Capability ID | Capability Description | Category | Value | ATT&CK ID | ATT&CK Name | Notes |
---|---|---|---|---|---|---|
network_security_groups | Network Security Groups | protect | partial | T1199 | Trusted Relationship |
Comments
This control can isolate portions of network that do not require network-wide access, limiting some attackers that leverage trusted relationships such as remote access for vendor maintenance. Coverage partial, Temporal Immediate.
References
|
network_security_groups | Network Security Groups | protect | partial | T1557 | Man-in-the-Middle |
Comments
This control can be used to limit access to network infrastructure and resources that can be used to reshape traffic or otherwise produce MiTM conditions.
References
|
network_security_groups | Network Security Groups | protect | partial | T1602 | Data from Configuration Repository |
Comments
This control can limit attackers access to configuration repositories such as SNMP management stations, or to dumps of client configurations from common management ports.
References
|
network_security_groups | Network Security Groups | protect | partial | T1602.002 | Network Device Configuration Dump |
Comments
Can limit access to client management interfaces or configuration databases
References
|
network_security_groups | Network Security Groups | protect | partial | T1602.001 | SNMP (MIB Dump) |
Comments
Can limit access to client management interfaces or configuration databases
References
|
network_security_groups | Network Security Groups | protect | minimal | T1542 | Pre-OS Boot |
Comments
Provides protection coverage for only one sub-technique partially (booting from remote devies ala TFTP boot) resulting in an overall score of Minimal.
References
|
network_security_groups | Network Security Groups | protect | partial | T1542.005 | TFTP Boot |
Comments
This control can be used to restrict clients to connecting (and therefore booting) from only trusted network resources.
References
|
network_security_groups | Network Security Groups | protect | significant | T1048 | Exfiltration Over Alternative Protocol |
Comments
NSG can minimize alternative protocols allowed to communicate externally.
References
|
network_security_groups | Network Security Groups | protect | significant | T1048.003 | Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol |
Comments
This control can reduce the protocols available for data exfiltration. Temporal immediate, coverage substantial.
References
|
network_security_groups | Network Security Groups | protect | significant | T1048.002 | Exfiltration Over Asymmetric Encrypted Non-C2 Protocol |
Comments
This control can reduce the protocols available for data exfiltration. Temporal immediate, coverage substantial.
References
|
network_security_groups | Network Security Groups | protect | significant | T1048.001 | Exfiltration Over Symmetric Encrypted Non-C2 Protocol |
Comments
This control can reduce the protocols available for data exfiltration. Temporal immediate, coverage substantial.
References
|
network_security_groups | Network Security Groups | protect | partial | T1210 | Exploitation of Remote Services |
Comments
This control can be used to restrict access to remote services to minimum necessary.
References
|
network_security_groups | Network Security Groups | protect | partial | T1021 | Remote Services |
Comments
This control provides partial protection for all of its sub-techniques and procedure examples resulting in an overall score of Partial.
References
|
network_security_groups | Network Security Groups | protect | partial | T1021.006 | Windows Remote Management |
Comments
This control can be used to restrict direct access to remote services to trusted networks. This mitigates even an adversary with a valid account from accessing resources. This can be circumvented though if an adversary is able to compromise a trusted host and move laterally to a protected network. This results in an overall partial (coverage) score.
References
|
network_security_groups | Network Security Groups | protect | partial | T1021.005 | VNC |
Comments
This control can be used to restrict direct access to remote services to trusted networks. This mitigates even an adversary with a valid account from accessing resources. This can be circumvented though if an adversary is able to compromise a trusted host and move laterally to a protected network. This results in an overall partial (coverage) score.
References
|
network_security_groups | Network Security Groups | protect | partial | T1021.004 | SSH |
Comments
This control can be used to restrict direct access to remote services to trusted networks. This mitigates even an adversary with a valid account from accessing resources. This can be circumvented though if an adversary is able to compromise a trusted host and move laterally to a protected network. This results in an overall partial (coverage) score.
References
|
network_security_groups | Network Security Groups | protect | partial | T1021.003 | Distributed Component Object Model |
Comments
This control can be used to restrict direct access to remote services to trusted networks. This mitigates even an adversary with a valid account from accessing resources. This can be circumvented though if an adversary is able to compromise a trusted host and move laterally to a protected network. This results in an overall partial (coverage) score.
References
|
network_security_groups | Network Security Groups | protect | partial | T1021.002 | SMB/Windows Admin Shares |
Comments
This control can be used to restrict direct access to remote services to trusted networks. This mitigates even an adversary with a valid account from accessing resources. This can be circumvented though if an adversary is able to compromise a trusted host and move laterally to a protected network. This results in an overall partial (coverage) score.
