Stay organized with collectionsSave and categorize content based on your preferences.
This document describes a threat finding type in Security Command Center. Threat findings are generated bythreat detectorswhen they detect
a potential threat in your cloud resources. For a full list of available threat findings, seeThreat findings index.
Overview
Audit logs are examined to detect the addition of IAM
role bindings that might be considered suspicious.
The following are examples of anomalous grants:
Inviting an external user, such as gmail.com user, as a project owner
from the Google Cloud console
A service account granting sensitive permissions
A custom role granting sensitive permissions
A service account added from outside your organization or project
TheIAM Anomalous Grantfinding is unique in that it includes
sub-rules that provide more specific information about each instance
of this finding. The severity classification of this finding depends
on the sub-rule. Each sub-rule might require a different response.
The following list shows all possible sub-rules and their severities:
external_service_account_added_to_policy:
HIGH, if a highly sensitive role was granted or if a medium-sensitivity
role was granted at the organization level. For more information, seeHighly-sensitive roles.
MEDIUM, if a medium sensitivity role was granted. For more information,
seeMedium-sensitivity roles.
external_member_invited_to_policy:HIGH
external_member_added_to_policy:
HIGH, if a highly sensitive role was granted or if a medium-sensitivity
role was granted at the organization level. For more information, seeHighly-sensitive roles.
MEDIUM, if a medium sensitivity role was granted. For more information,
seeMedium-sensitivity roles.
Open aPersistence: IAM Anomalous Grantfinding as directed inReviewing findings. The details panel for the
finding opens to theSummarytab.
On theSummarytab, review the information in the following sections:
What was detected, especially the following fields:
Principal email: email address for the user or service account that
assigned the role.
Affected resource
Related links, especially the following fields:
Cloud Logging URI: link to Logging entries.
MITRE ATT&CK method: link to the MITRE ATT&CK documentation.
Related findings: links to any related findings.
VirusTotal indicator: link to the VirusTotal analysis page.
Click theJSONtab. The complete JSON of the finding is displayed.
In the JSON for the finding, note the following fields:
detectionCategory:
subRuleName: more specific information about the type of
anomalous grant that occurred. The sub-rule determines the severity
classification of this finding.
evidence:
sourceLogId:
projectId: the ID of the project that contains the finding.
properties:
sensitiveRoleGrant:
bindingDeltas:
Action: the action taken by the user.
Role: the role assigned to the user.
member: the email address of the user that received the role.
Step 2: Check logs
On theSummary tabof the finding details panel, click theCloud Logging URIlink to open theLogs Explorer.
On the page that loads, look for new or updated IAM
resources using the following filters:
Review related findings by clicking the link on theRelated findingsrow in theSummarytab of the finding details.
Related findings are the same finding type and the same instance
and network.
To develop a response plan, combine your investigation results with MITRE
research.
Step 4: Implement your response
The following response plan might be appropriate for this finding, but might also impact operations.
Carefully evaluate the information you gather in your investigation to determine the best way to
resolve findings.
Contact the owner of the project with the compromised account.
Delete the compromised service accountand rotate and delete
all service account access keys for the compromised project. After deletion,
resources that use the service account for authentication lose access.
Delete project resources created by unauthorized accounts, like unfamiliar
Compute Engine instances, snapshots, service accounts, and
IAM users.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-09-04 UTC."],[],[],null,["| Premium and Enterprise [service tiers](/security-command-center/docs/service-tiers)\n\nThis document describes a threat finding type in Security Command Center. Threat findings are generated by\n[threat detectors](/security-command-center/docs/concepts-security-sources#threats) when they detect\na potential threat in your cloud resources. For a full list of available threat findings, see [Threat findings index](/security-command-center/docs/threat-findings-index).\n\nOverview\n\nAudit logs are examined to detect the addition of IAM\nrole bindings that might be considered suspicious.\n\nThe following are examples of anomalous grants:\n\n- Inviting an external user, such as gmail.com user, as a project owner from the Google Cloud console\n- A service account granting sensitive permissions\n- A custom role granting sensitive permissions\n- A service account added from outside your organization or project\n\nThe `IAM Anomalous Grant` finding is unique in that it includes\nsub-rules that provide more specific information about each instance\nof this finding. The severity classification of this finding depends\non the sub-rule. Each sub-rule might require a different response.