For AI agents: A markdown version of this page is available at https://docs.datadoghq.com/security/default_rules/c17-28f-69c.md. A documentation index is available at /llms.txt.

Google Cloud Service Account key created

Goal

Detect when a new service account key is created. An attacker could use this key as a backdoor to your account.

Strategy

This rule lets you monitor Google Cloud Admin activity audit logs to detect the creation of a service account key.

Triage and response

Contact the user who created the service account key to ensure they’re managing the key securely.

Changelog

31 January 2023 - Updated tags.