An adversary may use a cloud service dashboard GUI with stolen credentials to gain useful information from an operational cloud environment, such as specific services, resources, and features. For example, the GCP Command Center can be used to view all assets, findings of potential security risks, and to run additional queries, such as finding public IP addresses and open ports.[1]
Depending on the configuration of the environment, an adversary may be able to enumerate more information via the graphical dashboard than an API. This allows the adversary to gain information without making any API requests.
ID | Name | Description |
---|---|---|
G1015 | Scattered Spider |
Scattered Spider abused AWS Systems Manager Inventory to identify targets on the compromised network prior to lateral movement.[2] |
ID | Mitigation | Description |
---|---|---|
M1018 | User Account Management |
Enforce the principle of least-privilege by limiting dashboard visibility to only the resources required. This may limit the discovery value of the dashboard in the event of a compromised account. |
ID | Data Source | Data Component | Detects |
---|---|---|---|
DS0028 | Logon Session | Logon Session Creation |
Monitor for newly constructed logon behavior across cloud service management consoles.[3] In AWS environments, look for the |
DS0002 | User Account | User Account Authentication |
Correlate other security systems with login information, such as user accounts, IP addresses, and login names.[3] |