|
| 1 | +[[prebuilt-rule-8-19-3-google-secops-external-alerts]] |
| 2 | +=== Google SecOps External Alerts |
| 3 | + |
| 4 | +Generates a detection alert for each Google SecOps alert written to the configured indices. Enabling this rule allows you to immediately begin investigating Google SecOps alerts in the app. |
| 5 | + |
| 6 | +*Rule type*: query |
| 7 | + |
| 8 | +*Rule indices*: |
| 9 | + |
| 10 | +* logs-google_secops.alert-* |
| 11 | + |
| 12 | +*Severity*: medium |
| 13 | + |
| 14 | +*Risk score*: 47 |
| 15 | + |
| 16 | +*Runs every*: 1m |
| 17 | + |
| 18 | +*Searches indices from*: now-2m ({ref}/common-options.html#date-math[Date Math format], see also <<rule-schedule, `Additional look-back time`>>) |
| 19 | + |
| 20 | +*Maximum alerts per execution*: 1000 |
| 21 | + |
| 22 | +*References*: |
| 23 | + |
| 24 | +* https://docs.elastic.co/en/integrations/google_secops |
| 25 | + |
| 26 | +*Tags*: |
| 27 | + |
| 28 | +* Data Source: Google SecOps |
| 29 | +* Use Case: Threat Detection |
| 30 | +* Resources: Investigation Guide |
| 31 | +* Promotion: External Alerts |
| 32 | + |
| 33 | +*Version*: 1 |
| 34 | + |
| 35 | +*Rule authors*: |
| 36 | + |
| 37 | +* Elastic |
| 38 | + |
| 39 | +*Rule license*: Elastic License v2 |
| 40 | + |
| 41 | + |
| 42 | +==== Investigation guide |
| 43 | + |
| 44 | + |
| 45 | +Triage and analysis |
| 46 | + |
| 47 | + |
| 48 | +*Investigating Google SecOps External Alerts* |
| 49 | + |
| 50 | + |
| 51 | +Google SecOps provides a robust framework for monitoring and managing security operations within cloud environments. The rule leverages specific event identifiers to flag suspicious alerts, enabling analysts to swiftly investigate potential threats and mitigate risks. |
| 52 | + |
| 53 | + |
| 54 | +*Possible investigation steps* |
| 55 | + |
| 56 | + |
| 57 | +- Examine the timeline of events leading up to and following the alert to identify any unusual patterns or activities that may indicate malicious behavior. |
| 58 | +- Cross-reference the alert with other security logs and alerts to determine if it is part of a broader attack pattern or isolated incident. |
| 59 | +- Investigate the source and destination IP addresses involved in the alert to assess their legitimacy and check for any known malicious activity associated with them. |
| 60 | +- Analyze user activity associated with the alert to identify any unauthorized access or privilege escalation attempts. |
| 61 | +- Consult the Google SecOps investigation guide and resources tagged in the alert for specific guidance on handling similar threats. |
| 62 | + |
| 63 | + |
| 64 | +*False positive analysis* |
| 65 | + |
| 66 | + |
| 67 | +- Alerts triggered by routine administrative actions can be false positives. Review the context of the alert to determine if it aligns with known maintenance activities. |
| 68 | +- Automated scripts or tools that interact with Google SecOps may generate alerts. Identify these scripts and consider creating exceptions for their expected behavior. |
| 69 | +- Frequent alerts from specific IP addresses or user accounts that are known to be secure can be excluded by adding them to an allowlist. |
| 70 | +- Alerts resulting from testing or development environments should be reviewed and, if deemed non-threatening, excluded from triggering further alerts. |
| 71 | +- Regularly update and review exception lists to ensure they reflect current non-threatening behaviors and do not inadvertently exclude genuine threats. |
| 72 | + |
| 73 | + |
| 74 | +*Response and remediation* |
| 75 | + |
| 76 | + |
| 77 | +- Immediately isolate affected systems or accounts identified in the Google SecOps alert to prevent further unauthorized access or data exfiltration. |
| 78 | +- Conduct a thorough review of the alert details to identify any compromised credentials or access tokens and reset them promptly. |
| 79 | +- Implement network segmentation or access control measures to limit the spread of potential threats within the environment. |
| 80 | +- Review and update firewall rules and security group settings to block any suspicious IP addresses or domains associated with the alert. |
| 81 | +- Escalate the incident to the security operations center (SOC) or incident response team for further analysis and to determine if additional resources are needed. |
| 82 | +- Document the incident, including all actions taken, and update incident response plans to incorporate lessons learned from this event. |
| 83 | +- Enhance monitoring and detection capabilities by tuning existing alerts and deploying additional rules to detect similar activities in the future. |
| 84 | + |
| 85 | + |
| 86 | +==== Setup |
| 87 | + |
| 88 | + |
| 89 | + |
| 90 | +*Setup* |
| 91 | + |
| 92 | + |
| 93 | + |
| 94 | +*Google SecOps Alert Integration* |
| 95 | + |
| 96 | +This rule is designed to capture alert events generated by the Google SecOps integration and promote them as Elastic detection alerts. |
| 97 | + |
| 98 | +To capture Google SecOps alerts, install and configure the Google SecOps integration to ingest alert events into the `logs-google_secops.alert-*` index pattern. |
| 99 | + |
| 100 | +If this rule is enabled alongside the External Alerts promotion rule (UUID: eb079c62-4481-4d6e-9643-3ca499df7aaa), you may receive duplicate alerts for the same SecOps events. Consider adding a rule exception for the External Alert rule to exclude data_stream.dataset:google_secops.alert to avoid receiving duplicate alerts. |
| 101 | + |
| 102 | + |
| 103 | +*Additional notes* |
| 104 | + |
| 105 | + |
| 106 | +For information on troubleshooting the maximum alerts warning please refer to this https://www.elastic.co/guide/en/security/current/alerts-ui-monitor.html#troubleshoot-max-alerts[guide]. |
| 107 | + |
| 108 | + |
| 109 | +==== Rule query |
| 110 | + |
| 111 | + |
| 112 | +[source, js] |
| 113 | +---------------------------------- |
| 114 | +event.kind: alert and data_stream.dataset: google_secops.alert |
| 115 | +
|
| 116 | +---------------------------------- |
0 commit comments