
Before you begin
- Labs create a Google Cloud project and resources for a fixed time
- Labs have a time limit and no pause feature. If you end the lab, you'll have to restart from the beginning.
- On the top left of your screen, click Start lab to begin
Grant permissions to an external account
/ 50
Fix the finding
/ 50
Event Threat Detection is one of Security Command Center's (SCC) services. Event Threat Detection is a log-based threat analysis that continuously monitors Google Cloud logs for potential threats. When Event Threat Detection identifies suspicious activity, it generates a finding that you can investigate.
In this lab, you’ll analyze findings in the Google Cloud Security Command Center and examine related events in Cloud Logging.
Recently, the security team discovered two threat findings relating to suspicious activity with user accounts. The threat findings were promptly investigated and remediated. One of the findings was determined to be benign user activity while the other finding was confirmed as malicious. Your team lead, Chloe, has tasked you with examining the details behind each finding so that you can understand the difference between normal activity and malicious activity. To do this, you'll recreate the malicious activity to trigger IAM detectors, analyze the logs associated with both threat findings, and then remediate the malicious finding.
Here's how you'll do this task: First, you'll grant permissions to an external account to trigger an Event Threat Detection IAM finding. Then, you'll use the Security Command Center to access the two IAM findings. Next, you'll analyze details of the findings using Security Command Center and Cloud Logging to determine which finding is benign activity and which is anomalous. Finally, you'll remediate the finding related to the malicious IAM activity by adjusting the IAM settings.
Read these instructions. Labs are timed and you cannot pause them. The timer, which starts when you click Start Lab, shows how long Google Cloud resources will be made available to you.
This practical lab lets you do the activities yourself in a real cloud environment, not in a simulation or demo environment. It does so by giving you new, temporary credentials that you use to sign in and access Google Cloud for the duration of the lab.
To complete this lab, you need:
Click the Start Lab button. On the left is the Lab Details panel with the following:
Click Open Google Cloud console (or right-click and select Open Link in Incognito Window) if you are running the Chrome browser. The Sign in page opens in a new browser tab.
Tip: You can arrange the tabs in separate, side-by-side windows to easily switch between them.
If necessary, copy the Google Cloud username below and paste it into the Sign in dialog. Click Next.
You can also find the Google Cloud username in the Lab Details panel.
You can also find the Google Cloud password in the Lab Details panel.
After a few moments, the Console opens in this tab.
In this task, you’ll grant project owner rights to an external gmail account. Granting owner rights to an external account will trigger the Event Threat Detection IAM detectors. Granting project owner rights to an external account is considered anomalous behavior or potentially malicious activity. Event Threat Detection will identify this activity as a threat and generate findings which you'll examine in the upcoming tasks.
On the View By Principals tab, note the two student users that have been automatically configured for the qwiklabs.net organization. These two users are also the same users listed in the Lab details panel as Google Cloud username 1 and Google Cloud username 2.
These two users have automatically been granted owner roles to the lab project by a service account as part of a normal provisioning process. This will trigger an alert finding or incident because an external principal has an owner role. However, because both users belong to the qwiklabs.net organization this alert is considered normal activity. You will examine this alert finding later.
You have now assigned the owner role to the external user bad.actor.demo@gmail.com. This will trigger a finding in SCC because this user is outside of the qwiklabs.net organization.
Click Check my progress to verify that you have completed this task correctly.
In this task, you’ll access the Event Threat Detection findings in the Security Command Center.
You should notice three findings with high severities listed in the Finding query results panel. In this lab, you’ll examine two Persistence: IAM anomalous grant findings to determine whether the finding is normal activity or whether it is malicious.
The Persistence: IAM anomalous grant indicates that an anomalous IAM grant was detected. This means that a user or service account was granted access to a resource that they should not have had access to. This could be a potential indication of a malicious actor attempting to gain unauthorized access to your environment.
Next, filter the findings to display a list of Persistence: IAM anomalous grant category findings.
The filter returns two Persistence: IAM anomalous grant findings.
In this task, you'll examine these findings to determine which is normal activity and which is a genuine incident.
In the Findings query results panel, in the Category column, click the Persistence: IAM Anomalous Grant finding with the earliest event time. The Persistence: IAM Anomalous Grant dialog opens on the Summary tab, which displays the finding summary.
Find the Principal email row. This is the user account that granted the owner role to the user. Notice that the service account belongs to the qwiklabs.net organization. With this information, you can establish that this finding represents normal and expected activity.
Click the Source Properties tab, and expand properties > sensitiveRoleGrant > members. Again, the email address listed for principalEmail is the user that granted the owner role, and the email address(es) listed for members is the user that was granted the owner role.
Next, you'll locate the malicious activity associated with the external user account you had granted access to: bad.actor.demo@gmail.com.
In this task, you’ll access the events related to the Security Command Center findings in Cloud Logging.
This query filters the IAM logs.
You can now examine the details of the anomalous request event including information such as:
This information can be vital when investigating whether an event is normal activity or an actual threat event.
In this task, you’ll remediate the malicious Persistence: IAM Anomalous Grant finding by removing the project owner role that you had previously assigned to the external user.
The policy will be updated, and the owner role removed from the bad.actor.demo@gmail.com user.
Click Check my progress to verify that you have completed this task correctly.
Great work! Through this lab activity, you have gained practical experience in analyzing a security alert to determine whether it is a genuine malicious activity.
You did this by granting permissions to an external user, viewing the Event Threat Detection findings in the Security Command Center, and accessing the findings in Cloud Logging. Finally, you remediated the finding by removing the project owner role from the external user.
As a security analyst, these are skills that can enable you to quickly take steps to contain, mitigate, and remediate any threats.
Before you end the lab, make sure you’re satisfied that you’ve completed all the tasks. When you're ready, click End Lab and then click Submit.
Ending the lab will remove your access to the lab environment, and you won’t be able to access the work you've completed in it again.
Copyright 2024 Google LLC All rights reserved. Google and the Google logo are trademarks of Google LLC. All other company and product names may be trademarks of the respective companies with which they are associated.
This content is not currently available
We will notify you via email when it becomes available
Great!
We will contact you via email if it becomes available
One lab at a time
Confirm to end all existing labs and start this one