New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Google Cloud Certified - Professional Security Operations Engineer (PSOE) Exam Security-Operations-Engineer Question # 11 Topic 2 Discussion

Google Cloud Certified - Professional Security Operations Engineer (PSOE) Exam Security-Operations-Engineer Question # 11 Topic 2 Discussion

Security-Operations-Engineer Exam Topic 2 Question 11 Discussion:
Question #: 11
Topic #: 2

A Google Security Operations (SecOps) detection rule is generating frequent false positive alerts. The rule was designed to detect suspicious Cloud Storage enumeration by triggering an alert whenever the storage.objects.list API operation is called using the api.operation UDM field. However, a legitimate backup automation tool that uses the same API, causing the rule to fire unnecessarily. You need to reduce these false positives from this trusted backup tool while still detecting potentially malicious usage. How should you modify the rule to improve its accuracy?


A.

Adjust the rule severity to low to deprioritize alerts from automation tools.


B.

Convert the rule into a multi-event rule that looks for repeated API calls across multiple buckets.


C.

Replace api.operation with api.service_name = "storage.googleapis.com" to narrow the detection scope.


D.

Add principal.user.email != "backup-bot@fcobaa.com" to the rule condition to exclude the automation account.


Get Premium Security-Operations-Engineer Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.