\n\nThe following list shows all possible sub-rules and their severities:\n\n- `external_service_account_added_to_policy`:\n - `HIGH`, if a highly sensitive role was granted or if a medium-sensitivity role was granted at the organization level. For more information, see [Highly-sensitive roles](/security-command-center/docs/concepts-event-threat-detection-overview#high-sensitivity-roles).\n - `MEDIUM`, if a medium sensitivity role was granted. For more information, see [Medium-sensitivity roles](/security-command-center/docs/concepts-event-threat-detection-overview#medium-sensitivity-roles).\n- `external_member_invited_to_policy`: `HIGH`\n- `external_member_added_to_policy`:\n - `HIGH`, if a highly sensitive role was granted or if a medium-sensitivity role was granted at the organization level. For more information, see [Highly-sensitive roles](/security-command-center/docs/concepts-event-threat-detection-overview#high-sensitivity-roles).\n - `MEDIUM`, if a medium sensitivity role was granted. For more information, see [Medium-sensitivity roles](/security-command-center/docs/concepts-event-threat-detection-overview#medium-sensitivity-roles).\n- `custom_role_given_sensitive_permissions`: `MEDIUM`\n- `service_account_granted_sensitive_role_to_member`: `HIGH`\n- `policy_modified_by_default_compute_service_account`: `HIGH`\n\nHow to respond\n\nTo respond to this finding, do the following:\n\nStep 1: Review finding details\n\n1. Open a `Persistence: IAM Anomalous Grant` finding as directed in\n [Reviewing findings](/security-command-center/docs/how-to-investigate-threats#reviewing_findings). The details panel for the\n finding opens to the **Summary** tab.\n\n2. On the **Summary** tab, review the information in the following sections:\n\n - **What was detected** , especially the following fields:\n - **Principal email**: email address for the user or service account that assigned the role.\n - **Affected resource**\n\n - **Related links**, especially the following fields:\n\n - **Cloud Logging URI**: link to Logging entries.\n - **MITRE ATT\\&CK method**: link to the MITRE ATT\\&CK documentation.\n - **Related findings**: links to any related findings.\n - **VirusTotal indicator**: link to the VirusTotal analysis page.\n3. Click the **JSON** tab. The complete JSON of the finding is displayed.\n\n4. In the JSON for the finding, note the following fields:\n\n - `detectionCategory`:\n - `subRuleName`: more specific information about the type of anomalous grant that occurred. The sub-rule determines the severity classification of this finding.\n - `evidence`:\n - `sourceLogId`:\n - `projectId`: the ID of the project that contains the finding.\n - `properties`:\n - `sensitiveRoleGrant`:\n - `bindingDeltas`:\n - `Action`: the action taken by the user.\n - `Role`: the role assigned to the user.\n - `member`: the email address of the user that received the role.\n\nStep 2: Check logs\n\n1. On the **Summary tab** of the finding details panel, click the **Cloud Logging URI** link to open the **Logs Explorer**.\n2. On the page that loads, look for new or updated IAM resources using the following filters:\n - `protoPayload.methodName=\"SetIamPolicy\"`\n - `protoPayload.methodName=\"google.iam.admin.v1.UpdateRole\"`\n - `protoPayload.methodName=\"google.iam.admin.v1.CreateRole\"`\n\nStep 3: Research attack and response methods\n\n1. Review MITRE ATT\\&CK framework entries for this finding type: [Valid Accounts: Cloud Accounts](https://attack.mitre.org/techniques/T1078/004/).\n2. Review related findings by clicking the link on the **Related findings** row in the **Summary** tab of the finding details. Related findings are the same finding type and the same instance and network.\n3. To develop a response plan, combine your investigation results with MITRE research.\n\nStep 4: Implement your response\n\n\nThe following response plan might be appropriate for this finding, but might also impact operations.\nCarefully evaluate the information you gather in your investigation to determine the best way to\nresolve findings.\n\n- Contact the owner of the project with the compromised account.\n- [Delete the compromised service account](/iam/docs/service-accounts-delete-undelete#deleting) and rotate and delete all service account access keys for the compromised project. After deletion, resources that use the service account for authentication lose access.\n- Delete project resources created by unauthorized accounts, like unfamiliar Compute Engine instances, snapshots, service accounts, and IAM users.\n- To restrict adding gmail.com users, use the [Organization Policy](/resource-manager/docs/organization-policy/overview).\n- To identify and fix overly permissive roles, use [IAM\n Recommender](/iam/docs/recommender-overview).\n\nWhat's next\n\n- Learn [how to work with threat\n findings in Security Command Center](/security-command-center/docs/how-to-investigate-threats).\n- Refer to the [Threat findings index](/security-command-center/docs/threat-findings-index).\n- Learn how to [review a\n finding](/security-command-center/docs/how-to-investigate-threats#reviewing_findings) through the Google Cloud console.\n- Learn about the [services that\n generate threat findings](/security-command-center/docs/concepts-security-sources#threats)."]]