Audit Logs:
DEFENSE_EVASION_MODIFY_VPC_SERVICE_CONTROL
Cloud Audit Logs VPC Service Controls audit logs
An existing VPC Service Controls perimeter was changed that would lead to a reduction in the protection offered by that perimeter.
This finding isn't available for project-level activations. Findings are classified as Low severity by default.
Defense Evasion: Project HTTP Policy Block DisabledPROJECT_HTTP_POLICY_BLOCK_DISABLED
Cloud Audit Logs:
GKE_CONTROL_PLANE_CAN_GET_SENSITIVE_OBJECT
Cloud Audit Logs:
A potentially malicious actor attempted to determine what sensitive objects in GKE they can query for, by using the kubectl auth can-i get
command. Specifically, the rule detects whether the actor checked for API access on the following objects:
*
(all)cluster-admin
ClusterRole
Secret
Findings are classified as Low severity by default.
Discovery: Service Account Self-InvestigationSERVICE_ACCOUNT_SELF_INVESTIGATION
Cloud Audit Logs:
DATA_READ
An IAM service account credential was used to investigate the roles and permissions associated with that same service account.
Sensitive roles
Findings are classified as High or Medium severity, depending on the sensitivity of the roles granted. For more information, see Sensitive IAM roles and permissions.
Evasion: Access from Anonymizing ProxyANOMALOUS_ACCESS
Cloud Audit Logs:
DATA_EXFILTRATION_BIG_QUERY
Cloud Audit Logs: BigQueryAuditMetadata data access logs
DATA_READ
Detects the following scenarios:
Resources owned by the protected organization were saved outside of the organization, including copy or transfer operations.
This scenario is indicated by a subrule of exfil_to_external_table
and High severity.
Attempts were made to access BigQuery resources that are protected by VPC Service Controls.
This scenario is indicated by a subrule of vpc_perimeter_violation
and Low severity.
DATA_EXFILTRATION_BIG_QUERY_EXTRACTION
Cloud Audit Logs: BigQueryAuditMetadata data access logs
DATA_READ
Detects the following scenarios:
For project-level activations of the Security Command Center Premium tier, this finding is available only if the Standard tier is enabled in the parent organization.. Findings are classified as Low severity by default.
Exfiltration: BigQuery Data to Google DriveDATA_EXFILTRATION_BIG_QUERY_TO_GOOGLE_DRIVE
Cloud Audit Logs: BigQueryAuditMetadata data access logs
DATA_READ
A BigQuery resource that is owned by the protected organization was saved, through extraction operations, to a Google Drive folder. Findings are classified as Low severity by default. Exfiltration: Move to Public BigQuery resource DATA_EXFILTRATION_BIG_QUERY_TO_PUBLIC_RESOURCE
Cloud Audit Logs: BigQueryAuditMetadata data access logs
DATA_READ
A BigQuery resource was saved to a public resource owned by your organization. Findings are classified as Medium severity by default.
Exfiltration: Cloud SQL Data ExfiltrationCLOUDSQL_EXFIL_EXPORT_TO_EXTERNAL_GCS
CLOUDSQL_EXFIL_EXPORT_TO_PUBLIC_GCS
Cloud Audit Logs: MySQL data access logs
Detects the following scenarios:
For project-level activations of the Security Command Center Premium tier, this finding is available only if the Standard tier is enabled in the parent organization.. Findings are classified as High severity by default.
Exfiltration: Cloud SQL Restore Backup to External OrganizationCLOUDSQL_EXFIL_RESTORE_BACKUP_TO_EXTERNAL_INSTANCE
Cloud Audit Logs: MySQL admin activity logs
The backup of a Cloud SQL instance was restored to an instance outside of the organization. Findings are classified as High severity by default.
