This repository has been archived by the owner on Apr 3, 2024. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 62
/
Copy pathplatform.json
10035 lines (10035 loc) · 424 KB
/
platform.json
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
{
"name": "GCP platform native security controls",
"versions": {
"attack": "10",
"navigator": "4.2",
"layer": "4.2"
},
"domain": "enterprise-attack",
"description": "Controls: Cloud Data Loss Prevention,Siemplify,Cloud Armor,Web Risk,Cloud Logging,Titan Security Key,Confidential VM and Compute Engine,Terraform on Google Cloud,Binary Authorization,Cloud Asset Inventory,Certificate Authority Service,Assured Workloads,Secret Manager,Data Catalog,Artifact Registry,Security Command Center,Hybrid Connectivity,Endpoint Management,AdvancedProtectionProgram,Chronicle,BeyondCorp Enterprise,Cloud Hardware Security Module (HSM),Virtual Private Cloud,Firewalls,AnthosConfigManagement,Packet Mirroring,IdentityPlatform,Cloud IDS,CloudVPN,Deployment Manager,Policy Intelligence,Cloud CDN,VPC Service Controls,Virus Total,VMManager,Access Transparency,Cloud Key Management,ResourceManager,Cloud NAT,Container Registry,Shielded VM,Identity Aware Proxy,Google Kubernetes Engine,ReCAPTCHA Enterprise,Cloud Storage,Actifio Go,Identity and Access Management,Config Connector,Cloud Identity",
"filters": {
"platforms": [
"Linux",
"macOS",
"Windows",
"Office 365",
"Azure AD",
"AWS",
"GCP",
"Azure",
"SaaS",
"PRE",
"Network"
]
},
"sorting": 0,
"layout": {
"layout": "side",
"showID": false,
"showName": true,
"showAggregateScores": false,
"countUnscored": false,
"aggregateFunction": "average"
},
"hideDisabled": false,
"techniques": [
{
"techniqueID": "T1530",
"enabled": true,
"showSubtechniques": false,
"metadata": [
{
"name": "control",
"value": "Cloud Data Loss Prevention"
},
{
"name": "category",
"value": "Protect"
},
{
"name": "value",
"value": "Partial"
},
{
"name": "comment",
"value": "This control is able to scan cloud storage objects for sensitive data and transform that data into a secure or nonsensitive form. It is able to scan for a variety of common sensitive data types, such as API keys, credentials, or credit card numbers. This control is able to be scheduled daily, weekly, etc and can scan new changes to data. This control is able to scan Google Cloud Storage, BigQuery tables, and Datastore. "
},
{
"divider": true
},
{
"name": "control",
"value": "Security Command Center"
},
{
"name": "category",
"value": "Detect"
},
{
"name": "value",
"value": "Partial"
},
{
"name": "comment",
"value": "SCC detect suspicious activity when accessing cloud storage objects (e.g., new IPs accessing storage objects or enumeration from unfamiliar user identities). Because of the real time temporal factor when detecting access to secure storage objects this control was graded as partial."
