risks / Data manipulation
Description
Allows an attacker to insert, delete, or manipulate organizational data. This may be done to evade detection or impact business/operational processes.
Risk: HIGH
Exploited in isolation, this risk has the potential to disrupt ancillary organization operations, cause reputational damage, or run afoul of compliance requirements.
Mitigations
- Data encryption
- Network segmentation
- Data backup
- Least privilege permissions
Links
Affected Privileges
An attacker may be able to exploit this risk if they gain any of the following privileges:
Google Cloud Platform
© 2023–present P0 Security and contributors to the IAM Privilege Catalog