
Before you begin
- Labs create a Google Cloud project and resources for a fixed time
- Labs have a time limit and no pause feature. If you end the lab, you'll have to restart from the beginning.
- On the top left of your screen, click Start lab to begin
Shut down the vulnerable VM
/ 10
Create a new VM from existing snapshot
/ 10
Delete the compromised VM
/ 10
Modify storage bucket access
/ 20
Restrict SSH access
/ 10
Customize firewall rules
/ 30
Enable logging
/ 10
This lab is part of the capstone project. In this lab, you’ll apply your knowledge of cloud cybersecurity to identify and remediate vulnerabilities.
You’ll be given a scenario, and a set of tasks to complete in Google Cloud Security Command Center. These tasks will require you to use your skills to work to analyze and remediate active vulnerabilities relating to a security incident, answer questions about the vulnerabilities, and complete challenges that will assess your cloud cybersecurity skills.
There are also a number of challenges in the lab. A challenge is a task where you will be asked to complete the task on your own without instructions.
By successfully completing this lab, you will demonstrate your ability to identify, prioritize, and remediate security vulnerabilities and misconfigurations within the cloud environment. These are essential skills to enhance the security posture of Google Cloud environments, reducing the risk of data breaches, unauthorized access, and other security incidents.
For the last year, you've been working as a junior cloud security analyst at Cymbal Retail. Cymbal Retail is a market powerhouse currently operating 170 physical stores and an online platform across 28 countries. They reported $15 billion in revenue in 2022, and currently employ 80,400 employees across the world.
Cymbal Retail boasts a vast customer base with a multitude of transactions happening daily on their online platform. The organization is committed to the safety and security of its customers, employees, and its assets, ensuring that its operations meet internal and external regulatory compliance expectations in all the countries it operates in.
Recently, the company has experienced a massive data breach. As a junior member of the security team, you’ll help support the security team through the lifecycle of this security incident. You'll begin by identifying the vulnerabilities related to the breach, isolate and contain the breach to prevent further unauthorized access, recover the compromised systems, remediate any outstanding compliance related issues, and verify compliance with frameworks.
Here’s how you'll do this task: First you’ll examine the vulnerabilities and findings in Google Cloud Security Command Center. Next, you’ll shut the old VM down, and create a new VM from a snapshot. Then, you’ll evoke public access to the storage bucket and switch to uniform bucket-level access control. Next, you’ll limit the firewall ports access and fix the firewall rules. Finally, you’ll run a report to verify the remediation of the vulnerabilities.
Read these instructions. Labs are timed and you cannot pause them. The timer, which starts when you click Start Lab, shows how long Google Cloud resources will be made available to you.
This practical lab lets you do the activities yourself in a real cloud environment, not in a simulation or demo environment. It does so by giving you new, temporary credentials that you use to sign in and access Google Cloud for the duration of the lab.
To complete this lab, you need:
Click the Start Lab button. On the left is the Lab Details panel with the following:
Click Open Google Cloud console (or right-click and select Open Link in Incognito Window) if you are running the Chrome browser. The Sign in page opens in a new browser tab.
Tip: You can arrange the tabs in separate, side-by-side windows to easily switch between them.
If necessary, copy the Google Cloud username below and paste it into the Sign in dialog. Click Next.
You can also find the Google Cloud username in the Lab Details panel.
You can also find the Google Cloud password in the Lab Details panel.
After a few moments, the Console opens in this tab.
One morning, the security team detects unusual activity within their systems. Further investigation into this activity quickly reveals that the company has suffered a massive security breach across its applications, networks, systems, and data repositories. Attackers gained unauthorized access to sensitive customer information, including credit card data, and personal details. This incident requires immediate attention and thorough investigation. The first step towards understanding the scope and impact of this breach is to gather information and analyze the available data.
In this task, you'll examine the vulnerabilities and findings in Google Cloud Security Command Center to determine how the attackers gained access to the data, and which remediation steps to take.
First, navigate to the Security Command Center to view an overview of the active vulnerabilities.
You'll note that there are both high and medium severity findings relating to the Cloud Storage bucket, the Compute Instance virtual machine, and the firewall.
Next, navigate to the PCI DSS report.