},
{
"divider": true
},
{
"name": "control",
"value": "AdvancedProtectionProgram"
},
{
"name": "category",
"value": "Protect"
},
{
"name": "value",
"value": "Significant"
},
{
"name": "comment",
"value": "Advanced Protection Program enables the use of a security key for multi-factor authentication. Restricting access via MFA provides significant protection against adversaries accessing data objects from cloud storage.\n"
},
{
"divider": true
},
{
"name": "control",
"value": "Chronicle"
},
{
"name": "category",
"value": "Detect"
},
{
"name": "value",
"value": "Minimal"
},
{
"name": "comment",
"value": "Chronicle is able to trigger an alert to notify personnel of GCP resources (e.g., storage buckets) that are publicly accessible to unauthenticated users. \n\nThis technique was scored as minimal based on low or uncertain detection coverage factor.\n\nhttps://github.com/chronicle/detection-rules/blob/main/gcp_cloudaudit/gcp_gcs_public_accessible.yaral"
},
{
"divider": true
},
{
"name": "control",
"value": "BeyondCorp Enterprise"
},
{
"name": "category",
"value": "Protect"
},
{
"name": "value",
"value": "Significant"
},
{
"name": "comment",
"value": "Access Context Manager allows Google Cloud organization administrators to define fine-grained, attribute based access control for projects and resources. Access levels applied on resources with IAM Conditions enforce fine-grained access control based on a variety of attributes, including IP subnetworks. Adversaries may obtain leaked credentials; however, this control can block specific adversaries from gaining access permission controls by admins granting an access level based on the IP address of the originating request.\n\n"
},
{
"divider": true
},
{
"name": "control",
"value": "Firewalls"
},
{
"name": "category",
"value": "Protect"
},
{
"name": "value",
"value": "Partial"
},
{
"name": "comment",
"value": "Google Cloud Firewalls can allow or deny traffic based on the traffic's protocol, destination ports, sources, and destinations. This functionality can be used to block adversaries from accessing resources such as cloud storage objects by implementing restrictions on which IP addresses and domains can access the resources (e.g., allow lists). However, since cloud storage objects are located outside the virtual private cloud where Google Cloud Firewalls protect, the mapping is only given a score of Partial."
},
{
"divider": true
},
{
"name": "control",
"value": "Policy Intelligence"
},
{
"name": "category",
"value": "Protect"
},
{
"name": "value",
"value": "Partial"
},
{
"name": "comment",
"value": "Recommender generates policy insights by comparing the permissions that each principal used during the past 90 days with the total permissions the principal has. This can be used to limit the permissions associated with creating and modifying platform images or containers that adversaries may try to access."
},
{
"divider": true
},
{
"name": "category",
"value": "Detect"
},
{
"name": "value",
"value": "Minimal"
},
{
"name": "comment",
"value": "Adversaries may attempt to implant cloud or container images with malicious code to gain access to an environment. The IAM audit logs can be used to receive data access and activity logs who has accessed to certain resources."
},
{
"divider": true
},
{
"name": "control",
"value": "VPC Service Controls"
},
{
"name": "category",
"value": "Protect"
},
{
"name": "value",
"value": "Significant"
},
{
"name": "comment",
"value": "This control may mitigate against access to cloud storage objects by limiting access to accounts and services contained within the VPC network perimeter that contains those cloud storage objects. "
},
{
"divider": true
},
{
"name": "control",
"value": "Access Transparency"
},
{
"name": "category",
"value": "Detect"
},
{
"name": "value",
"value": "Minimal"
},
{
"name": "comment",
"value": "This control may expose and detect malicious access of data from cloud storage by compromised Google personnel accounts."
},
{
"divider": true
},
{
"name": "control",
"value": "Cloud Storage"
},
{
"name": "category",
"value": "Protect"
},
{
"name": "value",
"value": "Significant"
},
{
"name": "comment",
"value": "The cloud service provider's default encryption setting for data stored and written to disk in the cloud may protect against adversary's attempt to access data from improperly secured cloud storage. This technique was rated as significant due to the high protect coverage factor."
}
],
"color": "#5c00a3",
"score_num": 100,
"score_display": "Significant",
"category": "Mixed"
},
{
"techniqueID": "T1090",
"enabled": true,
"showSubtechniques": false,
"metadata": [
{
"name": "control",
"value": "Cloud Armor"
},
{
"name": "category",
"value": "Protect"
},
{
"name": "value",
"value": "Partial"
},
{
"name": "comment",
"value": "Traffic to known anonymity networks and C2 infrastructure can be blocked through the use of network allow and block lists. However this can be circumvented by other techniques."
