๐ก๏ธ Google Logging Log Metric Filter and Alerts Cloud Storage IAM Permission Changes do not exist๐ข
- Contextual name: ๐ก๏ธ Log Metric Filter and Alerts Cloud Storage IAM Permission Changes do not exist๐ข
- ID:
/ce/ca/google/logging/iam-permission-changes-monitoring
- Tags:
- ๐ข Policy with categories
- ๐ข Policy with type
- ๐ข Production policy
- Policy Type:
COMPLIANCE_POLICY
- Policy Categories:
SECURITY
Logicโ
- ๐ง prod.logic.yaml๐ข
Similar Policiesโ
- Cloud Conformity: Enable Monitoring for Bucket Permission Changes
Descriptionโ
Descriptionโ
It is recommended that a metric filter and alarm be established for Cloud Storage Bucket IAM changes.
Rationaleโ
Monitoring changes to cloud storage bucket permissions may reduce the time needed to detect and correct permissions on sensitive cloud storage buckets and objects inside the bucket.
Impactโ
Enabling of logging may result in your project being charged for the additional logs usage. These charges could be significant depending on the size of the organization.
Auditโ
From Google Cloud Consoleโ
Ensure the prescribed log metric is present:
For each project that contains cloud storage buckets, go to
Logging/Logs-based Metrics
by visiting https://console.cloud.google.com/logs/metrics.In the
User-defined Metrics
section, ensure at least one metric<Log_Metric_Name>
is present with the filter text:resource.type="gcs_bucket"
AND protoPayload.methodName="storage.setIamPermissions"Ensure that the prescribed alerting policy is present:
Go to
Alerting
by visiting https://console.cloud.google.com/monitoring/alerting.... see more
Remediationโ
Remediationโ
From Google Cloud Consoleโ
Create the prescribed log metric:
Go to
Logging/Logs-based Metrics
by visiting https://console.cloud.google.com/logs/metrics and click "CREATE METRIC".Click the down arrow symbol on the
Filter Bar
at the rightmost corner and selectConvert to Advanced Filter
.Clear any text and add:
resource.type="gcs_bucket"
AND protoPayload.methodName="storage.setIamPermissions"Click
Submit Filter
. Display logs appear based on the filter text entered by the user.In the
Metric Editor
menu on right, fill out the name field. SetUnits
to1
(default) andType
toCounter
. This ensures that the log metric counts the number of log entries matching the user's advanced logs query.Click
Create Metric
.Create the prescribed Alert Policy:
- Identify the newly created metric under the section
User-defined Metrics
at https://console.cloud.google.com/logs/metrics.- Click the 3-dot icon in the rightmost column for the new metric and select
Create alert from Metric
. A new page appears.... see more
policy.yamlโ
Linked Framework Sectionsโ
Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
---|---|---|---|---|---|
๐ผ CIS GCP v1.2.0 โ ๐ผ 2.10 Ensure that the log metric filter and alerts exist for Cloud Storage IAM permission changes - Level 1 (Automated) | 1 | no data | |||
๐ผ CIS GCP v1.3.0 โ ๐ผ 2.10 Ensure That the Log Metric Filter and Alerts Exist for Cloud Storage IAM Permission Changes - Level 1 (Automated) | 1 | no data | |||
๐ผ CIS GCP v2.0.0 โ ๐ผ 2.10 Ensure That the Log Metric Filter and Alerts Exist for Cloud Storage IAM Permission Changes - Level 2 (Automated) | 1 | no data | |||
๐ผ CIS GCP v3.0.0 โ ๐ผ 2.10 Ensure That the Log Metric Filter and Alerts Exist for Cloud Storage IAM Permission Changes - Level 2 (Automated) | 1 | no data | |||
๐ผ Cloudaware Framework โ ๐ผ Logging and Monitoring Configuration | 60 | no data |