Capability ID | Capability Description | Category | Value | ATT&CK ID | ATT&CK Name | Notes |
---|---|---|---|---|---|---|
identity_aware_proxy | Identity Aware Proxy | protect | minimal | T1550.001 | Application Access Token |
Comments
This control may mitigate or prevent stolen application access tokens from occurring.
References
|
identity_aware_proxy | Identity Aware Proxy | protect | minimal | T1528 | Steal Application Access Token |
Comments
This control may mitigate application access token theft if the application is configured to retrieve temporary security credentials using an IAM role.
References
|
identity_aware_proxy | Identity Aware Proxy | detect | partial | T1528 | Steal Application Access Token |
Comments
Control can detect potentially malicious applications
References
|
identity_aware_proxy | Identity Aware Proxy | detect | minimal | T1098.001 | Additional Cloud Credentials |
Comments
Adversaries may add adversary-controlled credentials to a cloud account to maintain persistent access to victim accounts and instances within the environment. IAP lets you enforce access control policies for applications and resources. This control may help mitigate against adversaries gaining access through cloud account by the configuration of access controls and firewalls, allowing limited access to systems.
References
|
identity_aware_proxy | Identity Aware Proxy | protect | partial | T1078 | Valid Accounts |
Comments
IAP applies the relevant IAM policy to check if the user is authorized to access the requested resource. If the user has the IAP-secured Web App User role on the Cloud console project where the resource exists, they're authorized to access the application. This control can mitigate against adversaries that try to obtain credentials of accounts, including cloud accounts.
References
|
identity_aware_proxy | Identity Aware Proxy | protect | partial | T1078.004 | Cloud Accounts |
Comments
Protects access to applications hosted within cloud and other premises.
References
|
identity_aware_proxy | Identity Aware Proxy | protect | partial | T1190 | Exploit Public-Facing Application |
Comments
When an application or resource is protected by IAP, it can only be accessed through the proxy by principals, also known as users, who have the correct Identity and Access Management (IAM) role. IAP secures authentication and authorization of all requests to App Engine, Cloud Load Balancing (HTTPS), or internal HTTP load balancing.
With adversaries that may try to attempt malicious activity via applications, the application Firewalls may be used to limit exposure of applications to prevent exploit traffic from reaching the application.
References
|