Exfiltration: Cloud SQL Over-Privileged GrantCLOUDSQL_EXFIL_USER_GRANTED_ALL_PERMISSIONS
Cloud Audit Logs: PostgreSQL data access logs
CLOUDSQL_SUPERUSER_WRITES_TO_USER_TABLES
Cloud Audit Logs: Cloud SQL for PostgreSQL data access logs
postgres
for PostgreSQL servers or root
for MySQL users) wrote to non-system tables. Findings are classified as Low severity by default. Privilege Escalation: AlloyDB Over-Privileged Grant ALLOYDB_USER_GRANTED_ALL_PERMISSIONS
Cloud Audit Logs: AlloyDB for PostgreSQL data access logs
ALLOYDB_SUPERUSER_WRITES_TO_USER_TABLES
Cloud Audit Logs: AlloyDB for PostgreSQL data access logs
postgres
) wrote to non-system tables. Findings are classified as Low severity by default. Initial Access: Dormant Service Account Action DORMANT_SERVICE_ACCOUNT_USED_IN_ACTION
Cloud Audit Logs: Admin Activity logs A dormant user-managed service account triggered an action. In this context, a service account is considered dormant if it has been inactive for more than 180 days. Findings are classified as High severity by default. Privilege Escalation: Dormant Service Account Granted Sensitive Role DORMANT_SERVICE_ACCOUNT_ADDED_IN_IAM_ROLE
Cloud Audit Logs: IAM Admin Activity audit logs
A dormant user-managed service account was granted one or more sensitive IAM roles. In this context, a service account is considered dormant if it has been inactive for more than 180 days.
Sensitive roles
Findings are classified as High or Medium severity, depending on the sensitivity of the roles granted. Findings are classified as Medium severity by default. For more information, see Sensitive IAM roles and permissions.
Privilege Escalation: Impersonation Role Granted For Dormant Service AccountDORMANT_SERVICE_ACCOUNT_IMPERSONATION_ROLE_GRANTED
Cloud Audit Logs: IAM Admin Activity audit logs A principal was granted permissions to impersonate a dormant user-managed service account. In this context, a service account is considered dormant if it has been inactive for more than 180 days. Findings are classified as Medium severity by default. Initial Access: Dormant Service Account Key Created DORMANT_SERVICE_ACCOUNT_KEY_CREATED
Cloud Audit Logs: Admin Activity logs A key was created for a dormant user-managed service account. In this context, a service account is considered dormant if it has been inactive for more than 180 days. Findings are classified as High severity by default. Initial Access: Leaked Service Account Key Used LEAKED_SA_KEY_USED
Cloud Audit Logs: Admin Activity logs
EXCESSIVE_FAILED_ATTEMPT
Cloud Audit Logs: Admin Activity logs A principal repeatedly triggered permission denied errors by attempting changes across multiple methods and services. Findings are classified as Medium severity by default. Persistence: Strong Authentication Disabled ENFORCE_STRONG_AUTHENTICATION
Google Workspace:
2-step verification was disabled for the organization.
This finding isn't available for project-level activations. Findings are classified as Medium severity by default.
Persistence: Two Step Verification Disabled2SV_DISABLE
Google Workspace Logs:
DATA_READ
A user disabled 2-step verification.
This finding isn't available for project-level activations. Findings are classified as Low severity by default.
Initial Access: Account Disabled HijackedACCOUNT_DISABLED_HIJACKED
Google Workspace Logs:
DATA_READ
A user's account was suspended due to suspicious activity.
This finding isn't available for project-level activations. Findings are classified as Medium severity by default.
Initial Access: Disabled Password LeakACCOUNT_DISABLED_PASSWORD_LEAK
Google Workspace Logs:
DATA_READ
A user's account was disabled because a password leak was detected.
This finding isn't available for project-level activations. Findings are classified as Low severity by default.
Initial Access: Government Based AttackGOV_ATTACK_WARNING
Google Workspace Logs:
DATA_READ
Government-backed attackers might have tried to compromise a user account or computer.
This finding isn't available for project-level activations. Findings are classified as High severity by default.
Initial Access: Log4j Compromise Attempt Unavailable Cloud Load Balancing Logs:Java Naming and Directory Interface (JNDI) lookups within headers or URL parameters were detected. These lookups might indicate attempts at Log4Shell exploitation. These findings have low severity, because they only indicate a detection or exploit attempt, not a vulnerability or a compromise.
This rule is always on. Findings are classified as Low severity by default.
Initial Access: Suspicious Login BlockedSUSPICIOUS_LOGIN
Google Workspace Logs:
DATA_READ
A suspicious login to a user's account was detected and blocked.
This finding isn't available for project-level activations. Findings are classified as Low severity by default.
