AWS amazon_virtual_private_cloud Mappings

Amazon Virtual Private Cloud (Amazon VPC) is a service that lets you launch AWS resources in a logically isolated virtual network that you define. Amazon VPC provides advanced security features that allow you to perform inbound and outbound filtering at the instance and subnet level. Amazon VPC also has monitoring features that let you perform functions like out-of-band monitoring and inline traffic inspection, which help you screen and secure traffic.

Mappings

Capability ID Capability Description Category Value ATT&CK ID ATT&CK Name Notes
amazon_virtual_private_cloud Amazon Virtual Private Cloud protect partial T1590 Gather Victim Network Information
Comments
VPC security groups and network access control lists (NACLs) can prevent the gathering of victim network information via (active) scanning methods but is not effective against other methods of gathering victim network information such as via Phishing or online databases (e.g. WHOIS) resulting in a Partial coverage score and an overall Partial score.
References
amazon_virtual_private_cloud Amazon Virtual Private Cloud protect partial T1590.001 Domain Properties
Comments
VPC security groups and network access control lists (NACLs) can prevent the gathering of victim network information via (active) scanning methods but is not effective against other methods of gathering victim network information such as via Phishing or online databases (e.g. WHOIS) resulting in a Partial coverage score and an overall Partial score.
References
    amazon_virtual_private_cloud Amazon Virtual Private Cloud protect partial T1590.004 Network Topology
    Comments
    VPC security groups and network access control lists (NACLs) can prevent the gathering of victim network information via (active) scanning methods but is not effective against other methods of gathering victim network information such as via Phishing or online databases (e.g. WHOIS) resulting in a Partial coverage score and an overall Partial score.
    References
      amazon_virtual_private_cloud Amazon Virtual Private Cloud protect partial T1590.005 IP Addresses
      Comments
      VPC security groups and network access control lists (NACLs) can prevent the gathering of victim network information via (active) scanning methods but is not effective against other methods of gathering victim network information such as via Phishing or online databases (e.g. WHOIS) resulting in a Partial coverage score and an overall Partial score.
      References
        amazon_virtual_private_cloud Amazon Virtual Private Cloud protect partial T1590.006 Network Security Appliances
        Comments
        VPC security groups and network access control lists (NACLs) can prevent the gathering of victim network information via (active) scanning methods but is not effective against other methods of gathering victim network information such as via Phishing or online databases (e.g. WHOIS) resulting in a Partial coverage score and an overall Partial score.
        References
          amazon_virtual_private_cloud Amazon Virtual Private Cloud protect partial T1595 Active Scanning
          Comments
          VPC security groups and network access control lists (NACLs) can be used to restrict inbound traffic that can protect against active scanning techniques such as Scanning IP Blocks and/or Vulnerability Scanning. Because this protection is limited to known malicious IP addresses and domains and does not provide protection from such attacks from unknown domains and IP addresses, this is scored as partial coverage resulting in an overall Partial score.
          References
          amazon_virtual_private_cloud Amazon Virtual Private Cloud protect partial T1595.001 Scanning IP Blocks
          Comments
          VPC security groups and network access control lists (NACLs) can be used to restrict inbound traffic that can protect against active scanning techniques such as Scanning IP Blocks and/or Vulnerability Scanning. Because this protection is limited to known malicious IP addresses and domains and does not provide protection from such attacks from unknown domains and IP addresses, this is scored as partial coverage resulting in an overall Partial score.
          References
            amazon_virtual_private_cloud Amazon Virtual Private Cloud protect partial T1595.002 Vulnerability Scanning
            Comments
            VPC security groups and network access control lists (NACLs) can be used to restrict inbound traffic that can protect against active scanning techniques such as Scanning IP Blocks and/or Vulnerability Scanning. Because this protection is limited to known malicious IP addresses and domains and does not provide protection from such attacks from unknown domains and IP addresses, this is scored as partial coverage resulting in an overall Partial score.
            References
              amazon_virtual_private_cloud Amazon Virtual Private Cloud protect partial T1133 External Remote Services
              Comments
              VPC security groups and network access control lists (NACLs) can limit access to external remote services to the minimum necessary.
              References
              amazon_virtual_private_cloud Amazon Virtual Private Cloud protect partial T1205 Traffic Signaling
              Comments
              VPC security groups and network access control lists (NACLs) can provide significant protection for some variations of this technique, for example Port Knocking. Other variations of this technique such as using traffic signaling to execute a malicious task is not easily mitigated by security groups or NACLs. Consequently, its coverage score is Partial resulting in an overall Partial score.
              References
              amazon_virtual_private_cloud Amazon Virtual Private Cloud protect significant T1205.001 Port Knocking
              Comments
              VPC security groups and network access control lists (NACLs) can protect against this sub-technique by enforcing limited access to only required ports. Consequently, even if the adversary is able to utilize port knocking to open additional ports at the host level, it is still blocked at the security group or NACL level.
              References
                amazon_virtual_private_cloud Amazon Virtual Private Cloud protect significant T1046 Network Service Scanning
                Comments
                VPC security groups and network access control lists (NACLs) can filter both internal and external network traffic and therefore, can mitigate unauthorized network service scanning.
                References
                amazon_virtual_private_cloud Amazon Virtual Private Cloud protect partial T1018 Remote System Discovery
                Comments
                VPC security groups and network access control lists (NACLs) can filter network traffic and therefore can be effective for mitigating network based remote system discovery. Other remote system discovery methods such as discovering hosts from local host files are not mitigated resulting in Partial coverage score and an overall score of Partial.
                References
                amazon_virtual_private_cloud Amazon Virtual Private Cloud protect partial T1008 Fallback Channels
                Comments
                VPC security groups and network access control lists (NACLs) can be used to restrict external network access to the minimum required and can therefore mitigate an adversary utilizing a fallback or alternative communication channels. In environments where unrestricted Internet access is required, security groups and NACLs can still be used to block known malicious endpoints. Because in such environments the protection is limited to known malicious IP addresses and domains and does not provide protection from such attacks from unknown domains and IP addresses, this is scored as partial coverage resulting in an overall Partial score.
                References
                amazon_virtual_private_cloud Amazon Virtual Private Cloud protect partial T1095 Non-Application Layer Protocol
                Comments
                VPC security groups and network access control lists (NACLs) can be used to restrict external network access to the minimum required and can therefore mitigate adversary attempts to utilize non-application layer protocols for communication. In environments where unrestricted Internet access is required, security groups and NACLs can still be used to block known malicious endpoints. Because in such environments the protection is limited to known malicious IP addresses and domains and does not provide protection from such attacks from unknown domains and IP addresses, this is scored as partial coverage resulting in an overall Partial score.
                References
                amazon_virtual_private_cloud Amazon Virtual Private Cloud protect significant T1571 Non-Standard Port
                Comments
                VPC security groups and network access control lists (NACLs) can limit access to the minimum required ports and therefore, protect against adversaries attempting to use non-standard ports for C2 traffic.
                References
                amazon_virtual_private_cloud Amazon Virtual Private Cloud protect partial T1219 Remote Access Software
                Comments
                VPC security groups and network access control lists (NACLs) can be used to limit outgoing traffic to only sites and services used by authorized remote access tools. This is scored as partial because it doesn't protect against an adversary using an authorized remote access tool for malicious activity.
                References
                amazon_virtual_private_cloud Amazon Virtual Private Cloud protect partial T1048 Exfiltration Over Alternative Protocol
                Comments
                VPC security groups and network access control lists (NACLs) can limit access to external hosts and can therefore provide mitigation of this technique. For environments where Internet access is required, these controls can be used to block known malicious addresses. Because this latter protection is limited to known malicious endpoints, it provides Partial coverage resulting in an overall Partial score.
