Azure-Sentinel/Solutions/Google Cloud Platform Audit...
v-atulyadav 039a00ec58 commit 2024-08-22 15:10:55 +05:30
..
Data Update Solution_GCPAuditLogs.json 2024-01-29 16:03:02 +05:30
Data Connectors Repackaged GCP Audit Logs 2024-08-22 12:01:09 +05:30
Package commit 2024-08-22 15:10:55 +05:30
logo logo folder name update 2023-03-29 10:25:09 +05:30
SolutionMetadata.json Added solution metadata and Data file 2023-06-20 15:16:13 +05:30
readme.md Update readme.md 2024-04-20 19:05:12 +05:30

readme.md

GCP Audit logs configuration

The following are the steps for GCP Audit logs configuration.

Configure GCP project.

There are two things you need to set up in your GCP environment:

Set up Microsoft Sentinel authentication in GCP by creating the following resources in the GCP IAM service:

Workload identity pool Workload identity provider Service account Role Set up log collection in GCP and ingestion into Microsoft Sentinel by creating the following resources in the GCP Pub/Sub service:

Topic Subscription for the topic

You can set up the environment in one of two ways:

  1. Create GCP resources via the Terraform API: Terraform provides APIs for resource creation and for Identity and Access Management (see Prerequisites). Microsoft Sentinel provides Terraform scripts that issue the necessary commands to the APIs.

  2. Set up GCP environment manually, creating the resources yourself in the GCP console.

In order to create fresh projects and GCP PUB/Sub service ,subscription,please follow below steps

GCP Authentication Setup

Please follow terraform script steps mentioned in below link as may miss some steps in GCP while adding manually

if you don't want to perform above steps please use the below link for manual set up

GCP Audit Logs Setup

Please follow terraform script steps mentioned in below link to set up GCP audit logs

if you don't want to perform above steps please use the below link for manual set up

Note

  • if want to use existing project/account details need to modify the above scripts accordingly and run in GCP cloud console.