Capability ID | Capability Description | Category | Value | ATT&CK ID | ATT&CK Name | Notes |
---|---|---|---|---|---|---|
aws_rds | AWS RDS | protect | significant | T1040 | Network Sniffing |
Comments
AWS RDS and AWS RDS Proxy support TLS/SSL connections to database instances which protects against network sniffing attacks. As a result, this mapping is given a score of Significant.
References
|
aws_rds | AWS RDS | protect | partial | T1565 | Data Manipulation |
Comments
AWS RDS supports the encryption of database instances using the AES-256 encryption algorithm. This can protect database instances from being modified at rest. Furthermore, AWS RDS supports TLS/SSL connections which protect data from being modified during transit. This mapping is given a score of Partial because it only supports a subset of the sub-techniques (2 of 3).
References
|
aws_rds | AWS RDS | respond | significant | T1565 | Data Manipulation |
Comments
AWS RDS supports the replication and recovery of database instances. In the event that data is manipulated, AWS RDS can be used to restore the database instance to a previous point in time. As a result, this mapping is given a score of Significant.
References
|
aws_rds | AWS RDS | protect | significant | T1565.001 | Stored Data Manipulation |
Comments
AWS RDS supports the encryption of database instances using the AES-256 encryption algorithm. This can protect database instances from being modified at rest. Furthermore, AWS RDS supports TLS/SSL connections which protect data from being modified during transit. As a result, this mapping is given a score of Significant.
References
|
aws_rds | AWS RDS | respond | significant | T1565.001 | Stored Data Manipulation |
Comments
AWS RDS supports the replication and recovery of database instances. In the event that data is manipulated, AWS RDS can be used to restore the database instance to a previous point in time. As a result, this mapping is given a score of Significant.
References
|
aws_rds | AWS RDS | protect | significant | T1565.002 | Transmitted Data Manipulation |
Comments
AWS RDS supports the encryption of database instances using the AES-256 encryption algorithm. This can protect database instances from being modified at rest. Furthermore, AWS RDS supports TLS/SSL connections which protect data from being modified during transit. As a result, this mapping is given a score of Significant.
References
|
aws_rds | AWS RDS | respond | significant | T1565.002 | Transmitted Data Manipulation |
Comments
AWS RDS supports the replication and recovery of database instances. In the event that data is manipulated, AWS RDS can be used to restore the database instance to a previous point in time. As a result, this mapping is given a score of Significant.
References
|
aws_rds | AWS RDS | protect | significant | T1557 | Man-in-the-Middle |
Comments
AWS RDS and AWS RDS Proxy support TLS/SSL connections to database instances which protects against man-in-the-middle attacks. However, given that it does not support any sub-techniques, the mapping is given a score of Partial.
References
|
aws_rds | AWS RDS | protect | partial | T1190 | Exploit Public-Facing Application |
Comments
AWS RDS supports the automatic patching of minor versions of database instances. This can result in security flaws in the database instances being fixed before they can be exploited. This mapping is given a score of Partial because it does not protect against misconfigured database instances which may be susceptible to exploitation.
References
|
aws_rds | AWS RDS | respond | significant | T1190 | Exploit Public-Facing Application |
Comments
AWS RDS supports the replication and recovery of database instances. In the event that a database instance is compromised, AWS RDS can be used to restore the database instance to a previous point in time. As a result, this mapping is given a score of Significant.
References
|
aws_rds | AWS RDS | protect | partial | T1210 | Exploitation of Remote Services |
Comments
AWS RDS supports the automatic patching of minor versions of database instances. This can result in security flaws in the database instances being fixed before they can be exploited. This mapping is given a score of Partial because it does not protect against misconfigured database instances which may be susceptible to exploitation.
References
|
aws_rds | AWS RDS | respond | significant | T1210 | Exploitation of Remote Services |
Comments
AWS RDS supports the replication and recovery of database instances. In the event that a database instance is compromised, AWS RDS can be used to restore the database instance to a previous point in time. As a result, this mapping is given a score of Significant.
References
|
aws_rds | AWS RDS | protect | significant | T1485 | Data Destruction |
Comments
AWS RDS provides deletion protection which prevents any user from deleting a database instance. If applied, the setting may mitigate attempts to delete a database instance. As a result, this mapping is given a score of Significant.