                References
                amazon_virtual_private_cloud Amazon Virtual Private Cloud protect partial T1048.001 Exfiltration Over Symmetric Encrypted Non-C2 Protocol
                Comments
                VPC security groups and network access control lists (NACLs) can limit access to the minimum required ports and therefore protect against adversaries attempting to exfiltrate data using a different protocol than that of the existing command and control channel. In environments where unrestricted Internet access is required, security groups and NACLs can still be used to block known malicious endpoints. Because in such environments the protection is limited to known malicious IP addresses and domains and does not provide protection from such attacks from unknown domains and IP addresses, this is scored as partial coverage resulting in an overall Partial score.
                References
                  amazon_virtual_private_cloud Amazon Virtual Private Cloud protect partial T1048.002 Exfiltration Over Asymmetric Encrypted Non-C2 Protocol
                  Comments
                  VPC security groups and network access control lists (NACLs) can limit access to the minimum required ports and therefore protect against adversaries attempting to exfiltrate data using a different protocol than that of the existing command and control channel. In environments where unrestricted Internet access is required, security groups and NACLs can still be used to block known malicious endpoints. Because in such environments the protection is limited to known malicious IP addresses and domains and does not provide protection from such attacks from unknown domains and IP addresses, this is scored as partial coverage resulting in an overall Partial score.
                  References
                    amazon_virtual_private_cloud Amazon Virtual Private Cloud protect partial T1048.003 Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol
                    Comments
                    VPC security groups and network access control lists (NACLs) can limit access to the minimum required ports and therefore protect against adversaries attempting to exfiltrate data using a different protocol than that of the existing command and control channel. In environments where unrestricted Internet access is required, security groups and NACLs can still be used to block known malicious endpoints. Because in such environments the protection is limited to known malicious IP addresses and domains and does not provide protection from such attacks from unknown domains and IP addresses, this is scored as partial coverage resulting in an overall Partial score.
                    References
                      amazon_virtual_private_cloud Amazon Virtual Private Cloud protect significant T1040 Network Sniffing
                      Comments
                      The VPC service's support for the AWS Virtual Private Network (VPN) can be used to encrypt traffic traversing over untrusted networks which can prevent information from being gathered via network sniffing.
                      References
                      amazon_virtual_private_cloud Amazon Virtual Private Cloud protect significant T1557 Man-in-the-Middle
                      Comments
                      The VPC service's support for the AWS Virtual Private Network (VPN) can be used to encrypt traffic traversing over untrusted networks which can mitigate Man-in-the-Middle attacks that manipulate network protocol data in transit. VPC Peering can also be utilized to route traffic privately between two VPCs which can reduce the Man-in-the-Middle attack surface. VPC Endpoints can also similarly reduce the attack surface of Man-in-the-Middle attacks by ensuring network traffic between a VPC and supported AWS services are not exposed to the Internet.
                      References
                      amazon_virtual_private_cloud Amazon Virtual Private Cloud protect significant T1557.002 ARP Cache Poisoning
                      amazon_virtual_private_cloud Amazon Virtual Private Cloud protect significant T1557.001 LLMNR/NBT-NS Poisoning and SMB Relay
                      amazon_virtual_private_cloud Amazon Virtual Private Cloud protect partial T1565 Data Manipulation
                      Comments
                      The VPC service's support for the AWS Virtual Private Network (VPN) can be used to encrypt traffic traversing over untrusted networks which can provide protection against one sub-technique (Transmitted Data Manipulation) of this technique while not providing protection for its remaining sub-techniques resulting in overall score of Partial.
                      References
                      amazon_virtual_private_cloud Amazon Virtual Private Cloud protect significant T1565.002 Transmitted Data Manipulation
                      amazon_virtual_private_cloud Amazon Virtual Private Cloud protect partial T1199 Trusted Relationship
                      Comments
                      VPC network access control lists (NACLs) can isolate portions of the network that do not require network-wide access, limiting some attackers that leverage trusted relationships such as remote access for vendor maintenance. Coverage partial, Temporal Immediate.
                      References
                      amazon_virtual_private_cloud Amazon Virtual Private Cloud protect partial T1602 Data from Configuration Repository
                      Comments
                      VPC security groups and network access control lists (NACLs) can limit attackers' access to configuration repositories such as SNMP management stations, or to dumps of client configurations from common management ports.
                      References
                      amazon_virtual_private_cloud Amazon Virtual Private Cloud protect partial T1602.002 Network Device Configuration Dump
                      Comments
                      Can limit access to client management interfaces or configuration databases.
                      References
                        amazon_virtual_private_cloud Amazon Virtual Private Cloud protect partial T1602.001 SNMP (MIB Dump)
                        Comments
                        Can limit access to client management interfaces or configuration databases.
                        References
                          amazon_virtual_private_cloud Amazon Virtual Private Cloud protect minimal T1542 Pre-OS Boot
                          Comments
                          VPC security groups and network access control lists (NACLs) can provide partial protection coverage of Pre-OS Boot mechanisms that utilize TFTP boot resulting in an overall score of Minimal.
                          References
                          amazon_virtual_private_cloud Amazon Virtual Private Cloud protect partial T1542.005 TFTP Boot
                          Comments
                          VPC security groups and network access control lists (NACLs) can be used to restrict clients to connecting (and therefore booting) from only trusted network resources.
                          References
                            amazon_virtual_private_cloud Amazon Virtual Private Cloud protect partial T1210 Exploitation of Remote Services
                            Comments
                            VPC security groups and network access control lists (NACLs) can be used to restrict access to remote services to the minimum necessary.
                            References
                            amazon_virtual_private_cloud Amazon Virtual Private Cloud protect partial T1021 Remote Services
                            Comments
                            VPC security groups and network access control lists (NACLs) can provide partial protection for all of its sub-techniques and procedure examples resulting in an overall score of Partial.
                            References
                            amazon_virtual_private_cloud Amazon Virtual Private Cloud protect partial T1021.006 Windows Remote Management
                            Comments
                            VPC security groups and network access control lists (NACLs) can be used to restrict direct access to remote services to trusted networks. This mitigates even an adversary with a valid account from accessing resources. This can be circumvented though if an adversary is able to compromise a trusted host and move laterally to a protected network. This results in an overall partial (coverage) score.
                            References
                              amazon_virtual_private_cloud Amazon Virtual Private Cloud protect partial T1021.005 VNC
                              Comments
                              VPC security groups and network access control lists (NACLs) can be used to restrict direct access to remote services to trusted networks. This mitigates even an adversary with a valid account from accessing resources. This can be circumvented though if an adversary is able to compromise a trusted host and move laterally to a protected network. This results in an overall partial (coverage) score.
                              References
                                amazon_virtual_private_cloud Amazon Virtual Private Cloud protect partial T1021.004 SSH
                                Comments
                                VPC security groups and network access control lists (NACLs) can be used to restrict direct access to remote services to trusted networks. This mitigates even an adversary with a valid account from accessing resources. This can be circumvented though if an adversary is able to compromise a trusted host and move laterally to a protected network. This results in an overall partial (coverage) score.
                                References
                                  amazon_virtual_private_cloud Amazon Virtual Private Cloud protect partial T1021.003 Distributed Component Object Model
                                  Comments
                                  VPC security groups and network access control lists (NACLs) can be used to restrict direct access to remote services to trusted networks. This mitigates even an adversary with a valid account from accessing resources. This can be circumvented though if an adversary is able to compromise a trusted host and move laterally to a protected network. This results in an overall partial (coverage) score.
                                  References
                                    amazon_virtual_private_cloud Amazon Virtual Private Cloud protect partial T1021.002 SMB/Windows Admin Shares
                                    Comments
                                    VPC security groups and network access control lists (NACLs) can be used to restrict direct access to remote services to trusted networks. This mitigates even an adversary with a valid account from accessing resources. This can be circumvented though if an adversary is able to compromise a trusted host and move laterally to a protected network. This results in an overall partial (coverage) score.
