GCP mandiant_asm Mappings

Mandiant Attack Surface Management (ASM) offers the adversary's view of an organization's attack surface through asset discovery, technology and service identification, and analysis of exploitable exposures.

Mappings

Capability ID Capability Description Category Value ATT&CK ID ATT&CK Name Notes
mandiant_asm Mandiant Attack Surface Management (ASM) detect significant T1021 Remote Services
Comments
Mandiant Attack Surface Management continuously discovers and assesses an organization's assets for vulnerabilities, misconfigurations, and exposures. This control can discover vulnerable Remote Services offered on the cloud or on hosted servers. Since this monitoring is continual and is derived from Mandiant cyber threat intelligence, this control is scored as significant.
References
mandiant_asm Mandiant Attack Surface Management (ASM) detect significant T1133 External Remote Services
Comments
Mandiant Attack Surface Management continuously discovers and assesses an organization's assets for vulnerabilities, misconfigurations, and exposures. This control can discover vulnerable Remote Services offered on the cloud or on hosted servers. Since this monitoring is continual and is derived from Mandiant cyber threat intelligence, this control is scored as significant.
References
mandiant_asm Mandiant Attack Surface Management (ASM) detect partial T1190 Exploit Public-Facing Application
Comments
Mandiant Attack Surface Management continuously discovers and assesses an organization's assets for vulnerabilities, misconfigurations, and exposures. This control can discover vulnerable Remote Services offered on the cloud or on hosted servers. Since this monitoring is continual and is derived from Mandiant cyber threat intelligence, this control is scored as significant.
References
mandiant_asm Mandiant Attack Surface Management (ASM) detect significant T1580 Cloud Infrastructure Discovery
Comments
Mandiant Attack Surface Management continuously discovers and assesses an organization's assets for vulnerabilities, misconfigurations, and exposures. This control can discover vulnerable Remote Services offered on the cloud or on hosted servers. Since this monitoring is continual and is derived from Mandiant cyber threat intelligence, this control is scored as significant.
References