GCP Google Kubernetes Engine Capability Group

All Mappings

Capability ID Capability Description Category Value ATT&CK ID ATT&CK Name Notes
google_kubernetes_engine Google Kubernetes Engine protect partial T1613 Container and Resource Discovery
Comments
By default, GKE nodes use Google's Container-Optimized OS to enhance the security of GKE clusters, including: Locked down firewall, read-only filesystem, limited user accounts, and disabled root login.
References
google_kubernetes_engine Google Kubernetes Engine protect partial T1611 Escape to Host
Comments
By default, GKE nodes use Google's Container-Optimized OS to enhance the security of GKE clusters, including: Read-only filesystem, limited user accounts, and disabled root login.
References
google_kubernetes_engine Google Kubernetes Engine detect partial T1611 Escape to Host
Comments
GKE provides the ability to audit against a Center for Internet Security (CIS) Benchmark which is a set of recommendations for configuring Kubernetes to support a strong security posture. The Benchmark is tied to a specific Kubernetes release.
References
google_kubernetes_engine Google Kubernetes Engine protect partial T1610 Deploy Container
Comments
Kubernetes role-based access control (RBAC), uses granular permissions to control access to resources within projects and objects within Kubernetes clusters.
References
google_kubernetes_engine Google Kubernetes Engine protect partial T1053.007 Container Orchestration Job
Comments
GKE provides the ability to audit against a set of recommended benchmark [Center for Internet Security (CIS)]. This control may avoid privileged containers and running containers as root.
References
google_kubernetes_engine Google Kubernetes Engine protect partial T1609 Container Administration Command
Comments
This control may provide provide information about vulnerabilities within container images, such as the risk from remote management of a deployed container. With the right permissions, an adversary could escalate to remote code execution in the Kubernetes cluster.
References
google_kubernetes_engine Google Kubernetes Engine detect partial T1525 Implant Internal Image
Comments
After scanning for vulnerabilities, this control may alert personnel of tampered container images that could be running in a Kubernetes cluster.
References

Capabilities

Capability ID Capability Name Number of Mappings
google_kubernetes_engine Google Kubernetes Engine 7