GCP SCC detect new geographical location which try to access the target GCP resource.
For this example:
xx@xxx.com is usually accessing from "US". It is detected that this principal email is now accessing from FR.
Verify if the reported principal email is indeed coming for the reported location.
Advice them on the following:
If is not, it could mean that hacker is trying to access to this resource.
| Yes / No | Action |
|---|---|
| Yes, it is a valid access | Update the JIRA ticket to be false positive. |
| No, it is not a valid access | The principal email could be compromised. Ask reported users to change their passwords. Update the JIRA ticket to be "Informed user". |
If the reported principal email belongs to a Google Service Account (GSA), please refer to the following:
| Prod / Non-Prod | Action |
|---|---|
| If GSA name starts with "sa-looker-", this is service account created to be used by Looker Studio Dashboard. | Update the JIRA ticket to be false positive. Reason is the GSA is used for Looker Studio Dashboard. |
| Non-Prod | Update the JIRA ticket to be false positive. Reason is the environment is non-production. Developers are using GSA for individual testing. |
| Prod, within Solvay's IP | Update the JIRA ticket to be false positive. |
| Prod, NOT within Solvay's IP | Inform the application owner about the access to production with GSA done by individuals. This might be a case that someone outside of Solvay connecting to Production data. Recommendation: Application Owner to investigate and rotate the GSA key for this service account to avoid further potential compromised to production data. |
{
"anomalousLocation": {
"anomalousLocation": "FR",
"callerIp": "xx.xx.xx.xx",
"principalEmail": "xx@xxx.com",
"notSeenInLast": "2592000s",
"typicalGeolocations": [{
"country": {
"identifier": "US"
}
}
]
}
} |
Problem when you use your own account for solution such as Data Studio: