Capability ID | Capability Description | Category | Value | ATT&CK ID | ATT&CK Name | Notes |
---|---|---|---|---|---|---|
amazon_virtual_private_cloud | Amazon Virtual Private Cloud | protect | partial | T1590 | Gather Victim Network Information |
Comments
VPC security groups and network access control lists (NACLs) can prevent the gathering of victim network information via (active) scanning methods but is not effective against other methods of gathering victim network information such as via Phishing or online databases (e.g. WHOIS) resulting in a Partial coverage score and an overall Partial score.
References
|
amazon_virtual_private_cloud | Amazon Virtual Private Cloud | protect | partial | T1590.001 | Domain Properties |
Comments
VPC security groups and network access control lists (NACLs) can prevent the gathering of victim network information via (active) scanning methods but is not effective against other methods of gathering victim network information such as via Phishing or online databases (e.g. WHOIS) resulting in a Partial coverage score and an overall Partial score.
References
|
amazon_virtual_private_cloud | Amazon Virtual Private Cloud | protect | partial | T1590.004 | Network Topology |
Comments
VPC security groups and network access control lists (NACLs) can prevent the gathering of victim network information via (active) scanning methods but is not effective against other methods of gathering victim network information such as via Phishing or online databases (e.g. WHOIS) resulting in a Partial coverage score and an overall Partial score.
References
|
amazon_virtual_private_cloud | Amazon Virtual Private Cloud | protect | partial | T1590.005 | IP Addresses |
Comments
VPC security groups and network access control lists (NACLs) can prevent the gathering of victim network information via (active) scanning methods but is not effective against other methods of gathering victim network information such as via Phishing or online databases (e.g. WHOIS) resulting in a Partial coverage score and an overall Partial score.
References
|
amazon_virtual_private_cloud | Amazon Virtual Private Cloud | protect | partial | T1590.006 | Network Security Appliances |
Comments
VPC security groups and network access control lists (NACLs) can prevent the gathering of victim network information via (active) scanning methods but is not effective against other methods of gathering victim network information such as via Phishing or online databases (e.g. WHOIS) resulting in a Partial coverage score and an overall Partial score.
References
|
amazon_virtual_private_cloud | Amazon Virtual Private Cloud | protect | partial | T1595 | Active Scanning |
Comments
VPC security groups and network access control lists (NACLs) can be used to restrict inbound traffic that can protect against active scanning techniques such as Scanning IP Blocks and/or Vulnerability Scanning. Because this protection is limited to known malicious IP addresses and domains and does not provide protection from such attacks from unknown domains and IP addresses, this is scored as partial coverage resulting in an overall Partial score.
References
|
amazon_virtual_private_cloud | Amazon Virtual Private Cloud | protect | partial | T1595.001 | Scanning IP Blocks |
Comments
VPC security groups and network access control lists (NACLs) can be used to restrict inbound traffic that can protect against active scanning techniques such as Scanning IP Blocks and/or Vulnerability Scanning. Because this protection is limited to known malicious IP addresses and domains and does not provide protection from such attacks from unknown domains and IP addresses, this is scored as partial coverage resulting in an overall Partial score.
References
|
amazon_virtual_private_cloud | Amazon Virtual Private Cloud | protect | partial | T1595.002 | Vulnerability Scanning |
Comments
VPC security groups and network access control lists (NACLs) can be used to restrict inbound traffic that can protect against active scanning techniques such as Scanning IP Blocks and/or Vulnerability Scanning. Because this protection is limited to known malicious IP addresses and domains and does not provide protection from such attacks from unknown domains and IP addresses, this is scored as partial coverage resulting in an overall Partial score.
References
|
amazon_virtual_private_cloud | Amazon Virtual Private Cloud | protect | partial | T1133 | External Remote Services |
Comments
VPC security groups and network access control lists (NACLs) can limit access to external remote services to the minimum necessary.
References
|
amazon_virtual_private_cloud | Amazon Virtual Private Cloud | protect | partial | T1205 | Traffic Signaling |
Comments
VPC security groups and network access control lists (NACLs) can provide significant protection for some variations of this technique, for example Port Knocking. Other variations of this technique such as using traffic signaling to execute a malicious task is not easily mitigated by security groups or NACLs. Consequently, its coverage score is Partial resulting in an overall Partial score.
References
|
amazon_virtual_private_cloud | Amazon Virtual Private Cloud | protect | significant | T1205.001 | Port Knocking |
Comments
VPC security groups and network access control lists (NACLs) can protect against this sub-technique by enforcing limited access to only required ports. Consequently, even if the adversary is able to utilize port knocking to open additional ports at the host level, it is still blocked at the security group or NACL level.
References
|
amazon_virtual_private_cloud | Amazon Virtual Private Cloud | protect | significant | T1046 | Network Service Scanning |
Comments
VPC security groups and network access control lists (NACLs) can filter both internal and external network traffic and therefore, can mitigate unauthorized network service scanning.
References
|
amazon_virtual_private_cloud | Amazon Virtual Private Cloud | protect | partial | T1018 | Remote System Discovery |
Comments
VPC security groups and network access control lists (NACLs) can filter network traffic and therefore can be effective for mitigating network based remote system discovery. Other remote system discovery methods such as discovering hosts from local host files are not mitigated resulting in Partial coverage score and an overall score of Partial.
References
|
amazon_virtual_private_cloud | Amazon Virtual Private Cloud | protect | partial | T1008 | Fallback Channels |
Comments
VPC security groups and network access control lists (NACLs) can be used to restrict external network access to the minimum required and can therefore mitigate an adversary utilizing a fallback or alternative communication channels. In environments where unrestricted Internet access is required, security groups and NACLs can still be used to block known malicious endpoints. Because in such environments the protection is limited to known malicious IP addresses and domains and does not provide protection from such attacks from unknown domains and IP addresses, this is scored as partial coverage resulting in an overall Partial score.
References
|
amazon_virtual_private_cloud | Amazon Virtual Private Cloud | protect | partial | T1095 | Non-Application Layer Protocol |
Comments
VPC security groups and network access control lists (NACLs) can be used to restrict external network access to the minimum required and can therefore mitigate adversary attempts to utilize non-application layer protocols for communication. In environments where unrestricted Internet access is required, security groups and NACLs can still be used to block known malicious endpoints. Because in such environments the protection is limited to known malicious IP addresses and domains and does not provide protection from such attacks from unknown domains and IP addresses, this is scored as partial coverage resulting in an overall Partial score.
References
|
amazon_virtual_private_cloud | Amazon Virtual Private Cloud | protect | significant | T1571 | Non-Standard Port |
Comments
VPC security groups and network access control lists (NACLs) can limit access to the minimum required ports and therefore, protect against adversaries attempting to use non-standard ports for C2 traffic.
References
|
amazon_virtual_private_cloud | Amazon Virtual Private Cloud | protect | partial | T1219 | Remote Access Software |
Comments
VPC security groups and network access control lists (NACLs) can be used to limit outgoing traffic to only sites and services used by authorized remote access tools. This is scored as partial because it doesn't protect against an adversary using an authorized remote access tool for malicious activity.
References
|
amazon_virtual_private_cloud | Amazon Virtual Private Cloud | protect | partial | T1048 | Exfiltration Over Alternative Protocol |
Comments
VPC security groups and network access control lists (NACLs) can limit access to external hosts and can therefore provide mitigation of this technique. For environments where Internet access is required, these controls can be used to block known malicious addresses. Because this latter protection is limited to known malicious endpoints, it provides Partial coverage resulting in an overall Partial score.
References
|
amazon_virtual_private_cloud | Amazon Virtual Private Cloud | protect | partial | T1048.001 | Exfiltration Over Symmetric Encrypted Non-C2 Protocol |
Comments
VPC security groups and network access control lists (NACLs) can limit access to the minimum required ports and therefore protect against adversaries attempting to exfiltrate data using a different protocol than that of the existing command and control channel. In environments where unrestricted Internet access is required, security groups and NACLs can still be used to block known malicious endpoints. Because in such environments the protection is limited to known malicious IP addresses and domains and does not provide protection from such attacks from unknown domains and IP addresses, this is scored as partial coverage resulting in an overall Partial score.
References
|
amazon_virtual_private_cloud | Amazon Virtual Private Cloud | protect | partial | T1048.002 | Exfiltration Over Asymmetric Encrypted Non-C2 Protocol |
Comments
VPC security groups and network access control lists (NACLs) can limit access to the minimum required ports and therefore protect against adversaries attempting to exfiltrate data using a different protocol than that of the existing command and control channel. In environments where unrestricted Internet access is required, security groups and NACLs can still be used to block known malicious endpoints. Because in such environments the protection is limited to known malicious IP addresses and domains and does not provide protection from such attacks from unknown domains and IP addresses, this is scored as partial coverage resulting in an overall Partial score.
References
|
amazon_virtual_private_cloud | Amazon Virtual Private Cloud | protect | partial | T1048.003 | Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol |
Comments
VPC security groups and network access control lists (NACLs) can limit access to the minimum required ports and therefore protect against adversaries attempting to exfiltrate data using a different protocol than that of the existing command and control channel. In environments where unrestricted Internet access is required, security groups and NACLs can still be used to block known malicious endpoints. Because in such environments the protection is limited to known malicious IP addresses and domains and does not provide protection from such attacks from unknown domains and IP addresses, this is scored as partial coverage resulting in an overall Partial score.
References
|
amazon_virtual_private_cloud | Amazon Virtual Private Cloud | protect | significant | T1040 | Network Sniffing |
Comments
The VPC service's support for the AWS Virtual Private Network (VPN) can be used to encrypt traffic traversing over untrusted networks which can prevent information from being gathered via network sniffing.
References
|
amazon_virtual_private_cloud | Amazon Virtual Private Cloud | protect | significant | T1557 | Man-in-the-Middle |
Comments
The VPC service's support for the AWS Virtual Private Network (VPN) can be used to encrypt traffic traversing over untrusted networks which can mitigate Man-in-the-Middle attacks that manipulate network protocol data in transit. VPC Peering can also be utilized to route traffic privately between two VPCs which can reduce the Man-in-the-Middle attack surface. VPC Endpoints can also similarly reduce the attack surface of Man-in-the-Middle attacks by ensuring network traffic between a VPC and supported AWS services are not exposed to the Internet.
References
|
amazon_virtual_private_cloud | Amazon Virtual Private Cloud | protect | significant | T1557.002 | ARP Cache Poisoning | |
amazon_virtual_private_cloud | Amazon Virtual Private Cloud | protect | significant | T1557.001 | LLMNR/NBT-NS Poisoning and SMB Relay | |
amazon_virtual_private_cloud | Amazon Virtual Private Cloud | protect | partial | T1565 | Data Manipulation |
Comments
The VPC service's support for the AWS Virtual Private Network (VPN) can be used to encrypt traffic traversing over untrusted networks which can provide protection against one sub-technique (Transmitted Data Manipulation) of this technique while not providing protection for its remaining sub-techniques resulting in overall score of Partial.
References
|
amazon_virtual_private_cloud | Amazon Virtual Private Cloud | protect | significant | T1565.002 | Transmitted Data Manipulation | |
amazon_virtual_private_cloud | Amazon Virtual Private Cloud | protect | partial | T1199 | Trusted Relationship |
Comments
VPC network access control lists (NACLs) can isolate portions of the network that do not require network-wide access, limiting some attackers that leverage trusted relationships such as remote access for vendor maintenance. Coverage partial, Temporal Immediate.
References
|
amazon_virtual_private_cloud | Amazon Virtual Private Cloud | protect | partial | T1602 | Data from Configuration Repository |
Comments
VPC security groups and network access control lists (NACLs) can limit attackers' access to configuration repositories such as SNMP management stations, or to dumps of client configurations from common management ports.
