Skip to content

Conversation

murtaza-u
Copy link

Summary of the Pull Request

Added additional GCP rules

Changelog

new: additional GCP detection rules

  • IAM Custom Role Created
  • IAM Custom Role Deleted
  • IAM Member assigned role of type admin or owner
  • Service Account Access Key Created
  • Service Account Access Key Deleted
  • Storage Bucket IAM Permissions Modified
  • Logging Bucket Deleted

Example Log Event

Fixed Issues

SigmaHQ Rule Creation Conventions

  • If your PR adds new rules, please consider following and applying these conventions

Rules to detect:

- IAM Custom Role Created
- IAM Custom Role Deleted
- IAM Member assigned role of type admin or owner
- Service Account Access Key Created
- Service Account Access Key Deleted
- Storage Bucket IAM Permissions Modified
- Logging Bucket Deleted
@murtaza-u murtaza-u requested a review from achrefbensaad June 10, 2025 03:29
@murtaza-u murtaza-u self-assigned this Jun 10, 2025
detection:
selection:
gcp.audit.protoPayload.methodName: google.iam.admin.v1.DeleteRole
gcp.audit.protoPayload.response.deleted: "true"

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

is this required ? does it expect that the deletion is successful to match ?

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yes. The deletion can fail if the role is in use.

@achrefbensaad
Copy link

can you please add logging bucket creation & update rules (two separate rules)

@murtaza-u
Copy link
Author

can you please add logging bucket creation & update rules (two separate rules)

Will do

@murtaza-u murtaza-u requested a review from achrefbensaad June 10, 2025 07:14
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants