GCP Cloud Armor Capability Group

All Mappings

Capability ID Capability Description Category Value ATT&CK ID ATT&CK Name Notes
cloud_armor Cloud Armor protect partial T1090 Proxy
Comments
Traffic to known anonymity networks and C2 infrastructure can be blocked through the use of network allow and block lists. However this can be circumvented by other techniques.
References
cloud_armor Cloud Armor protect significant T1190 Exploit Public-Facing Application
Comments
Google Cloud Armor security policies protect your application by providing Layer 7 filtering and by scrubbing incoming requests for common web attacks or other Layer 7 attributes. Google Cloud Armor detects malicious requests and drops them at the edge of Google's infrastructure.
References
cloud_armor Cloud Armor protect significant T1498 Network Denial of Service
Comments
Google Cloud Armor provides always-on DDoS protection against network or protocol-based volumetric DDoS attacks. It allows users to allow/deny traffic at the Google Cloud edge, closest to the source of traffic. This prevents unwelcome traffic from consuming resources.
References
cloud_armor Cloud Armor protect significant T1499 Endpoint Denial of Service
Comments
Google Cloud Armor provides always-on DDoS protection against network or protocol-based volumetric DDoS attacks. It allows users to allow/deny traffic at the Google Cloud edge, closest to the source of traffic. This prevents unwelcome traffic from consuming resources.
References
cloud_armor Cloud Armor protect partial T1018 Remote System Discovery
Comments
This control typically filters external network traffic and therefore can be effective for preventing external remote system discovery. Activity originating from inside the trusted network is not mitigated.
References
cloud_armor Cloud Armor protect partial T1046 Network Service Scanning
Comments
This control typically filters external network traffic and therefore can be effective for preventing external network service scanning. Network service scanning originating from inside the trusted network is not mitigated.
References

Capabilities

Capability ID Capability Name Number of Mappings
cloud_armor Cloud Armor 6