Capability ID | Capability Description | Category | Value | ATT&CK ID | ATT&CK Name | Notes |
---|---|---|---|---|---|---|
policy_intelligence | Policy Intelligence | protect | partial | T1087.004 | Cloud Account |
Comments
This control can be used to limit permissions to discover cloud accounts in accordance with least privilege principles and thereby limits the accounts that can be used for account discovery.
References
|
policy_intelligence | Policy Intelligence | protect | minimal | T1580 | Cloud Infrastructure Discovery |
Comments
IAM Recommender helps admins remove unwanted access to GCP resources by using machine learning to make smart access control recommendations. With Recommender, security teams can automatically detect overly permissive access and rightsize them based on similar users in the organization and their access patterns. This control may mitigate adversaries that try to enumerate users access keys through VM or snapshots.
References
|
policy_intelligence | Policy Intelligence | protect | partial | T1530 | Data from Cloud Storage Object |
Comments
Recommender generates policy insights by comparing the permissions that each principal used during the past 90 days with the total permissions the principal has. This can be used to limit the permissions associated with creating and modifying platform images or containers that adversaries may try to access.
References
|
policy_intelligence | Policy Intelligence | detect | minimal | T1530 | Data from Cloud Storage Object |
Comments
Adversaries may attempt to implant cloud or container images with malicious code to gain access to an environment. The IAM audit logs can be used to receive data access and activity logs who has accessed to certain resources.
References
|
policy_intelligence | Policy Intelligence | protect | partial | T1538 | Cloud Service Dashboard |
Comments
This control may limit the number of users that have privileges to discover cloud infrastructure and may limit the discovery value of the dashboard in the event of a compromised account.
References
|
policy_intelligence | Policy Intelligence | protect | partial | T1578 | Modify Cloud Compute Infrastructure |
Comments
IAM Recommender helps admins remove unwanted access to GCP resources by using machine learning to make smart access control recommendations. With Recommender, security teams can automatically detect overly permissive access and rightsize them based on similar users in the organization and their access patterns. This control may mitigate adversaries that try to gain access to permissions from modifying infrastructure components.
References
|
policy_intelligence | Policy Intelligence | protect | partial | T1548.002 | Bypass User Account Control |
Comments
Adversaries may bypass UAC mechanisms to elevate process privileges. This control can be used to help enforce least privilege principals to ensure that permission levels are properly managed. Along with this, Policy Analyzer lets users know what principals have access to resources based on its corresponding IAM allow policies.
References
|
policy_intelligence | Policy Intelligence | protect | partial | T1068 | Exploitation for Privilege Escalation |
Comments
IAM Recommender helps admins remove unwanted access to GCP resources by using machine learning to make smart access control recommendations. With Recommender, security teams can automatically detect overly permissive access and rightsize them based on similar users in the organization and their access patterns. This control may mitigate adversaries that try to perform privilege escalation via permission levels and software exploitation.
References
|
policy_intelligence | Policy Intelligence | protect | partial | T1562 | Impair Defenses |
Comments
Adversaries that try to disable cloud logging capabilities have the advantage to limit the amount of the data that can be collected and can possibly control not being detected. This control may be used to ensure that permissions are in place to prevent adversaries from disabling or interfering with security/logging services.
References
|
policy_intelligence | Policy Intelligence | protect | partial | T1078.004 | Cloud Accounts |
Comments
Adversaries may obtain and abuse credentials of a cloud account by gaining access through means of Initial Access, Persistence, Privilege Escalation, or Defense Evasion. IAM Recommender helps enforce least privilege principals to ensure that permission levels are properly managed.
References
|
policy_intelligence | Policy Intelligence | detect | minimal | T1078.004 | Cloud Accounts |
|
policy_intelligence | Policy Intelligence | detect | minimal | T1562.008 | Disable Cloud Logs |
Comments
Adversaries that try to disable cloud logging capabilities have the advantage to limit the amount of the data that can be collected and can possibly control not being detected. This control may be used to routinely check role account permissions in IAM audit logs.
References
|
policy_intelligence | Policy Intelligence | protect | partial | T1212 | Exploitation for Credential Access |
Comments
IAM Recommender helps admins remove unwanted access to GCP resources by using machine learning to make smart access control recommendations. With Recommender, security teams can automatically detect overly permissive access and rightsize them based on similar users in the organization and their access patterns. This control may mitigate adversaries that try to perform privilege escalation via permission levels and software exploitation.
References
|
policy_intelligence | Policy Intelligence | protect | partial | T1078 | Valid Accounts |
Comments
Adversaries may obtain and abuse credentials of a cloud account by gaining access through means of Initial Access, Persistence, Privilege Escalation, or Defense Evasion. IAM Recommender helps enforce least privilege principals to ensure that permission levels are properly managed.
References
|
policy_intelligence | Policy Intelligence | protect | partial | T1087 | Account Discovery |
Comments
This control can be used to limit permissions to discover user accounts in accordance with least privilege principles and thereby limits the accounts that can be used for account discovery.
References
|
policy_intelligence | Policy Intelligence | protect | partial | T1098.001 | Additional Cloud Credentials |
Comments
Utilization and enforcement of MFA for user accounts to ensure that IAM policies are implemented properly shall mitigate adversaries so that they may not gain access to user accounts. Enforce the principle of least privilege by ensuring that principals have only the permissions that they actually need.
References
|
policy_intelligence | Policy Intelligence | protect | partial | T1098 | Account Manipulation |
Comments
Utilization and enforcement of MFA for user accounts to ensure that IAM policies are implemented properly shall mitigate adversaries so that they may not gain access to user accounts. Enforce the principle of least privilege by ensuring that principals have only the permissions that they actually need.
References
|
policy_intelligence | Policy Intelligence | protect | partial | T1222 | File and Directory Permissions Modification |
Comments
Adversaries may modify file or directory permissions/attributes to evade access control lists (ACLs) and access protected files. Enforcing the principle of least privilege through IAM Recommender role recommendations help admins identify and remove excess permissions from users' principals, improving their resources' security configurations.
References
|
Capability ID | Capability Name | Number of Mappings |
---|---|---|
policy_intelligence | Policy Intelligence | 18 |