                                    References
                                      amazon_virtual_private_cloud Amazon Virtual Private Cloud protect partial T1021.001 Remote Desktop Protocol
                                      Comments
                                      VPC security groups and network access control lists (NACLs) can be used to restrict direct access to remote services to trusted networks. This mitigates even an adversary with a valid account from accessing resources. This can be circumvented though if an adversary is able to compromise a trusted host and move laterally to a protected network. This results in an overall partial (coverage) score.
                                      References
                                        amazon_virtual_private_cloud Amazon Virtual Private Cloud protect partial T1072 Software Deployment Tools
                                        Comments
                                        VPC security groups and network access control lists (NACLs) can be used to limit access to critical network systems such as software deployment tools.
                                        References
                                        amazon_virtual_private_cloud Amazon Virtual Private Cloud protect partial T1482 Domain Trust Discovery
                                        Comments
                                        VPC security groups and network access control lists (NACLs) can be used to isolate sensitive domains to limit discovery.
                                        References
                                        amazon_virtual_private_cloud Amazon Virtual Private Cloud protect minimal T1498 Network Denial of Service
                                        Comments
                                        VPC security groups and network access control lists (NACLs) can be used to restrict access to endpoints but will prove effective at mitigating only low-end DOS attacks resulting in a Minimal score.
                                        References
                                        amazon_virtual_private_cloud Amazon Virtual Private Cloud protect minimal T1499 Endpoint Denial of Service
                                        Comments
                                        VPC security groups and network access control lists (NACLs) provides minimal protection for a majority of this control's sub-techniques and procedure examples resulting in an overall score of Minimal.
                                        References
                                        amazon_virtual_private_cloud Amazon Virtual Private Cloud protect minimal T1499.003 Application Exhaustion Flood
                                        Comments
                                        VPC security groups and network access control lists (NACLs) can be used to restrict access to endpoints but will prove effective at mitigating only low-end DOS attacks resulting in a Minimal score.
                                        References
                                          amazon_virtual_private_cloud Amazon Virtual Private Cloud protect minimal T1499.002 Service Exhaustion Flood
                                          Comments
                                          VPC security groups and network access control lists (NACLs) can be used to restrict access to endpoints but will prove effective at mitigating only low-end DOS attacks resulting in a Minimal score.
                                          References
                                            amazon_virtual_private_cloud Amazon Virtual Private Cloud protect minimal T1499.001 OS Exhaustion Flood
                                            Comments
                                            VPC security groups and network access control lists (NACLs) can be used to restrict access to endpoints but will prove effective at mitigating only low-end DOS attacks resulting in a Minimal score.
                                            References
                                              amazon_virtual_private_cloud Amazon Virtual Private Cloud protect partial T1570 Lateral Tool Transfer
                                              Comments
                                              VPC security groups and network access control lists (NACLs) can be used to limit traffic between systems and enclaves to minimum necessary for example via a zero-trust strategy.
                                              References
                                              amazon_virtual_private_cloud Amazon Virtual Private Cloud protect partial T1090 Proxy
                                              Comments
                                              VPC security groups and network access control lists (NACLs) can restrict ports and inter-system / inter-enclave connections as described by the Proxy related sub-techniques although it doesn't provide protection for domain-fronting. It furthermore provides partial protection of this technique's procedure examples resulting in an overall Partial score.
                                              References
                                              amazon_virtual_private_cloud Amazon Virtual Private Cloud protect partial T1090.003 Multi-hop Proxy
                                              Comments
                                              VPC security groups and network access control lists (NACLs) can restrict access between systems, enclaves, and workloads thereby mitigating these proxy related sub-techniques.
                                              References
                                                amazon_virtual_private_cloud Amazon Virtual Private Cloud protect partial T1090.002 External Proxy
                                                Comments
                                                VPC security groups and network access control lists (NACLs) can restrict access between systems, enclaves, and workloads thereby mitigating these proxy related sub-techniques.
                                                References
                                                  amazon_virtual_private_cloud Amazon Virtual Private Cloud protect partial T1090.001 Internal Proxy
                                                  Comments
                                                  VPC security groups and network access control lists (NACLs) can restrict access between systems, enclaves, and workloads thereby mitigating these proxy related sub-techniques.
                                                  References