Azure Azure Security Center Recommendations Capability Group

All Mappings

Loading, please wait
Capability ID
Capability Description
Category
Value
ATT&CK ID
ATT&CK Name
Notes
azure_security_center_recommendations Azure Security Center Recommendations protectminimal T1040 Network Sniffing
Comments
This control's recommendations related to enforcing the usage of the secure versions of the HTTP and FTP protocols (HTTPS and FTPS) can lead to encrypting traffic which reduces the ability for an adversary to gather sensitive data via network sniffing. This also applies to the "Service Fabric clusters should have the ClusterProtectionLevel property set to EncryptAndSign", "Enforce SSL connection should be enabled for MySQL database servers", "Enforce SSL connection should be enabled for PostgreSQL database servers", "Only secure connections to your Redis Cache should be enabled" and "Secure transfer to storage accounts should be enabled" recommendations for their respective protocols. The "Usage of host networking and ports should be restricted" recommendation for Kubernetes clusters can also lead to mitigating this technique. These recommendations are limited to specific technologies on the platform and therefore its coverage score is Minimal.
References
azure_security_center_recommendations Azure Security Center Recommendations protectminimal T1190 Exploit Public-Facing Application
Comments
This control's CORS related recommendations can help lead to hardened web applications. This can reduce the likelihood of an application being exploited to reveal sensitive data that can lead to the compromise of an environment. Likewise this control's recommendations related to keeping Java/PHP up to date for API/Function/Web apps can lead to hardening the public facing content that uses these runtimes. This control's recommendations related to disabling Public network access for Azure databases can lead to reducing the exposure of resources to the public Internet and thereby reduce the attack surface. These recommendations are limited to specific technologies (Java, PHP and CORS, SQL DBs) and therefore provide Minimal coverage leading to a Minimal score.
References
azure_security_center_recommendations Azure Security Center Recommendations protectminimal T1110 Brute Force
Comments
This control's "Authentication to Linux machines should require SSH keys" recommendation can lead to obviating SSH Brute Force password attacks. Because this is specific to Linux, the coverage score is Minimal leading to an overall Minimal score.
References
azure_security_center_recommendations Azure Security Center Recommendations protectminimal T1110.001 Password Guessing
Comments
This control's "Authentication to Linux machines should require SSH keys" can obviate SSH Brute Force password attacks. Because this is specific to Linux, the coverage score is Minimal leading to an overall Minimal score.
References
    azure_security_center_recommendations Azure Security Center Recommendations protectminimal T1110.003 Password Spraying
    Comments
    This control's "Authentication to Linux machines should require SSH keys" can obviate SSH Brute Force password attacks. Because this is specific to Linux, the coverage score is Minimal leading to an overall Minimal score.
    References
      azure_security_center_recommendations Azure Security Center Recommendations protectminimal T1110.004 Credential Stuffing
      Comments
      This control's "Authentication to Linux machines should require SSH keys" can obviate SSH Brute Force password attacks. Because this is specific to Linux, the coverage score is Minimal leading to an overall Minimal score.
      References
        azure_security_center_recommendations Azure Security Center Recommendations protectpartial T1542 Pre-OS Boot
        Comments
        This control provides recommendations for enabling Secure Boot of Linux VMs that can mitigate a few of the sub-techniques of this technique. Because this is a recommendation and only limited to a few sub-techniques of this technique, its assessed score is Partial.
        References
        azure_security_center_recommendations Azure Security Center Recommendations protectpartial T1542.001 System Firmware
        Comments
        This control's "Secure Boot should be enabled on your Linux virtual machine" and "Virtual machines should be attested for boot integrity health" recommendations can lead to enabling secure boot on Linux VMs to mitigate these sub-techniques. Because this recommendation is specific to Linux VM and is a recommendation, its score is capped at Partial.
        References
          azure_security_center_recommendations Azure Security Center Recommendations protectpartial T1542.003 Bootkit
          Comments
          This control's "Secure Boot should be enabled on your Linux virtual machine" and "Virtual machines should be attested for boot integrity health" recommendations can lead to enabling secure boot on Linux VMs to mitigate these sub-techniques. Because this recommendation is specific to Linux VM and is a recommendation, its score is capped at Partial.
          References
            azure_security_center_recommendations Azure Security Center Recommendations protectminimal T1499 Endpoint Denial of Service
            Comments
            This control provides recommendations for limiting the CPU and memory resources consumed by a container to minimize resource exhaustion attacks. Because this control only covers one sub-technique of this technique, its score is assessed as Minimal.
            References
            Showing 1 to 10 of 45 rows
            rows per page

            Capabilities

            Loading, please wait
            Capability ID
            Capability Name
            Number of Mappings
            azure_security_center_recommendations Azure Security Center Recommendations 45
            Showing 1 to 1 of 1 rows