Log4j Malware: Bad DomainLOG4J_BAD_DOMAIN
Cloud DNS logs Log4j exploit traffic was detected based on a connection to, or a lookup of, a known domain used in Log4j attacks. Findings are classified as Low severity by default. Log4j Malware: Bad IP LOG4J_BAD_IP
VPC flow logs
MALWARE_BAD_DOMAIN
Cloud DNS logs Malware was detected based on a connection to, or a lookup of, a known bad domain. Findings are classified as Low severity by default. Malware: bad IP MALWARE_BAD_IP
VPC flow logs
CRYPTOMINING_POOL_DOMAIN
Cloud DNS logs Cryptomining was detected based on a connection to, or a lookup of, a known mining domain. Findings are classified as Low severity by default. Malware: Cryptomining Bad IP CRYPTOMINING_POOL_IP
VPC flow logs
GCE_ADMIN_ADD_SSH_KEY
Cloud Audit Logs:
GCE_ADMIN_ADD_STARTUP_SCRIPT
Cloud Audit Logs:
IAM_ANOMALOUS_GRANT
Cloud Audit Logs:This finding includes subrules that provide more specific information about each instance of this finding.
The following list shows all possible subrules:
external_service_account_added_to_policy
, external_member_added_to_policy
: Privileges were granted to IAM users and service accounts that are not members of your organization or, if Security Command Center is activated at the project level only, your project.
Note: If Security Command Center is activated at the organization level at any tier, then this detector uses an organization's existing IAM policies as context. If Security Command Center activation is only at the project level, then the detector uses only the project's IAM policies as context.
If a sensitive IAM grant to an external member occurs, and there are less than three existing IAM policies that are similar to it, this detector generates a finding.
Sensitive roles
Findings are classified as High or Medium severity, depending on the sensitivity of the roles granted. Findings are classified as High severity by default. For more information, see Sensitive IAM roles and permissions.
external_member_invited_to_policy
: An external member was invited as the owner of the project through the InsertProjectOwnershipInvite
API.custom_role_given_sensitive_permissions
: The setIAMPolicy
permission was added to a custom role.service_account_granted_sensitive_role_to_member
: Privileged roles were granted to members through a service account. This subrule is triggered by a subset of sensitive roles that include only basic IAM roles and certain data storage roles. For more information, see Sensitive IAM roles and permissions.policy_modified_by_default_compute_service_account
: A default Compute Engine service account was used to modify project IAM settings.UNMANAGED_ACCOUNT_ADDED_IN_IAM_ROLE
Cloud Audit Logs:
ANOMALOUS_BEHAVIOR_NEW_API_METHOD
Cloud Audit Logs:
IAM_ANOMALOUS_BEHAVIOR_IP_GEOLOCATION
Cloud Audit Logs:
IAM user and service accounts accessed Google Cloud from anomalous locations, based on the geolocation of the requesting IP addresses.
This finding isn't available for project-level activations and they are classified as Low severity by default.
Persistence: New User AgentIAM_ANOMALOUS_BEHAVIOR_USER_AGENT
Cloud Audit Logs:
IAM service accounts accessed Google Cloud from anomalous or suspicious user agents.
This finding isn't available for project-level activations. Findings are classified as Low severity by default.
Persistence: SSO Enablement ToggleTOGGLE_SSO_ENABLED
Google Workspace:
The Enable SSO (single sign-on) setting on the admin account was disabled.
This finding isn't available for project-level activations. Findings are classified as High severity by default.
Persistence: SSO Settings ChangedCHANGE_SSO_SETTINGS
Google Workspace:
The SSO settings for the admin account were changed.
This finding isn't available for project-level activations. Findings are classified as High severity by default.
