GKE Enterprise incorporates the Anthos Config Management feature to enable platform operators to automatically deploy shared environment configurations and enforce approved security policies across Kubernetes clusters on-premises, on Google Kubernetes Engine (GKE), and in other public cloud platforms. The integrated interface allows platform admins to configure services using a unified cloud operating model.
Capability ID | Capability Description | Category | Value | ATT&CK ID | ATT&CK Name | Notes |
---|---|---|---|---|---|---|
gke_enterprise | GKE Enterprise | protect | partial | T1078 | Valid Accounts |
Comments
GKE Enterprise incorporates the Anthos Config Management feature to create and manage Kubernetes objects across multiple clusters at once. PodSecurityPolicies can be enforced to prevent Pods from using the root Linux user. Based on the medium detection coverage, this was scored as partial.
References
|
gke_enterprise | GKE Enterprise | protect | partial | T1078.001 | Default Accounts |
Comments
GKE Enterprise incorporates the Anthos Config Management feature to create and manage Kubernetes objects across multiple clusters at once. PodSecurityPolicies can be enforced to prevent Pods from using the root Linux user. Based on the medium detection coverage, this sub-technique was scored as partial.
References
|
gke_enterprise | GKE Enterprise | protect | partial | T1078.004 | Cloud Accounts |
Comments
GKE Enterprise incorporates the Anthos Config Management feature to create and manage Kubernetes objects across multiple clusters at once. PodSecurityPolicies can be enforced to prevent Pods from using the root Linux user. Based on the medium detection coverage, this sub-technique was scored as partial.
References
|
gke_enterprise | GKE Enterprise | protect | partial | T1525 | Implant Internal Image |
Comments
GKE Enterprise incorporates the Anthos Config Management feature to prevent configuration drift with continuous monitoring of your cluster state, using the declarative model to apply policies that enforce compliance. This control can periodically check the integrity of images and containers used in cloud deployments to ensure that adversaries cannot implant malicious code to gain access to an environment.
References
|
gke_enterprise | GKE Enterprise | protect | partial | T1552.007 | Container API |
Comments
Adversaries may gather credentials via APIs within a containers environment. APIs in these environments, such as the Docker API and Kubernetes APIs. GKE Enterprise incorporates the Anthos Config Management feature to manage configuration for any Kubernetes API, including policies for the Istio service mesh, resource quotas, and access control policies.
References
|
gke_enterprise | GKE Enterprise | protect | partial | T1609 | Container Administration Command |
Comments
GKE Enterprise incorporates the Anthos Config Management feature to create and manage Kubernetes objects across multiple clusters at once. PodSecurityPolicies can be enforced to prevent Pods from using the root Linux user and prevents pods from running privileged containers. In hindsight this can ensure containers are not running as root by default.
References
|
gke_enterprise | GKE Enterprise | protect | partial | T1610 | Deploy Container |
Comments
GKE Enterprise incorporates the Anthos Config Management Policy Controller feature to enforce fully programmable policies on your clusters. You can use these policies to shift security left and guard against violations during development and test time, as well as runtime violations. This control can be used to block adversaries that try to deploy new containers with malware or configurations policies that are not in compliance with security policies already defined.
References
|
gke_enterprise | GKE Enterprise | protect | partial | T1611 | Escape to Host |
Comments
GKE Enterprise incorporates the Anthos Config Management feature to create and manage Kubernetes objects across multiple clusters at once. PodSecurityPolicies can be enforced to prevent Pods from using the root Linux user and prevents pods from running privileged containers. This control can be used to limit container access to host process namespaces, the host network, and the host file system, which may enable adversaries to break out of containers and gain access to the underlying host.
References
|
gke_enterprise | GKE Enterprise | protect | significant | T1613 | Container and Resource Discovery |
Comments
Adversaries may attempt to discover containers and other resources that are available within a containers environment. GKE Enterprise incorporates the Anthos Config Management "Network Policies" rule to control the network traffic inside clusters, denying direct remote access to internal systems through the use of network proxies, gateways, and firewalls
References
|