Privilege Escalation: Anomalous Service Account Impersonator for Data Access
Stay organized with collections
Save and categorize content based on your preferences.
This document describes a threat finding type in Security Command Center. Threat findings are generated by
threat detectors when they detect
a potential threat in your cloud resources. For a full list of available threat findings, see Threat findings index.
Overview
Anomalous Service Account Impersonator is detected by examining the Data Access
Audit Logs to see if any anomaly occurred in a service account impersonation
request.
How to respond
To respond to this finding, do the following:
Step 1: Review finding details
Open
the Privilege Escalation: Anomalous Service Account Impersonator for Data Access
finding, as directed in Reviewing findings.
In the finding details, on the Summary tab, note the values of following
fields.
Under What was detected:
Principal email: the final service account in the impersonation
request that was used to access Google Cloud
Service name: the API name of the Google Cloud service involved in the impersonation request
Method name: the method that was called
Service account delegation information: details of service accounts in the
delegation chain, the principal at the bottom of the list is the caller of
the impersonation request
Step 2: Research attack and response methods
Contact the owner of the service account in the Principal email field.
Confirm whether the legitimate owner conducted the action.
Investigate the principals in the delegation chain to verify whether the
request is abnormal and if any account has been compromised.
Contact the owner of the impersonation caller in the Service account
delegation info list. Confirm whether the legitimate owner conducted the
action.
Step 3: Implement your response
The following response plan might be appropriate for this finding, but might also impact operations.
Carefully evaluate the information you gather in your investigation to determine the best way to
resolve findings.
Contact the owner of the project where the action was taken.
Consider deleting the potentially compromised service account and rotate and delete
all service account access keys for the potentially compromised project. After
deletion, resources that use the service account for authentication lose
access. Before proceeding, your security team should identify all impacted
resources and work with resource owners to ensure business continuity.
Work with your security team to identify unfamiliar resources, including
Compute Engine instances, snapshots, service accounts, and IAM
users. Delete resources not created with authorized accounts.
Respond to any notifications from Google Cloud Support.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-08-29 UTC."],[],[],null,["# Privilege Escalation: Anomalous Service Account Impersonator for Data Access\n\n| Premium and Enterprise [service tiers](/security-command-center/docs/service-tiers)\n\nThis document describes a threat finding type in Security Command Center. Threat findings are generated by\n[threat detectors](/security-command-center/docs/concepts-security-sources#threats) when they detect\na potential threat in your cloud resources. For a full list of available threat findings, see [Threat findings index](/security-command-center/docs/threat-findings-index).\n\nOverview\n--------\n\n`Anomalous Service Account Impersonator` is detected by examining the Data Access\nAudit Logs to see if any anomaly occurred in a service account impersonation\nrequest.\n\nHow to respond\n--------------\n\nTo respond to this finding, do the following:\n\n### Step 1: Review finding details\n\n1. Open the `Privilege Escalation: Anomalous Service Account Impersonator for Data Access` finding, as directed in [Reviewing findings](/security-command-center/docs/how-to-investigate-threats#reviewing_findings).\n2. In the finding details, on the **Summary** tab, note the values of following\n fields.\n\n Under **What was detected**:\n - **Principal email**: the final service account in the impersonation request that was used to access Google Cloud\n - **Service name**: the API name of the Google Cloud service involved in the impersonation request\n - **Method name**: the method that was called\n - **Service account delegation information**: details of service accounts in the delegation chain, the principal at the bottom of the list is the caller of the impersonation request\n\n### Step 2: Research attack and response methods\n\n1. Contact the owner of the service account in the **Principal email** field. Confirm whether the legitimate owner conducted the action.\n2. Investigate the principals in the delegation chain to verify whether the request is abnormal and if any account has been compromised.\n3. Contact the owner of the impersonation caller in the **Service account\n delegation info** list. Confirm whether the legitimate owner conducted the action.\n\n### Step 3: Implement your response\n\n\nThe following response plan might be appropriate for this finding, but might also impact operations.\nCarefully evaluate the information you gather in your investigation to determine the best way to\nresolve findings.\n\n- Contact the owner of the project where the action was taken.\n- Consider [deleting the potentially compromised service account](/iam/docs/service-accounts-delete-undelete#deleting) and rotate and delete all service account access keys for the potentially compromised project. After deletion, resources that use the service account for authentication lose access. Before proceeding, your security team should identify all impacted resources and work with resource owners to ensure business continuity.\n- Work with your security team to identify unfamiliar resources, including Compute Engine instances, snapshots, service accounts, and IAM users. Delete resources not created with authorized accounts.\n- Respond to any notifications from Google Cloud Support.\n- To limit who can create service accounts, use the [Organization Policy Service](/resource-manager/docs/organization-policy/overview).\n- To identify and fix overly permissive roles, use [IAM Recommender](/iam/docs/recommender-overview).\n\nWhat's next\n-----------\n\n- Learn [how to work with threat\n findings in Security Command Center](/security-command-center/docs/how-to-investigate-threats).\n- Refer to the [Threat findings index](/security-command-center/docs/threat-findings-index).\n- Learn how to [review a\n finding](/security-command-center/docs/how-to-investigate-threats#reviewing_findings) through the Google Cloud console.\n- Learn about the [services that\n generate threat findings](/security-command-center/docs/concepts-security-sources#threats)."]]