GCP Identity Aware Proxy Capability Group

All Mappings

Capability ID Capability Description Category Value ATT&CK ID ATT&CK Name Notes
identity_aware_proxy Identity Aware Proxy protect minimal T1550.001 Application Access Token
Comments
This control may mitigate or prevent stolen application access tokens from occurring.
References
identity_aware_proxy Identity Aware Proxy protect minimal T1528 Steal Application Access Token
Comments
This control may mitigate application access token theft if the application is configured to retrieve temporary security credentials using an IAM role.
References
identity_aware_proxy Identity Aware Proxy detect partial T1528 Steal Application Access Token
Comments
Control can detect potentially malicious applications
References
identity_aware_proxy Identity Aware Proxy detect minimal T1098.001 Additional Cloud Credentials
Comments
Adversaries may add adversary-controlled credentials to a cloud account to maintain persistent access to victim accounts and instances within the environment. IAP lets you enforce access control policies for applications and resources. This control may help mitigate against adversaries gaining access through cloud account by the configuration of access controls and firewalls, allowing limited access to systems.
References
identity_aware_proxy Identity Aware Proxy protect partial T1078 Valid Accounts
Comments
IAP applies the relevant IAM policy to check if the user is authorized to access the requested resource. If the user has the IAP-secured Web App User role on the Cloud console project where the resource exists, they're authorized to access the application. This control can mitigate against adversaries that try to obtain credentials of accounts, including cloud accounts.
References
identity_aware_proxy Identity Aware Proxy protect partial T1078.004 Cloud Accounts
Comments
Protects access to applications hosted within cloud and other premises.
References
identity_aware_proxy Identity Aware Proxy protect partial T1190 Exploit Public-Facing Application
Comments
When an application or resource is protected by IAP, it can only be accessed through the proxy by principals, also known as users, who have the correct Identity and Access Management (IAM) role. IAP secures authentication and authorization of all requests to App Engine, Cloud Load Balancing (HTTPS), or internal HTTP load balancing. With adversaries that may try to attempt malicious activity via applications, the application Firewalls may be used to limit exposure of applications to prevent exploit traffic from reaching the application.
References

Capabilities

Capability ID Capability Name Number of Mappings
identity_aware_proxy Identity Aware Proxy 7