ctipilot.ch

Deleted Google Cloud API keys keep authenticating up to 23 minutes (GCP IAM eventual consistency)

vulnerability-trend · item:google-cloud-api-key-deletion-delay-2026

Coverage timeline
1
first 2026-05-24 → last 2026-05-24
Briefs
1
1 distinct
Sources cited
9
7 hosts
Sections touched
1
research
Co-occurring entities
2
see Related entities below

Story timeline

  1. 2026-05-24CTI Daily Brief — 2026-05-24
    researchFirst coverage: Aikido finding; key revocation not immediate containment; Google reopened as P0

Where this entity is cited

  • research1

Source distribution

  • attack.mitre.org3 (33%)
  • aikido.dev1 (11%)
  • helpnetsecurity.com1 (11%)
  • dutchnews.nl1 (11%)
  • groupe3r.ch1 (11%)
  • nltimes.nl1 (11%)
  • therecord.media1 (11%)

Related entities

Items in briefs about Deleted Google Cloud API keys keep authenticating up to 23 minutes (GCP IAM eventual consistency) (1)

Deleted Google Cloud API keys keep authenticating for up to 23 minutes

From CTI Daily Brief — 2026-05-24 · published 2026-05-24 · view item permalink →

Aikido Security researcher Joe Leon published findings (2026-05-21, updated 2026-05-22) showing that deleted Google Cloud API keys continue to authenticate API requests for a median of ~16 minutes and up to ~23 minutes, measured across 10 controlled trials against Gemini, BigQuery and Maps APIs (Aikido, 2026-05-21). By contrast, Google service-account keys revoke in ~5 seconds and Gemini-specific keys in ~1 minute. The root cause is eventual consistency in GCP's IAM credential-propagation layer: deletions propagate gradually across distributed authorisation servers rather than atomically. Google first closed the report as "Won't Fix (working as intended)" before reopening it as a P0 after public disclosure (Aikido, 2026-05-21).

Why it matters to us: Key rotation/revocation is the reflexive first containment step in most cloud IR runbooks, and this breaks the assumption that it is immediate. An attacker holding a stolen key retains a usable window to exfiltrate BigQuery datasets, run Gemini inference, or query Maps billing after the defender believes the key is dead. For any CH/EU public-sector tenant on GCP, treat API-key deletion as a ~30-minute containment action: delete to start the clock, then monitor Cloud Audit Logs for post-deletion use of the key, and — for GDPR Art. 33 / Swiss DSG Art. 24 purposes — count the full post-deletion window as continued exposure when the key reached PII. Where viable, prefer service-account keys (near-instant revocation). Maps to ATT&CK T1550.001 (Application Access Token).