},
{
"divider": true
},
{
"name": "control",
"value": "Firewalls"
},
{
"name": "category",
"value": "Protect"
},
{
"name": "value",
"value": "Partial"
},
{
"name": "comment",
"value": "Google Cloud Firewalls can allow or deny traffic based on the traffic's protocol, destination ports, sources, and destinations. This functionality can be used to block traffic from known bad IP addresses and to known bad domains that serve as proxies for adversaries. This mapping is given a score of partial because it only supports a subset of the sub-techniques (2 of 4) and because it only blocks known bad IP addresses and domains and does not protect against unknown ones."
}
],
"color": "#659D32",
"score_num": 50,
"score_display": "Partial",
"category": "Protect"
},
{
"techniqueID": "T1190",
"enabled": true,
"showSubtechniques": false,
"metadata": [
{
"name": "control",
"value": "Cloud Armor"
},
{
"name": "category",
"value": "Protect"
},
{
"name": "value",
"value": "Significant"
},
{
"name": "comment",
"value": "Google Cloud Armor security policies protect your application by providing Layer 7 filtering and by scrubbing incoming requests for common web attacks or other Layer 7 attributes. Google Cloud Armor detects malicious requests and drops them at the edge of Google's infrastructure."
},
{
"divider": true
},
{
"name": "control",
"value": "Artifact Registry"
},
{
"name": "category",
"value": "Protect"
},
{
"name": "value",
"value": "Partial"
},
{
"name": "comment",
"value": "Once this control is deployed, it can detect known vulnerabilities in various Linux OS packages. This information can be used to patch, isolate, or remove vulnerable software and machines. This control does not directly protect against exploitation and is not effective against zero day attacks, vulnerabilities with no available patch, and other end-of-life packages."
},
{
"divider": true
},
{
"name": "control",
"value": "Security Command Center"
},
{
"name": "category",
"value": "Detect"
},
{
"name": "value",
"value": "Significant"
},
{
"name": "comment",
"value": "Using Web Security Scanner, SCC is able to detect and provide guidance for web application security risks (e.g., Cross-Site Scripting, SQL injection, Server Side Request Forgery, Insecure Deserialization). Adversaries may exploit these web app weaknesses in a cloud-based environment to compromise the underlying instance or container. This technique was graded as significant due to the high detect coverage against varying forms of this attack. "
},
{
"divider": true
},
{
"name": "control",
"value": "Chronicle"
},
{
"name": "category",
"value": "Detect"
},
{
"name": "value",
"value": "Minimal"
},
{
"name": "comment",
"value": "Chronicle triggers an alert based on suspicious behavior, such as exploitation attempts against web servers and/or applications (e.g., F5 BIG-IP CVE 2020-5902).\n\nThis technique was scored as minimal based on low or uncertain detection coverage factor.\n\nhttps://github.com/chronicle/detection-rules/blob/783e0e5947774785db1c55041b70176deeca6f46/soc_prime_rules/proactive_exploit_detection/big_ip/possible_f5_big_ip_tmui_attack_cve_2020_5902_part_1.yaral\n\nhttps://github.com/chronicle/detection-rules/blob/783e0e5947774785db1c55041b70176deeca6f46/soc_prime_rules/proactive_exploit_detection/big_ip/possible_f5_big_ip_tmui_attack_cve_2020_5902_part_2.yaral"
},
{
"divider": true
},
{
"name": "control",
"value": "Virtual Private Cloud"
},
{
"name": "category",
"value": "Protect"
},
{
"name": "value",
"value": "Significant"
},
{
"name": "comment",
"value": "VPC security perimeters can segment private resources to further reduce user access and operate in a logically separate hosting environment."
