Capability ID | Capability Description | Category | Value | ATT&CK ID | ATT&CK Name | Notes |
---|---|---|---|---|---|---|
beyondcorp_enterprise | BeyondCorp Enterprise | protect | significant | T1048 | Exfiltration Over Alternative Protocol |
Comments
This control can help mitigate adversaries that may try to steal data over network protocols. Data loss prevention can detect and block sensitive data being uploaded via web browsers. In Beyond Corp Enterprise, Data Loss Prevention (DLP) features to use with Chrome to implement sensitive data detection for files that are uploaded and downloaded, and for content that is pasted or dragged and dropped. An example includes a rule setting that is used to block files from being uploaded via Chrome browser.
References
|
beyondcorp_enterprise | BeyondCorp Enterprise | protect | significant | T1567 | Exfiltration Over Web Service |
Comments
This control can help mitigate adversaries that may try to steal data over web services. A threat actor gaining access to a corporate network can plant code to perform reconnaissance, discover privileged users’ credentials, and adversaries can use an existing, legitimate external Web service to exfiltrate data rather than their primary command and control channel. This can cause exfiltration to a command-and-control server out on the internet. Data loss prevention can be used to detect and block sensitive data being uploaded to web services via web browsers.
References
|
beyondcorp_enterprise | BeyondCorp Enterprise | protect | significant | T1567.002 | Exfiltration to Cloud Storage |
Comments
This control can help mitigate adversaries that may try to steal data over web services. A threat actor gaining access to a corporate network can plant code to perform reconnaissance, discover privileged users’ credentials, and adversaries can use an existing, legitimate external Web service to exfiltrate data rather than their primary command and control channel. This can cause exfiltration to a command-and-control server out on the internet. Data loss prevention can be used to detect and block sensitive data being uploaded to web services via web browsers.
References
|
beyondcorp_enterprise | BeyondCorp Enterprise | protect | partial | T1133 | External Remote Services |
Comments
Implementing BeyondCorp Enterprise enacts a zero trust model. No one can access your resources unless they meet all the rules and conditions. Instead of securing your resources at the network-level, access controls are instead applied to individual devices and users.
References
|
beyondcorp_enterprise | BeyondCorp Enterprise | protect | partial | T1189 | Drive-by Compromise |
Comments
To enable additional protections against data loss and malware in Chrome, you need to enable Chrome Enterprise connectors so content gathered in Chrome is uploaded to Google Cloud for analysis. The Chrome Enterprise connectors must be enabled for DLP rules to integrate with Chrome.
References
|
beyondcorp_enterprise | BeyondCorp Enterprise | detect | minimal | T1566.001 | Spearphishing Attachment |
Comments
This control can help detect malicious links sent via phishing. The details include a list of samples of message delivery events. Each item in the list includes the date, message ID, subject hash, message body hash, username of the recipient, attachment hashes, and your primary domain name. This can be used to block senders.
References
|
beyondcorp_enterprise | BeyondCorp Enterprise | protect | significant | T1566 | Phishing |
Comments
This control can help detect malicious links sent via phishing. The details include a list of samples of message delivery events. Each item in the list includes the date, message ID, subject hash, message body hash, username of the recipient, attachment hashes, and your primary domain name. As a result, this can be used to block senders.
References
|
beyondcorp_enterprise | BeyondCorp Enterprise | detect | significant | T1566 | Phishing |
Comments
This control can help detect malicious links sent via phishing. The details include a list of samples of message delivery events. Each item in the list includes the date, message ID, subject hash, message body hash, username of the recipient, attachment hashes, and your primary domain name.
References
|
beyondcorp_enterprise | BeyondCorp Enterprise | detect | significant | T1071.001 | Web Protocols |
Comments
Google chrome policies can be setup through the Google Admin console, which can ensure checks for sensitive data or help protect Chrome users from content that may contain malware. This also enables certain files to be sent for analysis, and in return the admin can then choose to allow or block uploads and downloads for those scanned and unscanned files. By specifying a list of URL patterns, these policies can determine which pages identified through Chrome violates a rule, and end users are prevented from accessing the page.
References
|
beyondcorp_enterprise | BeyondCorp Enterprise | protect | significant | T1530 | Data from Cloud Storage Object |
Comments
Access Context Manager allows Google Cloud organization administrators to define fine-grained, attribute based access control for projects and resources. Access levels applied on resources with IAM Conditions enforce fine-grained access control based on a variety of attributes, including IP subnetworks. Adversaries may obtain leaked credentials; however, this control can block specific adversaries from gaining access permission controls by admins granting an access level based on the IP address of the originating request.
References
|
Capability ID | Capability Name | Number of Mappings |
---|---|---|
beyondcorp_enterprise | BeyondCorp Enterprise | 10 |