Cloud Armor protects applications by providing Layer 7 filtering and by scrubbing incoming requests for common web attacks or other Layer 7 attributes to potentially block traffic before it reaches load balanced backend services or backend buckets.
Capability ID | Capability Description | Category | Value | ATT&CK ID | ATT&CK Name | Notes |
---|---|---|---|---|---|---|
cloud_armor | Cloud Armor | protect | partial | T1046 | Network Service Discovery |
Comments
Cloud Armor filters external network traffic and therefore can be effective for preventing external network service scanning. Network service scanning originating from inside the trusted network is not mitigated.
References
|
cloud_armor | Cloud Armor | protect | partial | T1090 | Proxy |
Comments
Traffic to known anonymity networks and C2 infrastructure can be blocked through the use of Cloud Armor network allow and block lists. However this can be circumvented by other techniques.
References
|
cloud_armor | Cloud Armor | protect | significant | T1190 | Exploit Public-Facing Application |
Comments
Google Cloud Armor security policies protect your application by providing Layer 7 filtering and by scrubbing incoming requests for common web attacks or other Layer 7 attributes. Google Cloud Armor detects malicious requests and drops them at the edge of Google's infrastructure.
References
|
cloud_armor | Cloud Armor | protect | significant | T1498 | Network Denial of Service |
Comments
Google Cloud Armor provides always-on DDoS protection against network or protocol-based volumetric DDoS attacks. It allows users to allow/deny traffic at the Google Cloud edge, closest to the source of traffic. This prevents unwelcome traffic from consuming resources.
References
|
cloud_armor | Cloud Armor | protect | significant | T1499 | Endpoint Denial of Service |
Comments
Google Cloud Armor provides always-on DDoS protection against network or protocol-based volumetric DDoS attacks. It allows users to allow/deny traffic at the Google Cloud edge, closest to the source of traffic. This prevents unwelcome traffic from consuming resources.
References
|