Disable or Modify System Firewall: Cloud Firewall

Adversaries may disable or modify a firewall within a cloud environment to bypass controls that limit access to cloud resources.

Cloud environments typically utilize restrictive security groups and firewall rules that only allow network activity from trusted IP addresses via expected ports and protocols. An adversary with appropriate permissions may introduce new firewall rules or policies to allow access into a victim cloud environment and/or move laterally from the cloud control plane to the data plane.

For example, an adversary may use a script or utility that creates new ingress rules in existing security groups (or creates new security groups entirely) to allow any TCP/IP connectivity to a cloud-hosted instance. They may also remove networking limitations to support traffic associated with malicious activity (such as cryptomining).[1][2]

ID: T1686.001
Sub-technique of:  T1686
Platforms: IaaS
Contributors: Arun Seelagan, CISA; Expel
Version: 1.0
Created: 14 April 2026
Last Modified: 22 April 2026

Procedure Examples

ID Name Description
S1091 Pacu

Pacu can allowlist IP addresses in AWS GuardDuty.[3]

Mitigations

ID Mitigation Description
M1047 Audit

Routinely check account role permissions to ensure only expected users and roles have permission to modify cloud firewalls.

M1018 User Account Management

Ensure least privilege principles are applied to Identity and Access Management (IAM) security policies.[4]

Detection Strategy

ID Name Analytic ID Analytic Description
DET0424 Detection Strategy for Disable or Modify Cloud Firewall AN1188

Creation, deletion, or modification of security groups and firewall rules in cloud control plane logs that expand access to cloud resources beyond expected baselines. Defender view: unexpected ingress/egress rules permitting 0.0.0.0/0 or opening atypical ports, often correlated with privileged role or API key activity.

References