References
|
amazon_virtual_private_cloud | Amazon Virtual Private Cloud | protect | partial | T1602.002 | Network Device Configuration Dump |
Comments
Can limit access to client management interfaces or configuration databases.
References
|
amazon_virtual_private_cloud | Amazon Virtual Private Cloud | protect | partial | T1602.001 | SNMP (MIB Dump) |
Comments
Can limit access to client management interfaces or configuration databases.
References
|
amazon_virtual_private_cloud | Amazon Virtual Private Cloud | protect | minimal | T1542 | Pre-OS Boot |
Comments
VPC security groups and network access control lists (NACLs) can provide partial protection coverage of Pre-OS Boot mechanisms that utilize TFTP boot resulting in an overall score of Minimal.
References
|
amazon_virtual_private_cloud | Amazon Virtual Private Cloud | protect | partial | T1542.005 | TFTP Boot |
Comments
VPC security groups and network access control lists (NACLs) can be used to restrict clients to connecting (and therefore booting) from only trusted network resources.
References
|
amazon_virtual_private_cloud | Amazon Virtual Private Cloud | protect | partial | T1210 | Exploitation of Remote Services |
Comments
VPC security groups and network access control lists (NACLs) can be used to restrict access to remote services to the minimum necessary.
References
|
amazon_virtual_private_cloud | Amazon Virtual Private Cloud | protect | partial | T1021 | Remote Services |
Comments
VPC security groups and network access control lists (NACLs) can provide partial protection for all of its sub-techniques and procedure examples resulting in an overall score of Partial.
References
|
amazon_virtual_private_cloud | Amazon Virtual Private Cloud | protect | partial | T1021.006 | Windows Remote Management |
Comments
VPC security groups and network access control lists (NACLs) can be used to restrict direct access to remote services to trusted networks. This mitigates even an adversary with a valid account from accessing resources. This can be circumvented though if an adversary is able to compromise a trusted host and move laterally to a protected network. This results in an overall partial (coverage) score.
References
|
amazon_virtual_private_cloud | Amazon Virtual Private Cloud | protect | partial | T1021.005 | VNC |
Comments
VPC security groups and network access control lists (NACLs) can be used to restrict direct access to remote services to trusted networks. This mitigates even an adversary with a valid account from accessing resources. This can be circumvented though if an adversary is able to compromise a trusted host and move laterally to a protected network. This results in an overall partial (coverage) score.
References
|
amazon_virtual_private_cloud | Amazon Virtual Private Cloud | protect | partial | T1021.004 | SSH |
Comments
VPC security groups and network access control lists (NACLs) can be used to restrict direct access to remote services to trusted networks. This mitigates even an adversary with a valid account from accessing resources. This can be circumvented though if an adversary is able to compromise a trusted host and move laterally to a protected network. This results in an overall partial (coverage) score.
References
|
amazon_virtual_private_cloud | Amazon Virtual Private Cloud | protect | partial | T1021.003 | Distributed Component Object Model |
Comments
VPC security groups and network access control lists (NACLs) can be used to restrict direct access to remote services to trusted networks. This mitigates even an adversary with a valid account from accessing resources. This can be circumvented though if an adversary is able to compromise a trusted host and move laterally to a protected network. This results in an overall partial (coverage) score.
References
|
amazon_virtual_private_cloud | Amazon Virtual Private Cloud | protect | partial | T1021.002 | SMB/Windows Admin Shares |
Comments
VPC security groups and network access control lists (NACLs) can be used to restrict direct access to remote services to trusted networks. This mitigates even an adversary with a valid account from accessing resources. This can be circumvented though if an adversary is able to compromise a trusted host and move laterally to a protected network. This results in an overall partial (coverage) score.
