Explanation:
GCP SCC Detects that a SSH Key has been added to the GCE resources as admin.
In Solvay, all access to the GCE has to be via the IAP proxy.
Resolution:
Further investigation is required to ensure the key is generated by Google IAP instead of the user manually add the SSH Key into the instance.
This can be either an expected or unexpected action.
The GCP Security team will need to evaluate based on the actions below:
| Actions | Follow up | |
|---|---|---|
Check in the GCE instance to see the SSH key if there is a google-ssh with expire date.
| Not successful - End the investigation with unexpected action. Successful - End the investigation with expected action. |
See the table below for recommended action after investigation.
| Yes / No | Action |
|---|---|
| Yes, it is expected | Update the JIRA ticket to be "False positive - This is google generated ssh key". |
| No, it is not expected | User is using ssh key to access the GCE. Escalate to cloudops team to:
|
Pattern:
{
"gceInstanceId": "1233xxx",
"projectId": "xxx",
"metadataKeyOperation": "MODIFIED",
"principalEmail": "xxx@solvay.com",
"callerIp": "xx.xx.xx.xx",
"callerUserAgent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/99.0.4844.84 Safari/537.36,gzip(gfe)"
}
The best way to get IT support is to use the new
Service One Platform.