How to configure Attack Surface Analyzer for Google Cloud in ADAudit Plus

How to configure Attack Surface Analyzer for Google Cloud in ADAudit Plus

In this article:  

  • Objective

  • Prerequisites

  • Steps to follow

  • Validation and confirmation

  • Tips

  • Related topics and articles

 Objective     

This article explains how to configure the Attack Surface Analyzer in ADAudit Plus for monitoring and auditing cloud infrastructure for Google Cloud environments.

By integrating ADAudit Plus with these cloud platforms, administrators can visualise and analyse the potential attack surface of their cloud environments, helping identify security gaps and take preventive actions.

 

Understanding the attack surface of your cloud environment helps:

  • Identify over-privileged accounts.

  • Detect unused assets.

  • Minimize exposure to threats.

  • Ensure security compliance across cloud environments.

 Prerequisites     

  • You must be on ADAudit Plus build 8110 or later for Google Cloud directories.

  • Internet connectivity for ADAudit Plus is essential to establish connections with these platforms.

  • You need a Google Cloud service account with the viewer role and appropriate API access enabled.

 Steps to follow   

Attack Surface Analyzer for Google Cloud Directory  

With the Attack Surface Analyzer, you can detect threats within your Google Cloud directory and enhance cloud security.

 

Listed below are the services tracked by the Attack Surface Analyzer for Google Cloud directory:

 

  • GCP Compute Engine

  • GCP VPC Networks

  • GCP Big Query

  • GCP Network Services

  • GCP Cloud Storage

  • GCP KMS

  • GCP SQL

  • GCP Logging

  • GCP Kubernetes Engine

  • GCP Organization

  • GCP App Engine

  • GCP Cloud Function

  • GCP Composer

  • GCP Dataproc

  • GCP Cloud Run

  • GCP Big Table

  • GCP Deployment Manager

  • GCP Pub/Sub

  • GCP FileStore

  • GCP Spanner

  • GCP AlloyDB

  • GCP Batch

  • GCP Build

  • GCP API and Services

  • GCP DataFlow

  • GCP Load Balancing

  • GCP API Keys

  • GCP IAM

  • GCP Projects

 

Before configuring your Google Cloud Directory for attack surface analysis in ADAudit Plus, you will need to:

 

  • Create a custom role in your Google Cloud Console.

  • Then, create a service account and assign the newly created custom role to it.

 

Note: ADAudit Plus supports project-based Google Cloud Directory configuration for attack surface analysis.

Step1: Create a custom role  

  • Open the Google Cloud Console and select the project for which you want to create a custom role.

  • In the top-right, find and select the Activate Cloud Shell icon.

 

 

  • Within the Cloud Shell Terminal, select Open editor in the top menu.

 

 

  • In the left pane, find and select the New File icon and create a new YAML file with a suitable name. For example: roleCreation.yaml.

 

 

  • Copy the permission statement from this file and paste it in the YAML file that you just created.

 

Note: Ensure that you don't modify the indentation when pasting the permission statement.

 

  • In the permission statement that you just pasted in the YAML file:

    • Find the line containing title: "ROLE_NAME" and replace "ROLE_NAME" with a suitable title of your choice. For example: Test_Role.

    • Find the line containing description: "ROLE_DESCRIPTION" and replace "ROLE_DECRIPTION" with a suitable description of your choice.

 

 

  • Execute the following command to create the custom role at the organization level:

gcloud iam roles create ROLE_ID --organization=ORGANIZATION_ID --file=YAML_FILE_PATH

 

For example: gcloud iam roles create Test_Role --organization=********* --file=roleCreation.yaml

In the above command:

    • Replace ROLE_ID with the title that you used in the YAML file in step five.

    • Replace ORGANIZATION_ID with the Project ID.

 

 

    • Replace YAML_FILE_PATH with the name of the YAML file that you created in step four.

 

  • In the Authorize Cloud Shell pop-up that appears, click AUTHORISE.

  • In the Google Cloud Console, navigate to the IAM and admin section, select Roles from the left pane, and ensure that the role you just created is listed.

 

 

Step2: Create a service account  

  • Open the Google Cloud Console and select the project for which you want to create a service account.

  • Navigate to the IAM and admin section, select Service accounts from the left pane, and click + CREATE SERVICE ACCOUNT.

 

 

  • Under Service account details, enter a suitable Service account name and a Service account description. The Service account ID will be generated automatically based on the service account name.

  • Click CREATE AND CONTINUE.

 

 

  • Under Grant this service account access to the project, click Select a role, choose Custom, and select the role that you created earlier.

  • Click CONTINUE, and then click DONE.

 

 

  • Once the service account is created, select it, navigate to the KEYS tab, click ADD KEY, and select Create new key from the drop-down.

 

 

  • Choose JSON as the key type and click CREATE. This will create a JSON key file for your service account and save it to your local machine.

 

 

  • Open the JSON file to find the Client Email, Project ID, and Private Key values, which will be needed when configuring the Google Cloud Directory in ADAudit Plus.

Note: Remember to keep this JSON key file secure, as it contains sensitive information and grants access to your Google Cloud Directory resources. If it is ever compromised, you should regenerate the key and update any services that are using it.

Step3: Configure the Google Cloud Directory in ADAudit Plus  

  • Log in to your ADAudit Plus web console.

  • Navigate to the Cloud Directory tab > Attack Surface Analyzer > Configuration > Cloud Directory.

  • Click + Add Cloud Directory in the top-right.

  • Select Google Cloud from the Add Cloud Directory pop-up.

 

 

  • Enter the Display Name, Client Email, Project ID, and Private Key values found in the service account JSON key file that you downloaded.

  • Check the Audit Log box if you want to fetch and monitor all activities happening within your Google Cloud directory environment, and then click Next.

 

 

  • Review your settings and click Finish.

Validation and confirmation  

After configuring the respective cloud platforms:

 

  • Navigate to Cloud Security Analyzer > Attack Surface Analyzer.

  • Select the configured cloud platform.

  • Validate that ADAudit Plus retrieves and displays:

 

    • Identities and permissions

    • Unused resources

    • High-privilege roles

    • Potential security risks

 

Perform minor changes or testing in your cloud environment and ensure the changes reflect in the analyzer reports.

Tips

  • Regularly review the attack surface for anomalies.

  • Set up alerts in ADAudit Plus for privilege escalations or suspicious activities.

  • Review unused resources and delete or remediate them.

  • Conduct periodic audits for over-privileged identities.

Related topics and articles  

 

 

                  New to ADSelfService Plus?