Cloud Service Dashboard

An adversary may use a cloud service dashboard GUI with stolen credentials to gain useful information from an operational cloud environment, such as specific services, resources, and features. For example, the GCP Command Center can be used to view all assets, findings of potential security risks, and to run additional queries, such as finding public IP addresses and open ports.[1]

Depending on the configuration of the environment, an adversary may be able to enumerate more information via the graphical dashboard than an API. This allows the adversary to gain information without making any API requests.

ID: T1538
Sub-techniques:  No sub-techniques
Tactic: Discovery
Platforms: Azure AD, Google Workspace, IaaS, Office 365
Permissions Required: User
Contributors: Praetorian
Version: 1.1
Created: 30 August 2019
Last Modified: 16 March 2021
Provided by LAYER 8

Mitigations

ID Mitigation Description
M1018 User Account Management

Enforce the principle of least-privilege by limiting dashboard visibility to only the resources required. This may limit the discovery value of the dashboard in the event of a compromised account.

Detection

ID Data Source Data Component
DS0028 Logon Session Logon Session Creation
DS0002 User Account User Account Authentication

Monitor account activity logs to see actions performed and activity associated with the cloud service management console. Some cloud providers, such as AWS, provide distinct log events for login attempts to the management console.[2]

References