The Payment Card Industry Data Security Standard (PCI DSS) is a set of security requirements that organizations must follow to protect sensitive cardholder data. As a retail company that accepts and processes credit card payments, Cymbal Retail must also ensure compliance with the PCI DSS requirements, to protect cardholder data.
As you examine the PCI DSS 3.2.1 report, notice that it lists the rules that are non-compliant, which relate to the data breach:
Since you're focusing on identifying and remediating the issues related to the security incident, please disregard the following findings as they do not relate to the remediation tasks you’re completing:
The following table pairs the rules listed in the report with their corresponding findings category. This will assist you when examining the findings according to resource type later:
Findings category | Rule |
---|---|
Firewall rule logging disabled | Firewall rule logging should be enabled so you can audit network access |
Open RDP port | Firewall rules should not allow connections from all IP addresses on TCP or UDP port 3389 |
Open SSH port | Firewall rules should not allow connections from all IP addresses on TCP or SCTP port 22 |
Public IP address | VMs should not be assigned public IP addresses |
Public bucket ACL | Cloud Storage buckets should not be anonymously or publicly accessible |
Full API access | Instances should not be configured to use the default service account with full access to all Cloud APIs |
Flow logs disabled | VPC Flow logs should be Enabled for every subnet VPC Network |
Primitive roles used | Basic roles (Owner, Writer, Reader) are too permissive and should not be used |
Egress deny rule not set | An egress deny rule should be set |
Overall, these findings indicate a critical lack of security controls and non-compliance with essential PCI DSS requirements; they also point to the vulnerabilities associated with the data breach.
Next, navigate to the Security Command Center, and filter the findings for further examination and analysis of the vulnerabilities in the Google Cloud environment.
The following active findings pertaining to the storage bucket should be listed:
These findings indicate that the bucket is configured with a combination of security settings that could expose the data to unauthorized access. You'll need to remediate these findings by removing the public access control list, disabling public bucket access, and enabling the uniform bucket level access policy.
The following active findings that pertain to the virtual machine named cc-app-01 should be listed:
These findings indicate the virtual machine was configured in a way that left it very vulnerable to the attack. To remediate these findings you'll shut the original VM (cc-app-01) down, and create a VM (cc-app-02) using a clean snapshot of the disk. The new VM will have the following settings in place:
The following active findings should be listed that pertain to the firewall:
These findings are all listed in the PCI DSS report and highlight a significant security gap in the network's configuration. The lack of restricted access to RDP and SSH ports, coupled with disabled firewall rule logging, makes the network highly vulnerable to unauthorized access attempts and potential data breaches. You'll need to remediate these by removing the existing firewall overly broad rules, and replacing them with a firewall rule that allows SSH access only from the addresses that are used by Google Cloud's IAP SSH service.
Now that you have analyzed the security vulnerabilities, it’s time to work on remediating the report findings.
In this task, you'll shut down the vulnerable VM cc-app-01, and create a new VM from a snapshot taken before the malware infection. VM snapshots are effective in restoring the system to a clean state, and ensures that the new VM will not be infected with the same malware that compromised the original VM.
The current VM cc-app-01 should be listed under VM instances. This is the vulnerable VM that has been compromised and must be shut down.
Click Check my progress to verify that you have completed this task correctly.
Next, create a new VM from a snapshot. This snapshot has already been created as part of Cymbal Retail's long term data backup plan.
The new VM cc-app-02 should now be created from the cc-app01-snapshot. (It may take a few minutes for the new VM to be created.)
Now, turn Secure Boot on for the new VM cc-app-02 to address the Secure Boot disabled finding.
Wait for the cc-app-02 VM to be stopped before you continue.
The cc-app-02 VM instance will restart and the Secure Boot disabled finding will be remediated.
Click Check my progress to verify that you have completed this task correctly.
Delete the compromised VM cc-app-01.
Click Check my progress to verify that you have completed this task correctly.
By following these steps, you have effectively created a new VM from the snapshot, ensuring it is free from malware and misconfigurations. You also deleted the compromised VM, eliminating the source of the security breach.
In this task, you'll revoke public access to the storage bucket and switch to uniform bucket-level access control, significantly reducing the risk of data breaches. By removing all user permissions from the storage bucket, you can prevent unauthorized access to the data stored within.
You'll note there is a myfile.csv file in the publicly accessible bucket. This is the file that contains the sensitive information that was dumped by the malicious actor. Perform the following steps to address the Public bucket ACL finding.
