ATT&CK-CN V1.01 Last Update: 2019-11 [返回索引页]

译者: 林妙倩(清华大学网络研究院网络空间安全实习生)、戴亦仑(赛宁网安) 原创翻译作品,如果需要转载请取得翻译作者同意。

数据来源:ATT&CK Matrices

原文: https://attack.mitre.org/techniques/T1538

术语表: /attack/glossary

云服务仪表板

攻击者可能使用具有被盗凭据的云服务仪表板GUI来从运营云环境中获取有用信息,例如特定服务,资源和功能。例如,GCP指挥中心可用于查看所有资产,发现潜在的安全风险以及运行其他查询,例如查找公共IP地址和开放端口。

根据环境的配置,与API相比,对手可能能够通过图形仪表板枚举更多信息。这使对手无需发出任何API请求即可获取信息。

Cloud Service Dashboard

An adversary may use a cloud service dashboard GUI with stolen credentials to gain useful information from an operational cloud environment, such as specific services, resources, and features. For example, the GCP Command Center can be used to view all assets, findings of potential security risks, and to run additional queries, such as finding public IP addresses and open ports.[1]

Depending on the configuration of the environment, an adversary may be able to enumerate more information via the graphical dashboard than an API. This allows the adversary to gain information without making any API requests.

标签

ID编号: T1538

策略: 披露

平台: AWS,GCP,Azure,Azure AD,Office 365

所需权限: user

数据源: Office 365审核日志,Azure活动日志,Stackdriver日志,AWS CloudTrail日志

缓解措施

缓解 描述
用户帐号管理(M1018) 通过将仪表板的可见性限制为仅所需的资源,来实施最低特权原则。如果帐户遭到破坏,这可能会限制仪表板的发现值。
Mitigation Description
User Account Management (M1018) Enforce the principle of least-privilege by limiting dashboard visibility to only the resources required. This may limit the discovery value of the dashboard in the event of a compromised account.

检测

监视帐户活动日志以查看执行的操作以及与云服务管理控制台关联的活动。某些云提供程序(例如AWS)为尝试登录管理控制台提供了不同的日志事件

Monitor account activity logs to see actions performed and activity associated with the cloud service management console. Some cloud providers, such as AWS, provide distinct log events for login attempts to the management console.