This repository has been archived by the owner on Apr 3, 2024. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 62
/
Copy pathIdentityAwareProxy.json
254 lines (254 loc) · 8.37 KB
/
IdentityAwareProxy.json
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
{
"name": "Identity Aware Proxy",
"versions": {
"attack": "10",
"navigator": "4.2",
"layer": "4.2"
},
"domain": "enterprise-attack",
"description": "Identity Aware Proxy (IAP) includes a number of features that can be used to protect access to Google Cloud hosted resources and applications hosted on Google. IAP lets you establish a central authorization layer for applications accessed by HTTPS, so you can use an application-level access control model instead of relying on network-level firewalls.",
"filters": {
"platforms": [
"Linux",
"macOS",
"Windows",
"Office 365",
"Azure AD",
"AWS",
"GCP",
"Azure",
"SaaS",
"PRE",
"Network"
]
},
"sorting": 0,
"layout": {
"layout": "side",
"showID": false,
"showName": true,
"showAggregateScores": false,
"countUnscored": false,
"aggregateFunction": "average"
},
"hideDisabled": false,
"techniques": [
{
"techniqueID": "T1550.001",
"enabled": true,
"showSubtechniques": false,
"metadata": [
{
"name": "category",
"value": "Protect"
},
{
"name": "value",
"value": "Minimal"
},
{
"name": "comment",
"value": "This control may mitigate or prevent stolen application access tokens from occurring. "
}
],
"color": "#9CBA7F",
"score_num": 10,
"score_display": "Minimal",
"category": "Protect"
},
{
"techniqueID": "T1528",
"enabled": true,
"showSubtechniques": false,
"metadata": [
{
"name": "category",
"value": "Protect"
},
{
"name": "value",
"value": "Minimal"
},
{
"name": "comment",
"value": "This control may mitigate application access token theft if the application is configured to retrieve temporary security credentials using an IAM role."
},
{
"divider": true
},
{
"name": "category",
"value": "Detect"
},
{
"name": "value",
"value": "Partial"
},
{
"name": "comment",
"value": "Control can detect potentially malicious applications"
}
],
"color": "#9305ff",
"score_num": 50,
"score_display": "Partial",
"category": "Mixed"
},
{
"techniqueID": "T1098.001",
"enabled": true,
"showSubtechniques": false,
"metadata": [
{
"name": "category",
"value": "Detect"
},
{
"name": "value",
"value": "Minimal"
},
{
"name": "comment",
"value": "Adversaries may add adversary-controlled credentials to a cloud account to maintain persistent access to victim accounts and instances within the environment. IAP lets you enforce access control policies for applications and resources. This control may help mitigate against adversaries gaining access through cloud account by the configuration of access controls and firewalls, allowing limited access to systems."
}
],
"color": "#AEEEEE",
"score_num": 10,
"score_display": "Minimal",
"category": "Detect"
},
{
"techniqueID": "T1078",
"enabled": true,
"showSubtechniques": false,
"metadata": [
{
"name": "category",
"value": "Protect"
},
{
"name": "value",
"value": "Partial"
},
{
"name": "comment",
"value": "IAP applies the relevant IAM policy to check if the user is authorized to access the requested resource. If the user has the IAP-secured Web App User role on the Cloud console project where the resource exists, they're authorized to access the application. This control can mitigate against adversaries that try to obtain credentials of accounts, including cloud accounts."
}
],
"color": "#659D32",
"score_num": 50,
"score_display": "Partial",
"category": "Protect"
},
{
"techniqueID": "T1078.004",
"enabled": true,
"showSubtechniques": false,
"metadata": [
{
"name": "category",
"value": "Protect"
},
{
"name": "value",
"value": "Partial"
},
{
"name": "comment",
"value": "Protects access to applications hosted within cloud and other premises. "
}
],
"color": "#659D32",
"score_num": 50,
"score_display": "Partial",
"category": "Protect"
},
{
"techniqueID": "T1190",
"enabled": true,
"showSubtechniques": false,
"metadata": [
{
"name": "category",
"value": "Protect"
},
{
"name": "value",
"value": "Partial"
},
{
"name": "comment",
"value": "When an application or resource is protected by IAP, it can only be accessed through the proxy by principals, also known as users, who have the correct Identity and Access Management (IAM) role. IAP secures authentication and authorization of all requests to App Engine, Cloud Load Balancing (HTTPS), or internal HTTP load balancing.\n\nWith adversaries that may try to attempt malicious activity via applications, the application Firewalls may be used to limit exposure of applications to prevent exploit traffic from reaching the application."
}
],
"color": "#659D32",
"score_num": 50,
"score_display": "Partial",
"category": "Protect"
}
],
"gradient": {
"colors": [
"#ff6666",
"#ffe766",
"#8ec843"
],
"minValue": 0,
"maxValue": 100
},
"legendItems": [
{
"label": "Protect - Minimal",
"color": "#9CBA7F"
},
{
"label": "Protect - Partial",
"color": "#659D32"
},
{
"label": "Protect - Significant",
"color": "#7FFF00"
},
{
"label": "Detect - Minimal",
"color": "#AEEEEE"
},
{
"label": "Detect - Partial",
"color": "#5F9F9F"
},
{
"label": "Detect - Significant",
"color": "#00FFFF"
},
{
"label": "Respond - Minimal",
"color": "#ff6b6b"
},
{
"label": "Respond - Partial",
"color": "#ff0505"
},
{
"label": "Respond - Significant",
"color": "#b80000"
},
{
"label": "Mixed - Minimal",
"color": "#bf6bff"
},
{
"label": "Mixed - Partial",
"color": "#9305ff"
},
{
"label": "Mixed - Significant",
"color": "#5c00a3"
}
],
"metadata": [],
"showTacticRowBackground": false,
"tacticRowBackground": "#dddddd",
"selectTechniquesAcrossTactics": true,
"selectSubtechniquesWithParent": false
}