Identifies the deletion of an Identity and Access Management (IAM) service account key in Google Cloud Platform (GCP). Each service account is associated with two sets of public/private RSA key pairs that are used to authenticate. If a key is deleted, the application will no longer be able to access Google Cloud resources using that key. A security best practice is to rotate your service account keys regularly.
Rule type: query
Risk score: 21
Runs every: 5m
Maximum alerts per execution: 100
- Continuous Monitoring
- Identity and Access
Rule license: Elastic License v2
## Config The GCP Fleet integration, Filebeat module, or similarly structured data is required to be compatible with this rule.
event.dataset:(googlecloud.audit or gcp.audit) and event.action:google.iam.admin.v*.DeleteServiceAccountKey and event.outcome:success
Framework: MITRE ATT&CKTM