Reduce Log Retention Period on a Cloud Logging Sink Bucket
idempotent
Platform: GCP
Mappings
- MITRE ATT&CK
- Defense Evasion
Description
Sets a 1-day object lifecycle rule on the GCS bucket used by a Cloud Logging sink, causing exported audit logs to be automatically deleted after one day.
This is the GCP equivalent of the AWS CloudTrail lifecycle rule technique: rather than deleting the sink or disabling it (which raises an immediate alert), the attacker quietly shortens the retention window of the underlying storage bucket to minimize the forensic footprint of their activity.
Warm-up:
- Create a GCS bucket
- Create a log sink exporting audit logs (
cloudaudit.googleapis.com) to the bucket
Detonation:
- Apply a GCS lifecycle rule on the log sink bucket that deletes all objects after 1 day
Revert:
- Remove the lifecycle rule from the bucket
References:
- https://cloud.google.com/storage/docs/lifecycle
- https://www.justice.gov/usao-sdny/press-release/file/1452706/download
- https://attack.mitre.org/techniques/T1562/008/
Instructions
Detection
Identify when a lifecycle rule with a short expiration is applied to a GCS bucket used
for Cloud Logging export. Monitor for storage.buckets.update events in
GCP Data Access audit logs where the request sets a lifecycle rule with a short
expiration on a bucket associated with a logging sink.