Azure Azure Network Security Groups Capability Group

All Mappings

Capability ID Capability Description Category Value ATT&CK ID ATT&CK Name Notes
azure_network_security_groups Azure Network Security Groups protect minimal T1542 Pre-OS Boot
azure_network_security_groups Azure Network Security Groups protect partial T1021 Remote Services
azure_network_security_groups Azure Network Security Groups protect partial T1021.001 Remote Desktop Protocol
Comments
This control can be used to restrict direct access to remote services to trusted networks. This mitigates even an adversary with a valid account from accessing resources. This can be circumvented though if an adversary is able to compromise a trusted host and move laterally to a protected network. This results in an overall partial (coverage) score.
References
azure_network_security_groups Azure Network Security Groups protect partial T1021.002 SMB/Windows Admin Shares
Comments
This control can be used to restrict direct access to remote services to trusted networks. This mitigates even an adversary with a valid account from accessing resources. This can be circumvented though if an adversary is able to compromise a trusted host and move laterally to a protected network. This results in an overall partial (coverage) score.
References
azure_network_security_groups Azure Network Security Groups protect partial T1021.003 Distributed Component Object Model
Comments
This control can be used to restrict direct access to remote services to trusted networks. This mitigates even an adversary with a valid account from accessing resources. This can be circumvented though if an adversary is able to compromise a trusted host and move laterally to a protected network. This results in an overall partial (coverage) score.
References
azure_network_security_groups Azure Network Security Groups protect partial T1021.004 SSH
Comments
This control can be used to restrict direct access to remote services to trusted networks. This mitigates even an adversary with a valid account from accessing resources. This can be circumvented though if an adversary is able to compromise a trusted host and move laterally to a protected network. This results in an overall partial (coverage) score.
References
azure_network_security_groups Azure Network Security Groups protect partial T1021.005 VNC
Comments
This control can be used to restrict direct access to remote services to trusted networks. This mitigates even an adversary with a valid account from accessing resources. This can be circumvented though if an adversary is able to compromise a trusted host and move laterally to a protected network. This results in an overall partial (coverage) score.
References
azure_network_security_groups Azure Network Security Groups protect partial T1021.006 Windows Remote Management
Comments
This control can be used to restrict direct access to remote services to trusted networks. This mitigates even an adversary with a valid account from accessing resources. This can be circumvented though if an adversary is able to compromise a trusted host and move laterally to a protected network. This results in an overall partial (coverage) score.
References
azure_network_security_groups Azure Network Security Groups protect partial T1021.007 Cloud Services
Comments
This control can protect against abuse of remote cloud services.
References
azure_network_security_groups Azure Network Security Groups protect partial T1021.008 Direct Cloud VM Connections
Comments
This control can protect against abuse of direct cloud VM connections.
References
azure_network_security_groups Azure Network Security Groups protect partial T1046 Network Service Discovery
azure_network_security_groups Azure Network Security Groups protect partial T1072 Software Deployment Tools
azure_network_security_groups Azure Network Security Groups protect partial T1090 Proxy
Comments
This control can restrict ports and inter-system / inter-enclave connections as described by the Proxy related sub-techniques although it doesn't provide protection for domain-fronting. It furthermore provides partial protection of this technique's procedure examples resulting in an overall Partial score.
References
azure_network_security_groups Azure Network Security Groups protect partial T1090.001 Internal Proxy
Comments
This control can restrict access between systems, enclaves, and workloads thereby mitigating these proxy related sub-techniques.
References
azure_network_security_groups Azure Network Security Groups protect partial T1090.002 External Proxy
Comments
This control can restrict access between systems, enclaves, and workloads thereby mitigating these proxy related sub-techniques.
References
azure_network_security_groups Azure Network Security Groups protect partial T1090.003 Multi-hop Proxy
Comments
This control can restrict access between systems, enclaves, and workloads thereby mitigating these proxy related sub-techniques.
References
azure_network_security_groups Azure Network Security Groups protect partial T1095 Non-Application Layer Protocol
azure_network_security_groups Azure Network Security Groups protect partial T1133 External Remote Services
Comments
