Event Driven Security on Google Cloud Platform

Event Driven Security on Google Cloud Platform

Event Driven Programming

Event driven programming has grown increasingly popular with the rise of cloud computing. As application architectures begin to embrace Serverless, many applications are being run purely by event driven services. AWS Lambda, Azure Functions, and Google Cloud Functions are all popular cloud services which allow for applications to execute arbitrary code based on specific events.

Reference : https://cloud.google.com/images/products/functions/how-it-works.svg

Event Driven Programming + Security

At ScaleSec, automation is one of our guiding principals when working with customers to improve their security posture in the cloud. As DevOps continues to take over the application development ecosystem, we consistently see security programs struggle to keep pace. In order to close this gap, the concepts of event driven programming can be integrated into DevOps processes to build automated responses to security related events.

Event Driven Security on Google Cloud

A common problem InfoSec teams encounter when running applications in the cloud is virtual machines (VMs) whose virtual firewalls allow unfettered access from the internet. These VMs can create big problems in a matter of minutes, not hours or days. Internet exposed machines are exponentially more vulnerable to adversarial takeover, simply on the basis of increased attack surface.

In order to combat internet exposed VM’s, Google Cloud Platform users can leverage the following services to automatically respond to the creation or update of a firewall rule to ensure open access to the Internet is not allowed:

  • Admin Activity Logs
  • Aggregate Export Sinks
  • PubSub
  • Cloud Function

Solution Overview

In this section, we will describe how each of the above services integrate together to create an automated security workflow for remediating firewall rules allowing SSH access from the Internet.

Visual Diagram of Automated Workflow

Admin Activity Logs

Every time an interaction occurs with a GCP resource, the API call made is logged in Google Stackdriver as an Admin Activity Log.

In our solution, we can leverage these logs to alert us to when certain security related events occur, such as an update to an existing firewall rule. Admin Activity logs are always enabled, but to use them in a workflow we must first create an aggregate export sink.

Aggregate Export Sinks

Aggregate Export Sinks are set at an organization or folder level and include all child objects (ie all projects in a folder). These sinks allow users to select log entries based on a set filter and send them to BigQuery, Cloud PubSub, or Cloud Storage.

In our solution, the Stackdriver filter we will use to capture logs which relate to firewall rule creation or update is:

logName:logs/compute.googleapis.com%2Factivity_log
resource.type:gce_firewall_rule 
jsonPayload.event_subtype: (compute.firewalls.insert OR compute.firewalls.update OR compute.firewalls.patch) 
jsonPayload.event_type:GCE_API_CALL

This filter can be translated in english to the following criteria:

  • Match the logname “logs/compute.googleapis.com%2Factivity_log”
  • Have the resource type equal to “gce_firewall_rule”
  • Have an event subtype of “compute.firewalls.insert” or “compute.firewalls.update” or “compute.firewalls.patch”
  • Have an event type equal to “GCE_API_CALL”

Additional information on how to create advanced Stackdriver filters can be found here.

Pub/Sub

Cloud Pub/Sub is a real-time messaging service which allows for independent systems to publish or subscribe to messages in a queue. In our demonstration workflow, a Pub/Sub topic is used by the aggregate export sink as a destination to send logs which have matched our filter.

Our PubSub topic also serves as the trigger for our Cloud Function. The PubSub will only trigger the Cloud Function when it receives a log, providing greater efficiency and minimal compute cost when compared to earlier implementations, where persistent VMs would periodically poll APIs to check configuration settings.

Cloud Functions

Cloud Functions allow us to write small, purpose built functions which are triggered when a specified event occurs. In our solution, a Cloud Function will be trigged whenever a firewall is created or updated.

Let’s step through the Cloud Function to understand how it works.

The activity log generated during the firewall event is passed to the Cloud Function in the data field of the PubSub Message. PubSub messages are base64 encoded JSON objects so we must decode the message and parse the JSON.

This is shown in the first lines of our process_log_entry function in main.py.

With the firewall name and the project ID, we can use the Google Cloud Python SDK to describe the firewall.

After we have the necessary information about the firewall resource we can assess if the firewall allows SSH from the internet.

Try it out!

We have provided a Terraform Module on our GitHub which will provision all the resources necessary for a demonstration of the concepts discussed in this article.

About ScaleSec

ScaleSec is a cloud security and compliance consultancy and Google Cloud Consulting Partner that helps technology companies meet the requirements of their most scrutinizing customers. Our team of experts guides customers through complex compliance frameworks, from implementation through audit preparation and support. ScaleSec offers certified, qualified expertise for the most complex security and compliance challenges. Learn more at https://scalesec.com.

GCP Shielded VM — Integrity Monitoring

Google Cloud announced Shielded VM all the way back at NEXT ’18 and it went GA at NEXT ’19, however, based on our customer interactions…

Next article

Here for you

Have questions? Leverage our expertise to help you meet your business goals with a strong security posture.

Join us

ScaleSec is a well-connected, fully remote team. We thrive in the great undocumented beyond. We’re hiring in most US metros.

Get in touch

Considering cloud? Want to optimize and transform your existing digital portfolio?
Reach out to us.

Gap Assessment

Get perspective. Address security comprehensively.

Prepare for compliance.

ScaleSec
San Diego, CA 92120, United States

619-SCALE15

© 2019 ScaleSec. All rights reserved. | Privacy Policy