[Rule Tuning] Admin Role Assigned to User - Google Workspace (#2266)

* tuning rule query and att&ck mappings

* adjusted description and query formatting

* Update rules/integrations/google_workspace/persistence_google_workspace_admin_role_assigned_to_user.toml

Co-authored-by: Jonhnathan <jonhnathancesar@gmail.com>

* adjusted risk and severity

Co-authored-by: Jonhnathan <jonhnathancesar@gmail.com>
This commit is contained in:
Terrance DeJesus
2022-08-26 12:35:44 -04:00
committed by GitHub
parent cd2539f1eb
commit 18df50443c
@@ -1,16 +1,18 @@
[metadata]
creation_date = "2020/11/17"
maturity = "production"
updated_date = "2022/08/24"
integration = "google_workspace"
maturity = "production"
min_stack_comments = "New fields added: required_fields, related_integrations, setup"
min_stack_version = "8.3.0"
updated_date = "2022/08/25"
[rule]
author = ["Elastic"]
description = """
Detects when an admin role is assigned to a Google Workspace user. An adversary may assign an admin role to a user in
order to elevate the permissions of another user account and persist in their targets environment.
Assigning the administrative role to a user will grant them access to the Google Admin console and grant them
administrator privileges which allow them to access and manage various resources and applications. An adversary may
create a new administrator account for persistence or apply the admin role to an existing user to carry out further
intrusion efforts. Users with super-admin privileges can bypass single-sign on if enabled in Google Workspace.
"""
false_positives = [
"""
@@ -37,15 +39,24 @@ The Google Workspace Fleet integration, Filebeat module, or similarly structured
- https://support.google.com/a/answer/7061566
- https://www.elastic.co/guide/en/beats/filebeat/current/filebeat-module-google_workspace.html"""
references = ["https://support.google.com/a/answer/172176?hl=en"]
risk_score = 47
risk_score = 73
rule_id = "68994a6c-c7ba-4e82-b476-26a26877adf6"
severity = "medium"
tags = ["Elastic", "Cloud", "Google Workspace", "Continuous Monitoring", "SecOps", "Identity and Access"]
severity = "high"
tags = [
"Elastic",
"Cloud",
"Google Workspace",
"Continuous Monitoring",
"SecOps",
"Identity and Access",
"Persistence",
]
timestamp_override = "event.ingested"
type = "query"
query = '''
event.dataset:google_workspace.admin and event.provider:admin and event.category:iam and event.action:ASSIGN_ROLE
event.dataset:"google_workspace.admin" and event.category:"iam" and event.action:"ASSIGN_ROLE"
and google_workspace.event.type:"DELEGATED_ADMIN_SETTINGS" and google_workspace.admin.role.name : *_ADMIN_ROLE
'''
@@ -55,6 +66,11 @@ framework = "MITRE ATT&CK"
id = "T1098"
name = "Account Manipulation"
reference = "https://attack.mitre.org/techniques/T1098/"
[[rule.threat.technique.subtechnique]]
id = "T1098.003"
name = "Additional Cloud Roles"
reference = "https://attack.mitre.org/techniques/T1098/003/"
[rule.threat.tactic]