References
|
aws_rds | AWS RDS | detect | partial | T1485 | Data Destruction |
Comments
AWS RDS generates events for database instances and includes the following events that may indicate that an adversary has destroyed the database instance.
RDS-EVENT-0003: The DB instance has been deleted RDS-EVENT-0041: A DB snapshot has been deleted
This mapping is given a score of Partial because it can't differentiate between an authorized and unauthorized deletion.
References
|
aws_rds | AWS RDS | respond | significant | T1485 | Data Destruction |
Comments
AWS RDS supports the replication and recovery of database instances. In the event that a database instance is deleted, AWS RDS can be used to restore the database instance to a previous point in time. As a result, this mapping is given a score of Significant.
References
|
aws_rds | AWS RDS | respond | significant | T1486 | Data Encrypted for Impact |
Comments
AWS RDS supports the replication and recovery of database instances. In the event that a database instance is encrypted by an adversary (e.g., ransomware), AWS RDS can be used to restore the database instance to a previous point in time. As a result, this mapping is given a score of Significant.
References
|
aws_rds | AWS RDS | detect | partial | T1490 | Inhibit System Recovery |
Comments
AWS RDS generates events for database instances and includes the following event that may indicate that an adversary has attempted to inhibit system recovery.
RDS-EVENT-0028: Automatic backups for this DB instance have been disabled
This mapping is given a score of Partial because it can't differentiate between an authorized and unauthorized disabling of automatic backups.
References
|
aws_rds | AWS RDS | respond | significant | T1490 | Inhibit System Recovery |
Comments
AWS RDS supports the replication and recovery of database instances. In the event that a database instance is compromised and modified to disrupt recovery, AWS RDS can be used to restore the database instance to a previous point in time. As a result, this mapping is given a score of Significant.
References
|
aws_rds | AWS RDS | respond | minimal | T1561 | Disk Wipe |
Comments
AWS RDS supports the replication and recovery of database instances. In the event that a database instance is deleted during a disk wipe, AWS RDS can be used to restore the database instance to a previous point in time. However, this mapping is only given a score of Minimal because AWS RDS only provides a backup of the database instance and not the underlying system that it is hosted on.
References
|
aws_rds | AWS RDS | respond | minimal | T1561.001 | Disk Content Wipe |
Comments
AWS RDS supports the replication and recovery of database instances. In the event that a database instance is deleted during a disk wipe, AWS RDS can be used to restore the database instance to a previous point in time. However, this mapping is only given a score of Partial because AWS RDS only provides a backup of the database instance and not the underlying system that it is hosted on.
References
|
aws_rds | AWS RDS | respond | minimal | T1561.002 | Disk Structure Wipe |
Comments
AWS RDS supports the replication and recovery of database instances. In the event that a database instance is deleted during a disk wipe, AWS RDS can be used to restore the database instance to a previous point in time. However, this mapping is only given a score of Partial because AWS RDS only provides a backup of the database instance and not the underlying system that it is hosted on.
References
|
aws_rds | AWS RDS | protect | significant | T1530 | Data from Cloud Storage Object |
Comments
AWS RDS supports the encryption of the underlying storage for database instances, backups, read replicas, and snapshots using the AES-256 encryption algorithm. This can protect against an adversary from gaining access to a database instance in the event they get access to the underlying system where the database instance is hosted or to S3 where the backups are stored. Furthermore, with AWS RDS, there is a setting that specifies whether or not a database instances is publicly accessible. When public accessibility is turned off, the database instance will not be available outside the VPC in which it was created. As a result, this mapping is given a score of Significant.
References
|
aws_rds | AWS RDS | detect | partial | T1529 | System Shutdown/Reboot |
Comments
AWS RDS generates events for database instances and includes the following events that may indicate that an adversary has shutdown or rebooted the database instance.
RDS-EVENT-0006: The DB instance restarted, RDS-EVENT-0004: The DB instance shutdown, RDS-EVENT-0022: An error has occurred while restarting MySQL or MariaDB
This mapping is given a score of Partial because it can't differentiate between an authorized and unauthorized shutdown/reboot.
References
|
aws_rds | AWS RDS | detect | partial | T1489 | Service Stop |
Comments
AWS RDS generates events for database instances and includes the following event that may indicate that an adversary has attempted to stop a database instance.
RDS-EVENT-0087: The DB instance has been stopped
This mapping is given a score of Partial because it can't differentiate between an authorized and unauthorized stopping of the database instance.
References
|