Capability ID | Capability Description | Category | Value | ATT&CK ID | ATT&CK Name | Notes |
---|---|---|---|---|---|---|
cloud_armor | Cloud Armor | protect | partial | T1090 | Proxy |
Comments
Traffic to known anonymity networks and C2 infrastructure can be blocked through the use of network allow and block lists. However this can be circumvented by other techniques.
References
|
cloud_armor | Cloud Armor | protect | significant | T1190 | Exploit Public-Facing Application |
Comments
Google Cloud Armor security policies protect your application by providing Layer 7 filtering and by scrubbing incoming requests for common web attacks or other Layer 7 attributes. Google Cloud Armor detects malicious requests and drops them at the edge of Google's infrastructure.
References
|
cloud_armor | Cloud Armor | protect | significant | T1498 | Network Denial of Service |
Comments
Google Cloud Armor provides always-on DDoS protection against network or protocol-based volumetric DDoS attacks. It allows users to allow/deny traffic at the Google Cloud edge, closest to the source of traffic. This prevents unwelcome traffic from consuming resources.
References
|
cloud_armor | Cloud Armor | protect | significant | T1499 | Endpoint Denial of Service |
Comments
Google Cloud Armor provides always-on DDoS protection against network or protocol-based volumetric DDoS attacks. It allows users to allow/deny traffic at the Google Cloud edge, closest to the source of traffic. This prevents unwelcome traffic from consuming resources.
References
|
cloud_armor | Cloud Armor | protect | partial | T1018 | Remote System Discovery |
Comments
This control typically filters external network traffic and therefore can be effective for preventing external remote system discovery. Activity originating from inside the trusted network is not mitigated.
References
|
cloud_armor | Cloud Armor | protect | partial | T1046 | Network Service Scanning |
Comments
This control typically filters external network traffic and therefore can be effective for preventing external network service scanning. Network service scanning originating from inside the trusted network is not mitigated.
References
|
Capability ID | Capability Name | Number of Mappings |
---|---|---|
cloud_armor | Cloud Armor | 6 |