T1538 Cloud Service Dashboard Mappings

An adversary may use a cloud service dashboard GUI with stolen credentials to gain useful information from an operational cloud environment, such as specific services, resources, and features. For example, the GCP Command Center can be used to view all assets, findings of potential security risks, and to run additional queries, such as finding public IP addresses and open ports.(Citation: Google Command Center Dashboard)

Depending on the configuration of the environment, an adversary may be able to enumerate more information via the graphical dashboard than an API. This allows the adversary to gain information without making any API requests.

View in MITRE ATT&CK®

Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name
AC-2 Account Management Protects T1538 Cloud Service Dashboard
AC-3 Access Enforcement Protects T1538 Cloud Service Dashboard
AC-5 Separation of Duties Protects T1538 Cloud Service Dashboard
AC-6 Least Privilege Protects T1538 Cloud Service Dashboard
IA-2 Identification and Authentication (organizational Users) Protects T1538 Cloud Service Dashboard
IA-8 Identification and Authentication (non-organizational Users) Protects T1538 Cloud Service Dashboard
action.hacking.variety.Footprinting Footprinting and fingerprinting related-to T1538 Cloud Service Dashboard
aws_config AWS Config technique_scores T1538 Cloud Service Dashboard
aws_organizations AWS Organizations technique_scores T1538 Cloud Service Dashboard