Cloud Service Discovery

Description

An adversary may attempt to enumerate the cloud services running on a system after gaining access. These methods can differ from platform-as-a-service (PaaS), to infrastructure-as-a-service (IaaS), or software-as-a-service (SaaS). Many services exist throughout the various cloud providers and can include Continuous Integration and Continuous Delivery (CI/CD), Lambda Functions, Entra ID, etc. They may also include security services, such as AWS GuardDuty and Microsoft Defender for Cloud, and logging services, such as AWS CloudTrail and Google Cloud Audit Logs.

Products, Sensors, and Dependencies

ProductDependenciesData sourceAccess requiredProtocolData CollectedNotes
Tenable Identity ExposureEntra IDRead-onlyHTTPSTenant
Tenable Cloud SecurityEntra IDRead-onlyHTTPSTenant
Tenable Cloud SecurityAzureRead-onlyHTTPSSubscription
Tenable Cloud SecurityGCPRead-onlyHTTPSProjects
Tenable Cloud SecurityGoogle OrganizationRead-onlyHTTPSOrganization

Attack Path Technique Details

Framework: MITRE ATT&CK

Family: Discovery