References
|
amazon_virtual_private_cloud | Amazon Virtual Private Cloud | protect | partial | T1021.001 | Remote Desktop Protocol |
Comments
VPC security groups and network access control lists (NACLs) can be used to restrict direct access to remote services to trusted networks. This mitigates even an adversary with a valid account from accessing resources. This can be circumvented though if an adversary is able to compromise a trusted host and move laterally to a protected network. This results in an overall partial (coverage) score.
References
|
amazon_virtual_private_cloud | Amazon Virtual Private Cloud | protect | partial | T1072 | Software Deployment Tools |
Comments
VPC security groups and network access control lists (NACLs) can be used to limit access to critical network systems such as software deployment tools.
References
|
amazon_virtual_private_cloud | Amazon Virtual Private Cloud | protect | partial | T1482 | Domain Trust Discovery |
Comments
VPC security groups and network access control lists (NACLs) can be used to isolate sensitive domains to limit discovery.
References
|
amazon_virtual_private_cloud | Amazon Virtual Private Cloud | protect | minimal | T1498 | Network Denial of Service |
Comments
VPC security groups and network access control lists (NACLs) can be used to restrict access to endpoints but will prove effective at mitigating only low-end DOS attacks resulting in a Minimal score.
References
|
amazon_virtual_private_cloud | Amazon Virtual Private Cloud | protect | minimal | T1499 | Endpoint Denial of Service |
Comments
VPC security groups and network access control lists (NACLs) provides minimal protection for a majority of this control's sub-techniques and procedure examples resulting in an overall score of Minimal.
References
|
amazon_virtual_private_cloud | Amazon Virtual Private Cloud | protect | minimal | T1499.003 | Application Exhaustion Flood |
Comments
VPC security groups and network access control lists (NACLs) can be used to restrict access to endpoints but will prove effective at mitigating only low-end DOS attacks resulting in a Minimal score.
References
|
amazon_virtual_private_cloud | Amazon Virtual Private Cloud | protect | minimal | T1499.002 | Service Exhaustion Flood |
Comments
VPC security groups and network access control lists (NACLs) can be used to restrict access to endpoints but will prove effective at mitigating only low-end DOS attacks resulting in a Minimal score.
References
|
amazon_virtual_private_cloud | Amazon Virtual Private Cloud | protect | minimal | T1499.001 | OS Exhaustion Flood |
Comments
VPC security groups and network access control lists (NACLs) can be used to restrict access to endpoints but will prove effective at mitigating only low-end DOS attacks resulting in a Minimal score.
References
|
amazon_virtual_private_cloud | Amazon Virtual Private Cloud | protect | partial | T1570 | Lateral Tool Transfer |
Comments
VPC security groups and network access control lists (NACLs) can be used to limit traffic between systems and enclaves to minimum necessary for example via a zero-trust strategy.
References
|
amazon_virtual_private_cloud | Amazon Virtual Private Cloud | protect | partial | T1090 | Proxy |
Comments
VPC security groups and network access control lists (NACLs) can restrict ports and inter-system / inter-enclave connections as described by the Proxy related sub-techniques although it doesn't provide protection for domain-fronting. It furthermore provides partial protection of this technique's procedure examples resulting in an overall Partial score.
References
|
amazon_virtual_private_cloud | Amazon Virtual Private Cloud | protect | partial | T1090.003 | Multi-hop Proxy |
Comments
VPC security groups and network access control lists (NACLs) can restrict access between systems, enclaves, and workloads thereby mitigating these proxy related sub-techniques.
References
|
amazon_virtual_private_cloud | Amazon Virtual Private Cloud | protect | partial | T1090.002 | External Proxy |
Comments
VPC security groups and network access control lists (NACLs) can restrict access between systems, enclaves, and workloads thereby mitigating these proxy related sub-techniques.
References
|
amazon_virtual_private_cloud | Amazon Virtual Private Cloud | protect | partial | T1090.001 | Internal Proxy |
Comments
VPC security groups and network access control lists (NACLs) can restrict access between systems, enclaves, and workloads thereby mitigating these proxy related sub-techniques.
References
|