Skip to content

Disable Data Access Audit Logs for a GCP Service

Platform: GCP

Mappings

  • MITRE ATT&CK
    • Defense Evasion

Description

Removes the Data Access audit log configuration for Cloud Storage from the project IAM policy. Data Access audit logs record data access operations such as reads and writes to GCS objects. Disabling them reduces an attacker's visibility footprint in Cloud Logging.

Warm-up:

  • Snapshot the current project IAM policy (including any pre-existing audit config for storage.googleapis.com) so it can be restored on revert

Detonation:

  • Set a DATA_READ and DATA_WRITE auditConfig entry for storage.googleapis.com (overwriting any existing config)
  • Remove the auditConfig entry for storage.googleapis.com from the project IAM policy via the Cloud Resource Manager API

Revert:

  • Restore the exact auditConfig that existed before detonation (including any custom log types or exempted members), or leave the config absent if it was not present before

References:

Instructions

Detonate with Stratus Red Team
stratus detonate gcp.defense-evasion.disable-audit-logs

Detection

Identify when Data Access audit log configuration is removed from the project IAM policy by monitoring for SetIamPolicy events in GCP Admin Activity audit logs where the request removes or reduces auditConfigs entries.