An adversary may use a cloud service dashboard GUI with stolen credentials to gain useful information from an operational cloud environment, such as specific services, resources, and features. For example, the GCP Command Center can be used to view all assets, findings of potential security risks, and to run additional queries, such as finding public IP addresses and open ports.(Citation: Google Command Center Dashboard)
Depending on the configuration of the environment, an adversary may be able to enumerate more information via the graphical dashboard than an API. This allows the adversary to gain information without making any API requests.
View in MITRE ATT&CK®Capability ID | Capability Description | Mapping Type | ATT&CK ID | ATT&CK Name | Notes |
---|---|---|---|---|---|
AC-2 | Account Management | Protects | T1538 | Cloud Service Dashboard | |
AC-3 | Access Enforcement | Protects | T1538 | Cloud Service Dashboard | |
AC-5 | Separation of Duties | Protects | T1538 | Cloud Service Dashboard | |
AC-6 | Least Privilege | Protects | T1538 | Cloud Service Dashboard | |
IA-2 | Identification and Authentication (organizational Users) | Protects | T1538 | Cloud Service Dashboard | |
IA-8 | Identification and Authentication (non-organizational Users) | Protects | T1538 | Cloud Service Dashboard | |
action.hacking.variety.Footprinting | Footprinting and fingerprinting | related-to | T1538 | Cloud Service Dashboard | |
aws_config | AWS Config | technique_scores | T1538 | Cloud Service Dashboard |
Comments
The "mfa-enabled-for-iam-console-access" managed rule checks whether multi-factor authentication is enabled for all AWS IAM users that use a console password, protecting against misuse of those accounts' dashboard access. It is run periodically, and provides significant coverage, resulting in an overall score of Significant.
References
|
aws_organizations | AWS Organizations | technique_scores | T1538 | Cloud Service Dashboard |
Comments
This control may protect against cloud service dashboard abuse by segmenting accounts into separate organizational units and restricting dashboard access by least privilege.
References
|