/
Monitor for firewall rule creation

Monitor for firewall rule creation

Description: 

Monitoring firewall rule creation and update events gives you insight into network access changes, and can help you quickly detect suspicious activity.

Solution: 

CREATE METRIC: Go to https://console.cloud.google.com/logs/viewer click "CREATE METRIC", click the drop-down menu in the right-hand side of the search bar and select "Convert to advanced filter", clear any text from Advanced Filter and add the "RecommendedLogFilter" below.

Set "Type" to "Counter" and "Units" to 1 (default), fill out the remaining fields and click "Create Metric".

CREATE ALERT POLICY: Go to https://console.cloud.google.com/logs/metrics and in the section "User-defined Metrics", for the target metric (any one from the "QualifiedLogMetricNames"), click 3 dot icon in rightmost column and select "Create alert from Metric".

On the "Create new alerting policy" page, configure the parameters you desire. For example, setting "Aggregator" to "Count", "Threshold" to 0, and "For" to "most recent value" will alert on every event. Click "Save" and make sure to set up a notification channel and then click "Save" again.

Reference: 

https://cloud.google.com/vpc/docs/firewalls



Related content

Monitor for brute force attacks against APIs
Monitor for brute force attacks against APIs
More like this
Monitor for port scanning of resources
Monitor for port scanning of resources
More like this
Monitor for Malicious Logins against GCP Console
Monitor for Malicious Logins against GCP Console
More like this
Monitor for brute force attacks against GCP Console
Monitor for brute force attacks against GCP Console
More like this
Ensure log metric filter and alerts exists for Custom Role changes
Ensure log metric filter and alerts exists for Custom Role changes
More like this
Ensure log metric filter and alerts exists for Audit Configuration Changes
Ensure log metric filter and alerts exists for Audit Configuration Changes
More like this