GCP vpc_service_controls Mappings

VPC Service Controls define a security perimeter around Google Cloud resources to constrain data within a VPC and mitigate data exfiltration risks. VPC Service Controls can be used to define security policies that create perimeters for specific resources and data of services, prevent access to Google-managed services outside of a trusted perimeter, and block access to data from untrusted locations.

Mappings

Capability ID Capability Description Category Value ATT&CK ID ATT&CK Name Notes
vpc_service_controls VPC Service Controls protect significant T1018 Remote System Discovery
Comments
VPC security perimeters can segment private resources to deny traffic based on organizational policy.
References
vpc_service_controls VPC Service Controls detect minimal T1021.004 SSH
Comments
This control can be used to detect adversaries that may try to use Valid Accounts to log into remote machines using Secure Shell (SSH).
References
vpc_service_controls VPC Service Controls protect significant T1046 Network Service Discovery
Comments
VPC security perimeters can limit the impact from active scanning and lateral movement techniques used to exploit the target environment.
References
vpc_service_controls VPC Service Controls protect significant T1078 Valid Accounts
Comments
This control is able to mitigate against abuse of compromised valid accounts by restricting access from those accounts to resources contained within the VPC perimeter the account belongs to. Resources and services contained in other VPC networks also cannot be accessed by user accounts that are not within the VPC network perimeter.
References
vpc_service_controls VPC Service Controls protect significant T1098 Account Manipulation
Comments
VPC further segments the environment by providing configurable granular access controls which help limit user communications to critical systems.
References
vpc_service_controls VPC Service Controls protect partial T1098.001 Additional Cloud Credentials
Comments
VPC further segments the environment by providing configurable granular access controls which help limit user permissions to communicate with critical systems.
References
vpc_service_controls VPC Service Controls protect significant T1135 Network Share Discovery
Comments
VPC security perimeters can limit the impact from active scanning and lateral movement techniques used to exploit the target environment.
References
vpc_service_controls VPC Service Controls protect significant T1190 Exploit Public-Facing Application
Comments
VPC security perimeters can segment private resources to further reduce user access and operate in a logically separate hosting environment.
References
vpc_service_controls VPC Service Controls protect significant T1530 Data from Cloud Storage
Comments
This control may mitigate against access to cloud storage objects by limiting access to accounts and services contained within the VPC network perimeter that contains those cloud storage objects.
References
vpc_service_controls VPC Service Controls protect significant T1537 Transfer Data to Cloud Account
Comments
This control may mitigate against exfiltration attempts to external cloud accounts by limiting egress of data from accounts and services contained within the VPC network perimeter.
References
vpc_service_controls VPC Service Controls protect significant T1552.007 Container API
Comments
VPC security perimeters can segment private resources to provide access based on user identity or organizational ingress/egress policies (e.g., instance, subnet).
References
vpc_service_controls VPC Service Controls protect partial T1557 Adversary-in-the-Middle
Comments
VPC security perimeter mitigates the impact from Adversary-in-the-Middle by creating virtual segmentation that limits the data and information broadcast on the network.
References
vpc_service_controls VPC Service Controls protect partial T1567 Exfiltration Over Web Service
Comments
This control is able to mitigate against exfiltration of data over a web service. Data contained within a VPC network perimeter can not be moved to a Google cloud resource or service outside of the perimeter but may be moved to third party services or storage.
References
vpc_service_controls VPC Service Controls protect minimal T1570 Lateral Tool Transfer
Comments
VPC security perimeters can segment private resources to deny ingress and egress traffic based on organizational policies. Because this tool does not prevent attacks from valid accounts or compromised machines, it was scored as minimal.
References
vpc_service_controls VPC Service Controls protect significant T1590 Gather Victim Network Information
Comments
VPC security perimeters can limit the impact from active scanning techniques used to gain further information about the target environment.
References
vpc_service_controls VPC Service Controls protect significant T1590.004 Network Topology
Comments
VPC security perimeters can limit the impact from active scanning techniques used to gain further information about the target environment.
References
vpc_service_controls VPC Service Controls protect significant T1590.005 IP Addresses
Comments
VPC security perimeters can limit the impact from active scanning techniques used to gain further information about the target environment.
References
vpc_service_controls VPC Service Controls protect significant T1595 Active Scanning
Comments
VPC security perimeters can limit the impact from active scanning and lateral movement techniques used to exploit the target environment.
References
vpc_service_controls VPC Service Controls protect significant T1595.001 Scanning IP Blocks
Comments
VPC security perimeters can limit the impact from active scanning on private networks and lateral movement techniques used to exploit target environments.
References
vpc_service_controls VPC Service Controls protect significant T1602 Data from Configuration Repository
Comments
VPC security perimeters can isolate resources and limit the impact from lateral movement techniques used to access sensitive data.
References
vpc_service_controls VPC Service Controls protect partial T1619 Cloud Storage Object Discovery
Comments
This control may mitigate against discovery of cloud storage objects. This control is not able to protect metadata, such as cloud storage bucket names but can protect against discovery of the contents of a storage bucket.
References