Gmail - Suite
Gmail - Suite of productivity tools for email and collaboration.
Provider: Gmail - Suite
Detection Rule | MITRE Tactic | MITRE Technique | Criticality | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
Unauthorized Project Creation | Initial Access, Persistence | T1078 - Valid Accounts | Medium | ||||||||
|
|||||||||||
Suspicious Email Forwarding Rules | Defense Evasion | T1114 - Email Collection | High | ||||||||
|
|||||||||||
Mass Emailing Patterns | Exfiltration | T1071.003 - Application Layer Protocol | Medium | ||||||||
|
|||||||||||
Sensitive Document Sharing via Gmail | Exfiltration, Credential Access | T1530 - Data from Cloud Storage | High | ||||||||
|
|||||||||||
Email Phishing Detection | Initial Access | T1566.001 - Spearphishing Attachment | High | ||||||||
|
|||||||||||
Unusual OAuth App Permissions | Persistence, Credential Access | T1078.003 - Web Session Cookie | Medium | ||||||||
|
|||||||||||
Unapproved File Sharing Platform | Exfiltration | T1071.002 - File Transfer Protocol | Medium | ||||||||
|
APIs and Their Scopes
Detection Rule | Required API | API Scopes |
---|---|---|
Unusual Login Patterns | Admin SDK API (Reports API) | https://www.googleapis.com/auth/admin.reports.audit.readonly |
Suspicious Email Forwarding Rules | Gmail API |
https://www.googleapis.com/auth/gmail.settings.basic https://www.googleapis.com/auth/gmail.readonly |
Mass Emailing Patterns | Gmail API | https://www.googleapis.com/auth/gmail.readonly |
Sensitive Document Sharing via Gmail | Drive API |
https://www.googleapis.com/auth/drive.metadata.readonly https://www.googleapis.com/auth/drive.readonly |
Email Phishing Detection | Gmail API | https://www.googleapis.com/auth/gmail.readonly |
Unusual OAuth App Permissions | OAuth Token Inspector API | https://www.googleapis.com/auth/admin.directory.user.security |
Unapproved File Sharing Platform | Drive API, Gmail API |
https://www.googleapis.com/auth/drive.readonly https://www.googleapis.com/auth/gmail.readonly |
Reports and Widgets for CISO
Report Name | Widgets | Description |
---|---|---|
Suspicious Login Activity Report | Geo-location Map: Visualize login attempts by geolocation. | Provides visibility into potentially compromised accounts by highlighting unusual login patterns, locations, and timing. |
Failed vs. Successful Logins Chart: Graph of failed and successful login attempts. Login Time Distribution: Bar chart showing login activity over time. Risky IP Addresses List: Tabular display of login attempts from unrecognized or flagged IPs. |
||
Email Forwarding and Filters Report | Top External Domains (Forwarding): Pie chart showing most forwarded-to external domains. | Helps detect possible data exfiltration via unauthorized email forwarding and filter rule changes. |
New Email Forwarding Rules: List of new forwarding rules configured over the reporting period. Email Filter Changes: Summary of recent email filter modifications. Forwarded Email Volume: Bar graph showing volume of emails forwarded by users. |
||
Mass Emailing and Phishing Report | Email Volume Trend: Line graph showing email volume per user. | Focuses on email anomalies like mass emails, potential phishing, and external email distribution that could indicate an attack. |
External Recipients (High Volume): List of external recipients who received large volumes of emails. Potential Phishing Attempts: Table with flagged phishing attempts and associated users. Top Senders: A widget showing users sending the most emails. Email Attachments Scan Summary: Percentage breakdown of email attachments that could be malware. |
||
Sensitive Document Sharing Report | Sensitive Files Shared Externally: List of sensitive Google Drive files shared outside the organization. | Monitors the sharing of sensitive information via Gmail and Google Drive, highlighting potential risks related to data leakage. |
Top Data Recipients: List of external users or domains receiving sensitive files. File Access Trends: Line graph showing trends in file access (internal vs. external). Recent Permission Changes: Table showing recent changes to file permissions on sensitive documents. |
||
Third-Party OAuth Apps Report | New OAuth Apps Approved: List of newly approved OAuth apps. | Identifies third-party applications accessing Gmail and Google Drive and flags apps that may pose security risks. |
OAuth Apps with High Permissions: Table listing third-party apps with elevated access (e.g., full mailbox or Drive access). OAuth App Usage Trends: Line graph of OAuth app usage (authorized sessions over time). OAuth Access Risk Levels: Categorization of OAuth apps by risk level (low, medium, high). |
||
Email Rule and Filter Changes Report | New Rule Changes: List of recently created or modified email filtering rules. | Tracks changes to email rules, which can indicate an insider threat or unauthorized access by malicious actors altering email settings. |
Top Users with Rule Changes: A ranking of users who frequently modify email rules. Forwarding Rules to External Domains: Tabular list of forwarding rules directing emails to external addresses. Rule Modification Trends: Line graph showing trends in email rule modifications over time. |