This document describes a threat finding type in Security Command Center. Threat findings are generated by threat detectors when they detect a potential threat in your cloud resources. For a full list of available threat findings, see Threat findings index.
Finding description
Anomalous Multistep Service Account Delegation
is detected when the Admin
Activity audit logs of an AI service show that an anomaly occurred in a service
account impersonation request.
To respond to this finding, do the following:
Step 1: Review finding details
Open the
Privilege Escalation: Anomalous Multistep Service Account Delegation for AI Data Access
finding, as directed in Reviewing findings. The details panel for the finding opens to the Summary tab.On the Summary tab, review the information in the following sections:
- What was detected, especially the following fields:
- Principal email: the final service account in the impersonation request that was used to access Google Cloud
- Method name: the method that was called
- Service account delegation information: details of service accounts in the delegation chain. The principal at the bottom of the list is the caller of the impersonation request
- AI resources: the potentially impacted AI resources, such as the Vertex AI resources and the AI model.
- Affected resource
- Related links, especially the following fields:
- Cloud Logging URI: link to Logging entries.
- MITRE ATT&CK method: link to the MITRE ATT&CK documentation.
- Related findings: links to any related findings.
- What was detected, especially the following fields:
Step 2: Research attack and response methods
- Contact the owner of the service account in the Principal email field. Confirm whether the legitimate owner conducted the action.
- Investigate the principals in the delegation chain to verify whether the request is abnormal and if any account has been compromised.
- Contact the owner of the impersonation caller in the Service account delegation info list. Confirm whether the legitimate owner conducted the action.
Step 3: Implement your response
The following response plan might be appropriate for this finding, but might also impact operations. Carefully evaluate the information you gather in your investigation to determine the best way to resolve findings.
- Contact the owner of the project where the action was taken.
- Consider deleting the potentially compromised service account and rotate and delete all service account access keys for the potentially compromised project. After deletion, resources that use the service account for authentication lose access. Before proceeding, your security team should identify all impacted resources and work with resource owners to ensure business continuity.
- Work with your security team to identify unfamiliar resources, including Compute Engine instances, snapshots, service accounts, and IAM users. Delete resources not created with authorized accounts.
- Respond to any notifications from Cloud Customer Care.
- To limit who can create service accounts, use the Organization Policy Service.
- To identify and fix overly permissive roles, use IAM Recommender.
What's next
- Learn how to work with threat findings in Security Command Center.
- Refer to the Threat findings index.
- Learn how to review a finding through the Google Cloud console.
- Learn about the services that generate threat findings.