Detection: DNS Record Set Deleted
Overview
Detect when a DNS record set was deleted. Unauthorized deletions can disrupt domain configurations, cause service outages, or expose systems to vulnerabilities. Monitoring these actions helps ensure DNS record integrity and availability.
References:
Usage
Run the detection in your terminal:
powerpipe detection run gcp_audit_log_detections.detection.dns_record_set_deletedSnapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe detection run gcp_audit_log_detections.detection.dns_record_set_deleted --shareSQL
This detection uses a named query:
select  tp_timestamp as timestamp,method_name as operation,resource_name as resource,authentication_info.principal_email as actor,tp_source_ip as source_ip,tp_index as project,tp_id as source_id,-- Create new aliases to preserve original row dataoperation as operation_src,resource as resource_src,*exclude operation, resource
from  gcp_audit_logwhere  method_name ilike 'dns.resourcerecordsets.delete'  and severity != 'Error'
order by  timestamp desc;