Protecting cloud environments requires protecting Identity and Access Management accounts against compromise. Compromising a privileged user account enables an attacker to make changes to a cloud environment, so detecting potential compromises is essential for securing organizations of every size. To help organizations stay secure, Google Cloud logs sensitive actions that are taken by IAM user accounts and notifies organization administrators of those actions directly through Advisory Notifications.
Sensitive actions are actions that can have a significant negative effect on your Google Cloud organization if they are taken by a malicious actor using a compromised account. These actions by themselves do not necessarily represent a threat to your organization or indicate that an account has been compromised. However, we recommend that you confirm that the actions were taken by your users with legitimate purposes.
Who receives Sensitive Actions notifications
Google Cloud notifies your organization of sensitive actions by sending an email notification to your organization-level essential contacts for security. If there are no essential contacts configured, the email notification is sent to all accounts that have the Organization Admin IAM role at the organization level.
How Sensitive Actions works
Google Cloud detects sensitive actions by monitoring your organization's Admin Activity Audit Logs. When a sensitive action is detected, Google Cloud writes the action in the Sensitive Actions Service platform log in the same project where the activity occurred. Google Cloud also includes the event in a notification delivered through Advisory Notifications.
The first time a sensitive action is observed in your organization, you receive a report that includes the initial action, plus any other actions that occur in the following hour. After the initial report, you receive reports for new sensitive actions in your organization at most once per week. If there have not been any sensitive actions in your organization for a long time, you might receive the one-hour report the next time a sensitive action is observed.
When Sensitive Actions are not produced
Google Cloud reports sensitive actions only if the principal that performs the action is a user account. Actions taken by a service account are not reported. Google developed this capability to protect against adversaries who gain access to end-user credentials and use those to take unwanted actions in cloud environments. Because many of these actions are common behavior for service accounts, logs and advisory notifications are not produced for these identities.
Sensitive actions cannot be detected if you have configured your Admin Activity
Audit Logs to be located in a specific region (that is, not the
region). For example, if you have
specified a storage region
_Required logs bucket in a certain resource, logs from that resource
cannot be scanned for sensitive actions.
If you have configured your Admin Activity Audit Logs to be encrypted with customer-managed encryption keys, your logs cannot be scanned for sensitive actions.
Sensitive Actions in Security Command Center
If you use the Premium tier of Security Command Center, you can receive Sensitive Actions as findings through the Sensitive Actions Service.
Although the Sensitive Actions logs and Advisory Notifications provide one lens on account behavior in your organization, Security Command Center provides additional insight and management capabilities for security teams who are protecting more complex, large, or important workloads and environments. We recommend monitoring Sensitive Actions as one piece of your overall security monitoring strategy.
For more information about Security Command Center, see the following:
Notifications for Sensitive Actions in Advisory Notifications are provided at no additional charge. Sensitive Actions logs in Cloud Logging incur ingestion and storage costs in accordance with Logging pricing. The volume of Sensitive Actions log entries depends on how often user accounts in your organization perform sensitive actions. These actions are typically uncommon.
Types of Sensitive Actions
Google Cloud informs you of the following types of sensitive actions.
Sensitive Roles Added
A principal with an Owner (
roles/owner) or Editor (
IAM role was granted at the organization level. These roles
permit a large number of actions across your organization.
Billing Admin Removed
A Billing Account Administrator (
roles/billing.admin) IAM role
was removed at the organization level. Removing this role can prevent users from
having visibility and provide a mechanism for an adversary to remain undetected.
Organization Policy Changed
An organization policy was created, updated, or deleted at the organization level. Organization policies at this level can affect the security of all your organization's Google Cloud resources.
Project-level SSH Key Added
A project-level SSH key was added to a Google Cloud project that did not previously have such a key. Project-level SSH keys can grant access to all the virtual machines (VMs) in the project.
GPU Instance Created
A VM with a GPU was created in a project by a person who had not created a GPU instance in that project recently. Compute Engine instances with GPUs can host workloads such as cryptocurrency mining.
Many Instances Created
Multiple VM instances were created by a user in a certain project. Large numbers of VM instances can be used for unexpected workloads such as cryptocurrency mining or denial-of-service attacks.
Many Instances Deleted
Multiple VM instances were deleted by a user in a certain project. Large numbers of instance deletions can disrupt your business.
- Learn how to view notifications.
- Learn how to respond to Sensitive Actions notifications.