},
{
"divider": true
},
{
"name": "control",
"value": "Cloud IDS"
},
{
"name": "category",
"value": "Detect"
},
{
"name": "value",
"value": "Significant"
},
{
"name": "comment",
"value": "Often used by adversaries to take advantage of software weaknesses in web applications, Palo Alto Network's vulnerability signatures are able to detect SQL-injection attacks that attempt to read or modify a system database using common web hacking techniques (e.g., OWASP top 10).\n\nAlthough there are ways an attacker could leverage web application weaknesses to affect the sensitive data and databases, this technique was scored as significant based on Palo Alto Network's advanced threat detection technology which constantly updates to detect against the latest known variations of these attacks."
},
{
"divider": true
},
{
"name": "control",
"value": "VMManager"
},
{
"name": "category",
"value": "Protect"
},
{
"name": "value",
"value": "Partial"
},
{
"name": "comment",
"value": "VM Manager can apply on-demand and scheduled patches via automated patch deployment. This can remediate OS and software vulnerabilities that could otherwise be exploited. Since VM Manager doesn't directly prevent exploitation of active vulnerabilities (including zero day vulnerabilities) this control has resulted in a score of Partial."
},
{
"divider": true
},
{
"name": "control",
"value": "Identity Aware Proxy"
},
{
"name": "category",
"value": "Protect"
},
{
"name": "value",
"value": "Partial"
},
{
"name": "comment",
"value": "When an application or resource is protected by IAP, it can only be accessed through the proxy by principals, also known as users, who have the correct Identity and Access Management (IAM) role. IAP secures authentication and authorization of all requests to App Engine, Cloud Load Balancing (HTTPS), or internal HTTP load balancing.\n\nWith adversaries that may try to attempt malicious activity via applications, the application Firewalls may be used to limit exposure of applications to prevent exploit traffic from reaching the application."
}
],
"color": "#5c00a3",
"score_num": 100,
"score_display": "Significant",
"category": "Mixed"
},
{
"techniqueID": "T1498",
"enabled": true,
"showSubtechniques": false,
"metadata": [
{
"name": "control",
"value": "Cloud Armor"
},
{
"name": "category",
"value": "Protect"
},
{
"name": "value",
"value": "Significant"
},
{
"name": "comment",
"value": "Google Cloud Armor provides always-on DDoS protection against network or protocol-based volumetric DDoS attacks. It allows users to allow/deny traffic at the Google Cloud edge, closest to the source of traffic. This prevents unwelcome traffic from consuming resources."
},
{
"divider": true
},
{
"name": "control",
"value": "Firewalls"
},
{
"name": "category",
"value": "Protect"
},
{
"name": "value",
"value": "Minimal"
},
{
"name": "comment",
"value": "Google Cloud Firewalls can allow or deny traffic based on the traffic's protocol, destination ports, sources, and destinations. This functionality can be used to block the sources of smaller-scale network denial of service attacks. While Google Cloud Firewalls support both sub-techniques (2 of 2), this mapping is given a score of Minimal because often times it is necessary to block the traffic at an Internet Service Provider or Content Provider Network level."
},
{
"divider": true
},
{
"name": "control",
"value": "Cloud CDN"
},
{
"name": "category",
"value": "Protect"
},
{
"name": "value",
"value": "Partial"
},
{
"name": "comment",
"value": "Cloud CDN acts as a proxy between clients and origin servers. Cloud CDN can distribute requests for cacheable content across multiple points-of-presence (POPs), thereby providing a larger set of locations to absorb a DOS attack.\n\nHowever, Cloud CDN doesn't provide protection against DOS attacks for uncached content."
}
],
"color": "#7FFF00",
"score_num": 100,
"score_display": "Significant",
"category": "Protect"
},
{
"techniqueID": "T1499",
"enabled": true,
"showSubtechniques": false,
"metadata": [
{
"name": "control",
"value": "Cloud Armor"
},
{
"name": "category",
"value": "Protect"
},
{
"name": "value",
"value": "Significant"
},
{
"name": "comment",
"value": "Google Cloud Armor provides always-on DDoS protection against network or protocol-based volumetric DDoS attacks. It allows users to allow/deny traffic at the Google Cloud edge, closest to the source of traffic. This prevents unwelcome traffic from consuming resources."
