Benchmark: T1562.007 Impair Defenses: Disable or Modify Cloud Firewall
Overview
Adversaries may disable or modify a firewall within a cloud environment to bypass controls that limit access to cloud resources. Cloud firewalls are separate from system firewalls that are described in Disable or Modify System Firewall.
Cloud environments typically utilize restrictive security groups and firewall rules that only allow network activity from trusted IP addresses via expected ports and protocols. An adversary with appropriate permissions may introduce new firewall rules or policies to allow access into a victim cloud environment and/or move laterally from the cloud control plane to the data plane. For example, an adversary may use a script or utility that creates new ingress rules in existing security groups (or creates new security groups entirely) to allow any TCP/IP connectivity to a cloud-hosted instance. They may also remove networking limitations to support traffic associated with malicious activity (such as cryptomining).
Modifying or disabling a cloud firewall may enable adversary C2 communications, lateral movement, and/or data exfiltration that would otherwise not be allowed. It may also be used to open up resources for Brute Force or Endpoint Denial of Service.
Usage
Install the mod:
mkdir dashboardscd dashboardspowerpipe mod initpowerpipe mod install github.com/turbot/tailpipe-mod-azure-activity-log-detections
Start the Powerpipe server:
powerpipe server
Open http://localhost:9033 in your browser and select T1562.007 Impair Defenses: Disable or Modify Cloud Firewall.
Run this benchmark in your terminal:
powerpipe benchmark run azure_activity_log_detections.benchmark.mitre_attack_v161_ta0005_t1562_007
Snapshot and share results via Turbot Pipes:
powerpipe benchmark run azure_activity_log_detections.benchmark.mitre_attack_v161_ta0005_t1562_007 --share