Privilege Escalation: Anomalous Impersonation of Service Account for Admin ActivityANOMALOUS_SA_DELEGATION_IMPERSONATION_OF_SA_ADMIN_ACTIVITY
Cloud Audit Logs:
ANOMALOUS_SA_DELEGATION_MULTISTEP_ADMIN_ACTIVITY
Cloud Audit Logs:
ANOMALOUS_SA_DELEGATION_MULTISTEP_DATA_ACCESS
Cloud Audit Logs:
ANOMALOUS_SA_DELEGATION_IMPERSONATOR_ADMIN_ACTIVITY
Cloud Audit Logs:
ANOMALOUS_SA_DELEGATION_IMPERSONATOR_DATA_ACCESS
Cloud Audit Logs:
GKE_CONTROL_PLANE_EDIT_SENSITIVE_RBAC_OBJECT
Cloud Audit Logs:
ClusterRole
, RoleBinding
, or ClusterRoleBinding
role-based access control (RBAC) object of the sensitive cluster-admin
role by using a PUT
or PATCH
request. Findings are classified as Low severity by default. Privilege Escalation: Create Kubernetes CSR for master cert GKE_CONTROL_PLANE_CSR_FOR_MASTER_CERT
Cloud Audit Logs:
cluster-admin
access. Findings are classified as High severity by default. Privilege Escalation: Creation of sensitive Kubernetes bindings GKE_CONTROL_PLANE_CREATE_SENSITIVE_BINDING
Cloud Audit Logs:
RoleBinding
or ClusterRoleBinding
object for the cluster-admin
role. Findings are classified as Low severity by default. Privilege Escalation: Get Kubernetes CSR with compromised bootstrap credentials GKE_CONTROL_PLANE_GET_CSR_WITH_COMPROMISED_BOOTSTRAP_CREDENTIALS
Cloud Audit Logs:
kubectl
command, using compromised bootstrap credentials. Findings are classified as High severity by default. Privilege Escalation: Launch of privileged Kubernetes container GKE_CONTROL_PLANE_LAUNCH_PRIVILEGED_CONTAINER
Cloud Audit Logs:
A potentially malicious actor created a Pod that contains privileged containers or containers with privilege escalation capabilities.
A privileged container has the privileged
field set to true
. A container with privilege escalation capabilities has the allowPrivilegeEscalation
field set to true
. For more information, see the SecurityContext v1 core API reference in the Kubernetes documentation. Findings are classified as Low severity by default.
SERVICE_ACCOUNT_KEY_CREATION
Cloud Audit Logs:
GLOBAL_SHUTDOWN_SCRIPT_ADDED
Cloud Audit Logs:
GLOBAL_STARTUP_SCRIPT_ADDED
Cloud Audit Logs:
ORG_LEVEL_SERVICE_ACCOUNT_TOKEN_CREATOR_ROLE_ADDED
Cloud Audit Logs:
PROJECT_LEVEL_SERVICE_ACCOUNT_TOKEN_CREATOR_ROLE_ADDED
Cloud Audit Logs:
OS_PATCH_EXECUTION_FROM_SERVICE_ACCOUNT
Cloud Audit Logs.
MODIFY_BOOT_DISK_ATTACH_TO_INSTANCE
Cloud Audit Logs:
SECRETS_ACCESSED_IN_KUBERNETES_NAMESPACE
Cloud Audit Logs:
OFFENSIVE_SECURITY_DISTRO_ACTIVITY
Cloud Audit Logs:
SERVICE_ACCOUNT_EDITOR_OWNER
Cloud Audit Logs:
INFORMATION_GATHERING_TOOL_USED
Cloud Audit Logs:
SUSPICIOUS_TOKEN_GENERATION_IMPLICIT_DELEGATION
Cloud Audit Logs:
iam.serviceAccounts.implicitDelegation
permission was misused to generate access tokens from a more privileged service account. Findings are classified as Low severity by default. Privilege Escalation: Suspicious Token Generation SUSPICIOUS_TOKEN_GENERATION_SIGN_JWT
Cloud Audit Logs:
serviceAccounts.signJwt
method to generate an access token for another service account. Findings are classified as Low severity by default. Privilege Escalation: Suspicious Token Generation SUSPICIOUS_TOKEN_GENERATION_CROSS_PROJECT_OPENID
Cloud Audit Logs:
The iam.serviceAccounts.getOpenIdToken
IAM permission was used across projects.
This finding isn't available for project-level activations. Findings are classified as Low severity by default.
Privilege Escalation: Suspicious Token GenerationSUSPICIOUS_TOKEN_GENERATION_CROSS_PROJECT_ACCESS_TOKEN
Cloud Audit Logs:
The iam.serviceAccounts.getAccessToken
IAM permission was used across projects.
This finding isn't available for project-level activations. Findings are classified as Low severity by default.
Privilege Escalation: Suspicious Cross-Project Permission UseSUSPICIOUS_CROSS_PROJECT_PERMISSION_DATAFUSION
Cloud Audit Logs:
The datafusion.instances.create
IAM permission was used across projects.
This finding isn't available for project-level activations. Findings are classified as Low severity by default.