This control can be used to restrict direct access to remote service gateways and concentrators that typically accompany external remote services. This can be circumvented though if an adversary is able to compromise a trusted host and use it to access the external remote service. This results in an overall partial (coverage) score.
References
azure_network_security_groups Azure Network Security Groups protect partial T1199 Trusted Relationship
Comments
This control can isolate portions of network that do not require network-wide access, limiting some attackers that leverage trusted relationships such as remote access for vendor maintenance. Coverage partial, Temporal Immediate.
References
azure_network_security_groups Azure Network Security Groups protect partial T1205 Traffic Signaling
Comments
This control provides partial protection for this technique's sub-techniques and procedure examples resulting in an overall Partial score. Other variations that trigger a special response, such as executing a malicous task are not mitigated by this control.
References
azure_network_security_groups Azure Network Security Groups protect partial T1210 Exploitation of Remote Services
azure_network_security_groups Azure Network Security Groups protect partial T1219 Remote Access Software
azure_network_security_groups Azure Network Security Groups protect partial T1482 Domain Trust Discovery
azure_network_security_groups Azure Network Security Groups protect partial T1498 Network Denial of Service
azure_network_security_groups Azure Network Security Groups protect partial T1499 Endpoint Denial of Service
azure_network_security_groups Azure Network Security Groups protect partial T1499.001 OS Exhaustion Flood
Comments
This control can be used to restrict access to endpoints and thereby mitigate low-end DOS attacks.
References
azure_network_security_groups Azure Network Security Groups protect partial T1499.002 Service Exhaustion Flood
Comments
This control can be used to restrict access to endpoints and thereby mitigate low-end DOS attacks.
References
azure_network_security_groups Azure Network Security Groups protect partial T1499.003 Application Exhaustion Flood
Comments
This control can be used to restrict access to endpoints and thereby mitigate low-end DOS attacks.
References
azure_network_security_groups Azure Network Security Groups protect partial T1542.005 TFTP Boot
Comments
This control can be used to restrict clients to connecting (and therefore booting) from only trusted network resources.
References
azure_network_security_groups Azure Network Security Groups protect partial T1557 Adversary-in-the-Middle
azure_network_security_groups Azure Network Security Groups protect partial T1570 Lateral Tool Transfer
azure_network_security_groups Azure Network Security Groups protect partial T1602 Data from Configuration Repository
azure_network_security_groups Azure Network Security Groups protect partial T1602.001 SNMP (MIB Dump)
Comments
Can limit access to client management interfaces or configuration databases
References
azure_network_security_groups Azure Network Security Groups protect partial T1602.002 Network Device Configuration Dump
Comments
Can limit access to client management interfaces or configuration databases
References
azure_network_security_groups Azure Network Security Groups protect partial T1659 Content Injection
azure_network_security_groups Azure Network Security Groups protect significant T1048 Exfiltration Over Alternative Protocol
azure_network_security_groups Azure Network Security Groups protect significant T1048.001 Exfiltration Over Symmetric Encrypted Non-C2 Protocol
Comments
This control can reduce the protocols available for data exfiltration. Temporal immediate, coverage substantial.
References
azure_network_security_groups Azure Network Security Groups protect significant T1048.002 Exfiltration Over Asymmetric Encrypted Non-C2 Protocol
Comments
This control can reduce the protocols available for data exfiltration. Temporal immediate, coverage substantial.
References
azure_network_security_groups Azure Network Security Groups protect significant T1048.003 Exfiltration Over Unencrypted Non-C2 Protocol
Comments
This control can reduce the protocols available for data exfiltration. Temporal immediate, coverage substantial.
References
azure_network_security_groups Azure Network Security Groups protect significant T1205.001 Port Knocking
Comments
This control can be used to implement whitelist based network rules that can mitigate variations of this sub-techniques that result in opening closed ports for communication. Because this control is able to drop traffic before reaching a compromised host, it can effectively mitigate this port knocking sub-technique.
References
azure_network_security_groups Azure Network Security Groups protect significant T1496.002 Bandwidth Hijacking
Comments
This capability can be configured to limit bandwidth available to connections.
References
azure_network_security_groups Azure Network Security Groups protect significant T1571 Non-Standard Port

Capabilities

Capability ID Capability Name Number of Mappings
azure_network_security_groups Azure Network Security Groups 42