Click the Permissions tab.
In the Public access tile, click Prevent public access.
Click Confirm.
Switch the access control to uniform and remove permissions for the allUsers principals from the storage bucket to enforce a single set of permissions for the bucket and its objects. You'll also need to ensure that users who rely on basic project roles to access the bucket won't lose their access.
Click Check my progress to verify that you have completed this task correctly.
By following these steps, you have effectively prevented public access to the bucket, switched to uniform bucket-level access control, and removed all user permissions, addressing the Public bucket ACL, Bucket policy only disabled, and Bucket logging disabled findings.
In this task, you'll restrict access to RDP and SSH ports to only authorized source networks to minimize the attack surface and reduce the risk of unauthorized remote access.
Exercise extreme caution before modifying overly permissive firewall rules. The rules may be allowing legitimate traffic, and improperly restricting it could disrupt critical operations. In this lab, ensure the Compute Engine virtual machine instances tagged with target tag "cc" remain accessible via SSH connections from the Google Cloud Identity-Aware Proxy address range (35.235.240.0/20). To maintain uninterrupted management access, create a new, limited-access firewall rule for SSH traffic before removing the existing rule allowing SSH connections from any address.
Create a new firewall rule. This rule must restrict SSH access to only authorized IP addresses from the source network 35.235.240.0/20 to compute instances with the target tag cc.
Click Check my progress to verify that you have completed this task correctly.
In this task, you'll delete three specific VPC firewall rules that are responsible for allowing unrestricted access to certain network protocols, namely ICMP, RDP, and SSH, from any source within the VPC network. Then, you'll enable logging on the remaining firewall rules.
Delete the default-allow-icmp, default-allow-rdp, and default-allow-ssh firewall rules. These rules are overly broad and by deleting them, you'll allow for a more secure and controlled network environment.
By deleting these rules, you have restricted access to these protocols, limiting the potential for unauthorized access attempts and reducing the attack surface of your network.
Enable logging for the remaining firewall rules limit-ports (the rule you created in a previous task) and default-allow-internal.
Enabling logging allows you to track and analyze the traffic that is allowed by this rule, which is likely to be internal traffic between instances within your VPC.
Click Check my progress to verify that you have completed this task correctly.
By customizing firewall rules and enabling logging, you've addressed the Open SSH port, Open RDP port, and Firewall rule logging disabled findings. The new firewall rule better protects the network and improves network visibility.
After diligently addressing the vulnerabilities identified in the PCI DSS 3.2.1 report, it's crucial to verify the effectiveness of your remediation efforts. In this task, you'll run the report again to ensure that the previously identified vulnerabilities have been successfully mitigated and no longer pose a security risk to the environment.
All major vulnerabilities are now resolved.
Great work!
You have helped the security team at Cymbal Bank to mitigate the impact of the data breach, address the identified vulnerabilities, and significantly enhanced the security posture of Cymbal Bank’s Google Cloud environment.
First, you examined and analyzed the vulnerabilities and findings in Google Cloud Security Command Centre.
Next, you shut the old VM down and created a new VM from a snapshot taken before the malware infection.
Then, you fixed the cloud storage permissions by revoking public access to the storage bucket and switching to uniform bucket-level access control. You also removed all user permissions from the storage bucket.
Next, you fixed the firewall rules by deleting the default-allow-icmp, default-allow-rdp, and default-allow-ssh firewall rules, and enabling logging for the remaining firewall rules.
Finally, you run a compliance report to confirm that the vulnerability issues have been remediated.
Remember, as a security analyst it is crucial to maintain regular security audits and implement ongoing monitoring practices for continued protection against evolving threats and vulnerabilities.
Before you end the lab, make sure you’re satisfied that you’ve completed all the tasks. When you're ready, click End Lab and then click Submit.
Ending the lab will remove your access to the lab environment, and you won’t be able to access the work you've completed in it again.
Copyright 2024 Google LLC All rights reserved. Google and the Google logo are trademarks of Google LLC. All other company and product names may be trademarks of the respective companies with which they are associated.
This content is not currently available
We will notify you via email when it becomes available
Great!
We will contact you via email if it becomes available
One lab at a time
Confirm to end all existing labs and start this one