Command and Control: DNS TunnelingDNS_TUNNELING_IODINE_HANDSHAKE
Cloud DNS logs The handshake of the DNS tunneling tool Iodine was detected. Findings are classified as Low severity by default. Defense Evasion: VPC Route Masquerade Attempt VPC_ROUTE_MASQUERADE
Cloud Audit Logs:
BILLING_DISABLED_SINGLE_PROJECT
Cloud Audit Logs:
BILLING_DISABLED_MULTIPLE_PROJECTS
Cloud Audit Logs:
VPC_FIREWALL_HIGH_PRIORITY_BLOCK
Cloud Audit Logs:
VPC_FIREWALL_MASS_RULE_DELETION
Cloud Audit Logs:
VPC firewall rules were mass deleted by non-service accounts.
This rule is temporarily unavailable. To monitor updates to your firewall rules, use the Cloud audit logs. Findings are classified as Low severity by default.
Impact: Service API DisabledSERVICE_API_DISABLED
Cloud Audit Logs:
MIG_AUTOSCALING_SET_TO_MAX
Cloud Audit Logs:
UNAUTHORIZED_SERVICE_ACCOUNT_API_CALL
Cloud Audit Logs:
ANONYMOUS_SESSIONS_GRANTED_CLUSTER_ADMIN
Cloud Audit Logs:
ClusterRoleBinding
object was created, adding the root-cluster-admin-binding
behavior to anonymous users. Findings are classified as Low severity by default. Persistence: New Geography for AI Service AI_IAM_ANOMALOUS_BEHAVIOR_IP_GEOLOCATION
Cloud Audit Logs:
IAM user and service accounts accessed Google Cloud AI services from anomalous locations, based on the geolocation of the requesting IP addresses.
This finding isn't available for project-level activations and they are classified as Low severity by default.
Privilege Escalation: Anomalous Multistep Service Account Delegation for AI Admin ActivityAI_ANOMALOUS_SA_DELEGATION_MULTISTEP_ADMIN_ACTIVITY
Cloud Audit Logs:
AI_ANOMALOUS_SA_DELEGATION_MULTISTEP_DATA_ACCESS
Cloud Audit Logs:
AI_ANOMALOUS_SA_DELEGATION_IMPERSONATOR_ADMIN_ACTIVITY
Cloud Audit Logs:
AI_ANOMALOUS_SA_DELEGATION_IMPERSONATOR_DATA_ACCESS
Cloud Audit Logs:
AI_ANOMALOUS_SA_DELEGATION_IMPERSONATION_OF_SA_ADMIN_ACTIVITY
Cloud Audit Logs:
AI_ANOMALOUS_BEHAVIOR_NEW_API_METHOD
Cloud Audit Logs:
AI_DORMANT_SERVICE_ACCOUNT_USED_IN_ACTION
Cloud Audit Logs: Admin Activity logs A dormant user-managed service account triggered an action in AI services. In this context, a service account is considered dormant if it has been inactive for more than 180 days. Findings are classified as High severity by default. Initial Access: Anonymous GKE Resource Created from the Internet (Preview) GKE_RESOURCE_CREATED_ANONYMOUSLY_FROM_INTERNET
Cloud Audit Logs:
GKE_RESOURCE_MODIFIED_ANONYMOUSLY_FROM_INTERNET
Cloud Audit Logs:
GKE_ANONYMOUS_USERS_GRANTED_ACCESS
Cloud Audit Logs:
Someone created an RBAC binding that references one of the following users or groups:
system:anonymous
system:unauthenticated
system:authenticated
These users and groups are effectively anonymous and should be avoided when creating role bindings or cluster role bindings to any RBAC roles. Review the binding to ensure that it is necessary. If the binding isn't necessary, remove it. Findings are classified as Medium severity by default.