References
|
network_security_groups | Network Security Groups | protect | partial | T1021.001 | Remote Desktop Protocol |
Comments
This control can be used to restrict direct access to remote services to trusted networks. This mitigates even an adversary with a valid account from accessing resources. This can be circumvented though if an adversary is able to compromise a trusted host and move laterally to a protected network. This results in an overall partial (coverage) score.
References
|
network_security_groups | Network Security Groups | protect | partial | T1072 | Software Deployment Tools |
Comments
This control can be used to limit access to critical network systems such as software deployment tools.
References
|
network_security_groups | Network Security Groups | protect | partial | T1133 | External Remote Services |
Comments
This control can be used to restrict direct access to remote service gateways and concentrators that typically accompany external remote services. This can be circumvented though if an adversary is able to compromise a trusted host and use it to access the external remote service. This results in an overall partial (coverage) score.
References
|
network_security_groups | Network Security Groups | protect | partial | T1482 | Domain Trust Discovery |
Comments
This control can be used to isolate sensitive domains to limit discovery.
References
|
network_security_groups | Network Security Groups | protect | partial | T1046 | Network Service Scanning |
Comments
This control can be used to restrict access to trusted networks.
References
|
network_security_groups | Network Security Groups | protect | partial | T1095 | Non-Application Layer Protocol |
Comments
This control can be used to restrict access to trusted networks and protocols.
References
|
network_security_groups | Network Security Groups | protect | significant | T1571 | Non-Standard Port |
Comments
This control can restrict traffic to standard ports and protocols.
References
|
network_security_groups | Network Security Groups | protect | partial | T1499 | Endpoint Denial of Service |
Comments
This control provides partial protection for a majority of this control's sub-techinques and procedure examples resulting in overall score of Partial.
References
|
network_security_groups | Network Security Groups | protect | partial | T1499.003 | Application Exhaustion Flood |
Comments
This control can be used to restrict access to endpoints and thereby mitigate low-end DOS attacks.
References
|
network_security_groups | Network Security Groups | protect | partial | T1499.002 | Service Exhaustion Flood |
Comments
This control can be used to restrict access to endpoints and thereby mitigate low-end DOS attacks.
References
|
network_security_groups | Network Security Groups | protect | partial | T1499.001 | OS Exhaustion Flood |
Comments
This control can be used to restrict access to endpoints and thereby mitigate low-end DOS attacks.
References
|
network_security_groups | Network Security Groups | protect | partial | T1570 | Lateral Tool Transfer |
Comments
This control can be used to limit traffic between systems and enclaves to minimum necessary for example via a zero-trust strategy.
References
|
network_security_groups | Network Security Groups | protect | partial | T1498 | Network Denial of Service |
Comments
This control can be used to restrict access to endpoints and thereby mitigate low-end network DOS attacks.
References
|
network_security_groups | Network Security Groups | protect | partial | T1090 | Proxy |
Comments
This control can restrict ports and inter-system / inter-enclave connections as described by the Proxy related sub-techniques although it doesn't provide protection for domain-fronting. It furthermore provides partial protection of this technique's procedure examples resulting in an overall Partial score.
References
|
network_security_groups | Network Security Groups | protect | partial | T1090.003 | Multi-hop Proxy |
Comments
This control can restrict access between systems, enclaves, and workloads thereby mitigating these proxy related sub-techniques.
References
|
network_security_groups | Network Security Groups | protect | partial | T1090.002 | External Proxy |
Comments
This control can restrict access between systems, enclaves, and workloads thereby mitigating these proxy related sub-techniques.
References
|
network_security_groups | Network Security Groups | protect | partial | T1090.001 | Internal Proxy |
Comments
This control can restrict access between systems, enclaves, and workloads thereby mitigating these proxy related sub-techniques.
References
|
network_security_groups | Network Security Groups | protect | partial | T1219 | Remote Access Software |
Comments
This control can be used to restrict network communications to protect sensitive enclaves that may mitigate some of the procedure examples of this technique.
References
|
network_security_groups | Network Security Groups | protect | partial | T1205 | Traffic Signaling |
Comments
This control provides partial protection for this technique's sub-techniques and procedure examples resulting in an overall Partial score. Other variations that trigger a special response, such as executing a malicous task are not mitigated by this control.
References
|
network_security_groups | Network Security Groups | protect | significant | T1205.001 | Port Knocking |
Comments
This control can be used to implement whitelist based network rules that can mitigate variations of this sub-techniques that result in opening closed ports for communication. Because this control is able to drop traffic before reaching a compromised host, it can effectively mitigate this port knocking sub-technique.
References
|