Unit 42 researchers discovered a security risk in Google Workspace's domain-wide delegation feature that allows a GCP identity with necessary permissions to generate access tokens to impersonate Google Workspace users and access their data. This mismatch between GCP permissions and Google Workspace access could be exploited by malicious insiders or attackers with stolen credentials.
Affected Services
Google Workspace
Remediation
Position service accounts with domain delegation permissions in higher-level folders in the GCP hierarchy to restrict access. Implement least privilege access and use Prisma Cloud for visibility, alerting and remediation of risky permissions.
Monitor GCP and Google Workspace audit logs for suspicious service account key creation, authorization events, and granting of domain-wide delegation permissions. Use Cortex XDR and Prisma Cloud for anomaly detection and alerting.