Oct Recap: New and Newly Deniable GCP Privileged Permissions
Google Cloud Platform在2025年10月新增了多项特权权限,并通过V2 API增强了对这些权限的控制能力。更新涵盖Discovery Engine、Cloud Integrations和Backup and Disaster Recovery服务,涉及IAM政策管理、身份映射、认证配置和备份设置等高风险操作。这些变化可能引发特权提升、持久化攻击和数据丢失等问题。Sonrai Security建议组织加强监控并利用新的拒绝策略来防范潜在威胁。
2025-11-4 10:9:7
Author: securityboulevard.com(查看原文)
阅读量:54
收藏
As October 2025 wraps up, Sonrai’s latest analysis of Google Cloud Platform permissions reveals both newly introduced privileged actions and those that have become newly enforceable through the V2 API, meaning organizations can now explicitly deny their use. This month’s updates span Discovery Engine, Cloud Integrations, and Backup and Disaster Recovery, reflecting how GCP continues to expand both its automation and data management capabilities.
From permissions that enable identity remapping and IAM policy manipulation to those that alter authentication configurations, certificates, and backup protections, these updates highlight how small configuration shifts can have major security implications. Collectively, they underscore the importance of monitoring emerging privileges and taking advantage of new deny policy capabilities to prevent privilege escalation, persistence, and data loss before they occur.
Existing Services with New Privileged Permissions (or new to V2)
Action: Imports a list of Identity Mapping Entries to an Identity Mapping Store
Mitre Tactic: Privilege Escalation
Why it’s privileged: Mapping Stores contain mappings of external identities to GCP users/groups, enabling fine-grained access controls on custom VertexAI data sources. By remapping Remaps external identities to different GCP users/groups, attacker-controlled external identities could be granted access to any data governed by those mappings.
Action: Executes a third-party action using the DataConnector
Mitre Tactic: Execution
Why it’s privileged: Lets a caller trigger external integrations or action invocations (including FHIR/health workflows), which can run code, move or expose sensitive data, or cause changes in connected systems.
Action: Shares templates across projects or organizations
Mitre Tactic: Lateral Movement
Why it’s privileged: Allows exposure of templates containing logic that can access or invoke sensitive systems, enabling misuse for data access or destructive actions.
Action: Grants permission to update integration templates
Mitre Tactic: Execution
Why it’s privileged: Allows modification of templates that can execute code or access sensitive services, enabling unauthorized actions or data exposure the next time the template is used.
Action: Grants permission to create or upload integration certificates used by integrations
Mitre Tactic: Persistence
Why it’s privileged: Lets an actor add trusted TLS identities or certs, enabling long-lived authenticated connections or impersonation of services for persistent access.
Action: Grants permission to set or modify IAM policies on Backup and DR management servers
Mitre Tactic: Privilege Escalation
Why it’s privileged: Enables granting admin or management access to attacker-controlled principals, allowing escalation of privileges required to enumerate assured workloads or delete backup & data recovery monitoring infrastructure.
Action: Grants permission to modify configuration settings for a Backup Vault
Mitre Tactic: Impact
Why it’s privileged: Enables altering vault policies, encryption, or retention settings, which can lead to data loss, tampering, or disruption of backup integrity.
Action: Grants permission to update backup plan associations for Compute Engine instances
Mitre Tactic: Impact
Why it’s privileged: Allows modifying which instances are protected or excluded from backups, enabling attackers to remove coverage and prevent recovery after compromise.
Action: Grants permission to delete backup plan associations for Compute Engine instances
Mitre Tactic: Impact
Why it’s privileged: Allows removal of backup protections from instances, exposing them to irreversible data loss or preventing recovery after an attack.
Conclusion
As GCP continues to evolve its services and expand the capabilities of its APIs, the scope and impact of privileged permissions grow alongside it. The addition of new permissions and the introduction of V2 support both increase control and introduce new complexity for security teams. Permissions that grant control over IAM policies, authentication, and backup configurations can quickly shift the balance between operational efficiency and exposure.
Sonrai Security’s Cloud Permissions Firewallhelps organizations stay ahead of this change by continuously identifying new and newly controllable privileges, mapping them to MITRE ATT&CK tactics, and enforcing least privilege across multi-cloud environments. As GCP broadens its privilege model, visibility and control remain essential to preventing escalation, persistence, and data compromise.