CertNova
Menu
← Back to PBQ types

Log Analysis PBQs: Professional Cloud Security Engineer

easy

Question 1 of 3

You are a Google Cloud Security Engineer conducting a weekly IAM audit. An automated policy scanner flagged an unexpected IAM role assignment: a project-level Owner role was granted to an external service account outside the scheduled change management window. Review the Cloud Audit Log events, flag all entries related to the suspicious IAM change, and classify the incident.

Objectives

  • Review the Cloud Audit Log for unauthorized IAM role assignments
  • Flag all entries related to the over-permissive IAM change and subsequent unauthorized access by the external account
  • Classify the type of security incident
  • Identify the user who made the unauthorized IAM change
  • Recommend the most appropriate immediate response action

Security Event Log

FlagTimeSeveritySourceMessage
07:00:00INFOaudit-logGCP Audit: admin@certnova.com called compute.instances.list in us-central1 -- routine morning review
07:05:00INFOsystemGCP Monitoring: all health checks passing for proj-certnova production services
07:30:00ALERTaudit-logGCP Audit: dev-lead@certnova.com called projects.setIamPolicy on proj-certnova -- ADDED roles/owner for ext-contractor@partner-org.iam.gserviceaccount.com
07:30:15WARNaudit-logIAM Policy Scanner: roles/owner granted to external service account ext-contractor@partner-org.iam.gserviceaccount.com -- violates least privilege policy (project-level Owner is highest privilege)
07:31:00WARNaudit-logChange Management: IAM modification by dev-lead@certnova.com occurred at 07:30 UTC -- outside approved change window (Tue/Thu 14:00-16:00 UTC)
07:32:00INFOaudit-logGCP Audit: developer05@certnova.com called cloudfunctions.functions.get in us-central1 -- routine development query
07:35:00WARNaudit-logGCP Audit: ext-contractor@partner-org.iam.gserviceaccount.com called storage.buckets.list on proj-certnova from 203.0.113.150 -- first-ever access by this account
07:36:00INFOweb200 GET /api/health from 10.128.0.2 (internal health probe)
07:37:00WARNaudit-logGCP Audit: ext-contractor@partner-org.iam.gserviceaccount.com called compute.instances.list from 203.0.113.150 -- enumerating all GCE instances in proj-certnova
07:38:00INFOsystemGCP Cloud Scheduler: daily-report-generation triggered successfully
07:40:00INFOaudit-logGCP Audit: svc-monitoring@proj-certnova.iam.gserviceaccount.com called monitoring.timeSeries.list -- routine metrics collection
07:45:00INFOauthSuccessful login: security-admin@certnova.com to GCP Console for weekly audit

12 total entries. Click a row or use checkboxes to flag suspicious events.

Incident Analysis

Progress

0 of 8 items correct

Flag suspicious entries and answer the incident questions

0 of 3 marked complete