Security Command Center analyzes various logs for potential threats that affect databases. The following log-based detections are available with Event Threat Detection:
Credential Access: CloudDB Failed login from Anonymizing Proxy IPExfiltration: Cloud SQL Data ExfiltrationExfiltration: Cloud SQL Over-Privileged GrantExfiltration: Cloud SQL Restore Backup to External OrganizationInitial Access: CloudDB Successful login from Anonymizing Proxy IPInitial Access: Database Superuser Writes to User TablesPrivilege Escalation: AlloyDB Database Superuser Writes to User TablesPrivilege Escalation: AlloyDB Over-Privileged GrantWhat's next
- Learn about Event Threat Detection.
- Refer to the Threat findings index.