GCP Storage Bucket Permissions Modification

Cortex XDR Analytics Alert Reference by data source

Last date published
2024-04-15
Order
data source

Synopsis

Activation Period

14 Days

Training Period

30 Days

Test Period

N/A (single event)

Deduplication Period

3 Hours

Required Data

  • Requires:
    • Gcp Audit Log

Detection Modules

Cloud

ATT&CK Tactic

Defense Evasion (TA0005)

ATT&CK Technique

File and Directory Permissions Modification (T1222)

Severity

Informational

Description

A GCP storage bucket's IAM permissions were modified. An attacker might use this technique to exposure sensitive data or data loss.

Attacker's Goals

Exfiltrate information.

Investigative actions

  • Check which data exists in the modified bucket and its classification.
  • Look for events that involve actions for the bucket data.