},
{
"divider": true
},
{
"name": "control",
"value": "Firewalls"
},
{
"name": "category",
"value": "Protect"
},
{
"name": "value",
"value": "Partial"
},
{
"name": "comment",
"value": "Google Cloud Firewalls can allow or deny traffic based on the traffic's protocol, destination ports, sources, and destinations. This functionality can be used to block adversaries from carrying out denial of service attacks by implementing restrictions on which IP addresses and domains can access the resources (e.g., allow lists) as well as which protocol traffic is permitted. That is, Google Cloud Firewalls could block the source of the denial-of-service attack. This mapping is given a score of Partial because it only supports a subset of the sub-techniques (3 of 4) and because the source of the attack would have to be known before rules could be put in place to protect against it."
},
{
"divider": true
},
{
"name": "control",
"value": "Cloud IDS"
},
{
"name": "category",
"value": "Detect"
},
{
"name": "value",
"value": "Significant"
},
{
"name": "comment",
"value": "Often used by adversaries to affect availability and deprive legitimate user access, Palo Alto Network's vulnerability signatures are able to detect denial-of-service (DoS) attacks that attempt to render a target system unavailable by flooding the resources with traffic.\n\nThis technique was scored as significant based on Palo Alto Network's advanced threat detection technology which constantly updates to detect against a variety of denial-of-service attacks."
}
],
"color": "#5c00a3",
"score_num": 100,
"score_display": "Significant",
"category": "Mixed"
},
{
"techniqueID": "T1018",
"enabled": true,
"showSubtechniques": false,
"metadata": [
{
"name": "control",
"value": "Cloud Armor"
},
{
"name": "category",
"value": "Protect"
},
{
"name": "value",
"value": "Partial"
},
{
"name": "comment",
"value": "This control typically filters external network traffic and therefore can be effective for preventing external remote system discovery. Activity originating from inside the trusted network is not mitigated."
},
{
"divider": true
},
{
"name": "control",
"value": "Chronicle"
},
{
"name": "category",
"value": "Detect"
},
{
"name": "value",
"value": "Minimal"
},
{
"name": "comment",
"value": "Chronicle attempts to identify remote \nsystems via ping sweep. This technique was scored as minimal based on low or uncertain detection coverage factor.\n\nhttps://github.com/chronicle/detection-rules/blob/783e0e5947774785db1c55041b70176deeca6f46/soc_prime_rules/ioc_sigma/process_creation/remote_system_discovery___ping_sweep.yaral"
},
{
"divider": true
},
{
"name": "control",
"value": "Virtual Private Cloud"
},
{
"name": "category",
"value": "Protect"
},
{
"name": "value",
"value": "Significant"
},
{
"name": "comment",
"value": "VPC security perimeters can segment private resources to deny traffic based on organizational policy."
},
{
"divider": true
},
{
"name": "control",
"value": "Firewalls"
},
{
"name": "category",
"value": "Protect"
},
{
"name": "value",
"value": "Partial"
},
{
"name": "comment",
"value": "Google Cloud Firewalls can allow or deny traffic based on the traffic's protocol, destination ports, sources, and destinations. This functionality can be used to block adversaries from discovering endpoints behind the firewall. This mapping is given a score of Partial because it does not protect against discovering endpoints within the network and behind the firewall."
}
],
"color": "#5c00a3",
"score_num": 100,
"score_display": "Significant",
"category": "Mixed"
},
{
"techniqueID": "T1046",
"enabled": true,
"showSubtechniques": false,
"metadata": [
{
"name": "control",
"value": "Cloud Armor"
},
{
"name": "category",
"value": "Protect"
},
{
"name": "value",
"value": "Partial"
},
{
"name": "comment",
"value": "This control typically filters external network traffic and therefore can be effective for preventing external network service scanning. Network service scanning originating from inside the trusted network is not mitigated."