Execution: Suspicious Exec or Attach to a System Pod (Preview)GKE_SUSPICIOUS_EXEC_ATTACH
Cloud Audit Logs:
exec
or attach
commands to get a shell or execute a command on a container running in the kube-system
namespace. These methods are sometimes used for legitimate debugging purposes. However, the kube-system
namespace is intended for system objects created by Kubernetes, and unexpected command execution or shell creation should be reviewed. Findings are classified as Medium severity by default. Privilege Escalation: Workload Created with a Sensitive Host Path Mount (Preview) GKE_SENSITIVE_HOSTPATH
Cloud Audit Logs:
hostPath
volume mount to a sensitive path on the host node's file system. Access to these paths on the host filesystem can be used to access privileged or sensitive information on the node and for container escapes. If possible, don't allow any hostPath
volumes in your cluster. Findings are classified as Low severity by default. Privilege Escalation: Workload with shareProcessNamespace enabled (Preview) GKE_SHAREPROCESSNAMESPACE_POD
Cloud Audit Logs:
shareProcessNamespace
option set to true
, allowing all containers to share the same Linux process namespace. This could allow an untrusted or compromised container to escalate privileges by accessing and controlling environment variables, memory, and other sensitive data from processes running in other containers. Findings are classified as Low severity by default. Privilege Escalation: ClusterRole with Privileged Verbs (Preview) GKE_CLUSTERROLE_PRIVILEGED_VERBS
Cloud Audit Logs:
ClusterRole
that contains the bind
, escalate
, or impersonate
verbs. A subject that's bound to a role with these verbs can impersonate other users with higher privileges, bind to additional Roles
or ClusterRoles
that contain additional permissions, or modify their own ClusterRole permissions. This might lead to those subjects gaining cluster-admin privileges. Findings are classified as Low severity by default. Privilege Escalation: ClusterRoleBinding to Privileged Role GKE_CRB_CLUSTERROLE_AGGREGATION_CONTROLLER
Cloud Audit Logs:
ClusterRoleBinding
that references the default system:controller:clusterrole-aggregation-controller
ClusterRole
. This default ClusterRole
has the escalate
verb, which allows subjects to modify the privileges of their own roles, allowing for privilege escalation. Findings are classified as Low severity by default. Defense Evasion: Manually Deleted Certificate Signing Request (CSR) GKE_MANUALLY_DELETED_CSR
Cloud Audit Logs:
GKE_APPROVE_CSR_FORBIDDEN
Cloud Audit Logs:
GKE_CSR_APPROVED
Cloud Audit Logs:
GKE_REVERSE_SHELL_POD
Cloud Audit Logs:
GKE_POD_MASQUERADING
Cloud Audit Logs:
GKE_SUSPICIOUS_EXPLOIT_POD
Cloud Audit Logs:
GKE_SERVICE_ACCOUNT_CREATION_SENSITIVE_NAMESPACE
Cloud Audit Logs:
kube-system
and kube-public
namespaces are critical for GKE cluster operations, and unauthorized service accounts could compromise cluster stability and security. Findings are classified as Low severity by default. Impact: Suspicious Kubernetes Container Names - Cryptocurrency Mining GKE_SUSPICIOUS_CRYPTOMINING_POD
Cloud Audit Logs:
GKE_SENSITIVE_NAMESPACE_WORKLOAD_TRIGGERED
Cloud Audit Logs:
kube-system
or kube-public
namespaces. These namespaces are critical for GKE cluster operations, and unauthorized workloads could compromise cluster stability or security. Findings are classified as Low severity by default. Execution: GKE launch excessively capable container (Preview) GKE_EXCESSIVELY_CAPABLE_CONTAINER_CREATED
Cloud Audit Logs:
CAP_SYS_MODULE
CAP_SYS_RAWIO
CAP_SYS_PTRACE
CAP_SYS_BOOT
CAP_DAC_READ_SEARCH
CAP_NET_ADMIN
CAP_BPF
GKE_WEBHOOK_CONFIG_CREATED
Cloud Audit Logs:
GKE_STATIC_POD_CREATED
Cloud Audit Logs:
GKE_TOR_PROXY_IP_REQUEST
Cloud Audit Logs:
GKE_NODEPORT_SERVICE_CREATED
Cloud Audit Logs:
GKE_KUBE_DNS_MODIFICATION
Cloud Audit Logs:
CLOUD_RUN_JOBS_CRYPTOMINING_COMMANDS
Cloud Audit Logs:
CLOUD_RUN_CRYPTOMINING_DOCKER_IMAGES
Cloud Audit Logs:
CLOUD_RUN_SERVICES_SET_IAM_POLICY
Cloud Audit Logs:
CLOUD_DB_LOGIN_SUCCEEDED_ANON_IP
Cloud Audit Logs: AlloyDB for PostgreSQL data access logs
CLOUD_DB_LOGIN_FAILED_ANON_IP
Cloud Audit Logs: AlloyDB for PostgreSQL data access logs
RetroSearch is an open source project built by @garambo | Open a GitHub Issue
Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo
HTML:
3.2
| Encoding:
UTF-8
| Version:
0.7.4