},
{
"divider": true
},
{
"name": "control",
"value": "Virtual Private Cloud"
},
{
"name": "category",
"value": "Protect"
},
{
"name": "value",
"value": "Significant"
},
{
"name": "comment",
"value": "VPC security perimeters can limit the impact from active scanning and lateral movement techniques used to exploit the target environment."
},
{
"divider": true
},
{
"name": "control",
"value": "Firewalls"
},
{
"name": "category",
"value": "Protect"
},
{
"name": "value",
"value": "Partial"
},
{
"name": "comment",
"value": "Google Cloud Firewalls can allow or deny traffic based on the traffic's protocol, destination ports, sources, and destinations. This functionality can be used to restrict access to the endpoints within the virtual private cloud and protect against network service scanning. This mapping is given a score of Partial because it only protects against network service scanning attacks that originate from outside the firewall and not from within network protected by the firewall."
}
],
"color": "#7FFF00",
"score_num": 100,
"score_display": "Significant",
"category": "Protect"
},
{
"techniqueID": "T1566",
"enabled": true,
"showSubtechniques": false,
"metadata": [
{
"name": "control",
"value": "Web Risk"
},
{
"name": "category",
"value": "Protect"
},
{
"name": "value",
"value": "Partial"
},
{
"name": "comment",
"value": "Web Risk allows client applications to check URLs against Google's list of unsafe web resources. It also can provide warnings when attempting to access potentially unsafe sites. However, Google cannot guarantee that its information is comprehensive and error-free: some risky sites may not be identified, and some safe sites may be classified in error. This has resulted in an overall score of Partial."
},
{
"divider": true
},
{
"name": "control",
"value": "Titan Security Key"
},
{
"name": "category",
"value": "Protect"
},
{
"name": "value",
"value": "Significant"
},
{
"name": "comment",
"value": "This control is able to mitigate against a variety of phishing attacks by requiring an additional key for authentication outside of the user's password. Compared to other forms of 2-factor authentication, this control will not allow for authentication to an illegitimate service or website as the key can not be transmitted from the hardware device to any other device."
},
{
"divider": true
},
{
"name": "control",
"value": "BeyondCorp Enterprise"
},
{
"name": "category",
"value": "Protect"
},
{
"name": "value",
"value": "Significant"
},
{
"name": "comment",
"value": "This control can help detect malicious links sent via phishing. The details include a list of samples of message delivery events. Each item in the list includes the date, message ID, subject hash, message body hash, username of the recipient, attachment hashes, and your primary domain name. As a result, this can be used to block senders."
},
{
"divider": true
},
{
"name": "category",
"value": "Detect"
},
{
"name": "value",
"value": "Significant"
},
{
"name": "comment",
"value": "This control can help detect malicious links sent via phishing. The details include a list of samples of message delivery events. Each item in the list includes the date, message ID, subject hash, message body hash, username of the recipient, attachment hashes, and your primary domain name."
},
{
"divider": true
},
{
"name": "control",
"value": "Virus Total"
},
{
"name": "category",
"value": "Protect"
},
{
"name": "value",
"value": "Significant"
},
{
"name": "comment",
"value": "VirusTotal, now part of Google Cloud, provides threat context and reputation data to help analyze suspicious files, URLs, domains, and IP addresses to detect cybersecurity threats. This control can help mitigate adversaries that try to send malware via emails using malicious links or attachments. The malware-scanner service scans the uploaded document for malware.\nIf the document is infected, the service moves it to a quarantined bucket; otherwise the document is moved into another bucket that holds uninfected scanned documents."
}
],
"color": "#5c00a3",
"score_num": 100,
"score_display": "Significant",
"category": "Mixed"
},
{
"techniqueID": "T1598",
"enabled": true,
"showSubtechniques": false,
"metadata": [
{
"name": "control",
"value": "Web Risk"
},
{
"name": "category",
"value": "Protect"
},
{
"name": "value",
"value": "Partial"
},
{
"name": "comment",
"value": "Web Risk allows client applications to check URLs against Google's list of unsafe web resources. It also can provide warnings when attempting to access potentially unsafe sites. However, Google cannot guarantee that its information is comprehensive and error-free: some risky sites may not be identified, and some safe sites may be classified in error. This has resulted in an overall score of Partial."
}
],
"color": "#659D32",
"score_num": 50,
"score_display": "Partial",
"category": "Protect"
},
{
"techniqueID": "T1204.001",
"enabled": true,
"showSubtechniques": false,
"metadata": [
{
"name": "control",
"value": "Web Risk"
},
{
"name": "category",
"value": "Protect"
},
{
"name": "value",
"value": "Partial"
},
{
"name": "comment",
"value": "Web Risk allows client applications to check URLs against Google's list of unsafe web resources. It also can provide warnings when attempting to access potentially unsafe sites. However, Google cannot guarantee that its information is comprehensive and error-free: some risky sites may not be identified, and some safe sites may be classified in error. This has resulted in an overall score of Partial."
}
],
"color": "#659D32",
"score_num": 50,
"score_display": "Partial",
"category": "Protect"
},
{
"techniqueID": "T1598.003",
"enabled": true,
"showSubtechniques": false,
"metadata": [
{
"name": "control",
"value": "Web Risk"
},
{
"name": "category",
"value": "Protect"
},
{
"name": "value",
"value": "Partial"
},
{
"name": "comment",
"value": "Web Risk allows client applications to check URLs against Google's list of unsafe web resources. It also can provide warnings when attempting to access potentially unsafe sites. However, Google cannot guarantee that its information is comprehensive and error-free: some risky sites may not be identified, and some safe sites may be classified in error. This has resulted in an overall score of Partial."
},
{
"divider": true
},
{
"name": "control",
"value": "Virus Total"
},
{
"name": "category",
"value": "Protect"
},
{
"name": "value",
"value": "Significant"
},
{
"name": "comment",
"value": "Adversaries may send spearphishing messages with a malicious link to elicit sensitive information that can be used during targeting. VirusTotal Graph is a visualization tool built on top of the VirusTotal data set. It analyzes the relationship between files, URLs, domains, IP addresses, and other items encountered."
}
],
"color": "#7FFF00",
"score_num": 100,
"score_display": "Significant",
"category": "Protect"
},
{
"techniqueID": "T1565.003",
"enabled": true,
"showSubtechniques": false,
"metadata": [
{
"name": "control",
"value": "Confidential VM and Compute Engine"
},
{
"name": "category",
"value": "Protect"
},
{
"name": "value",
"value": "Significant"
},
{
"name": "comment",
"value": "Main memory encryption is performed using dedicated hardware within the memory controllers. Each controller includes a high-performance Advanced Encryption Standard (AES) engine. The AES engine encrypts data as it is written to DRAM or shared between sockets, and decrypts it when data is read."
}
],
"color": "#7FFF00",
"score_num": 100,
"score_display": "Significant",
"category": "Protect"
},
{
"techniqueID": "T1610",
"enabled": true,
"showSubtechniques": false,
"metadata": [
{
"name": "control",
"value": "Binary Authorization"
},
{
"name": "category",
"value": "Protect"
},
{
"name": "value",
"value": "Significant"
},
{
"name": "comment",
"value": "Based on configured policies, Binary Authorization allows or blocks deployment of container images."
},
{
"divider": true
},
{
"name": "control",
"value": "Artifact Registry"
},
{
"name": "category",
"value": "Protect"
},
{
"name": "value",
"value": "Partial"
},
{
"name": "comment",
"value": "Once this control is deployed, it can detect known vulnerabilities in Docker containers. This information can be used to detect malicious implanted images in the environment. This control does not directly protect against exploitation."
},
{