Published Projects

Security Stack Mappings – Google Cloud Platform

Project Summary

This project identified and mapped security capabilities available as part of GCP to the ATT&CK techniques to which they can detect, protect, or respond. This allows cyber defenders of cloud platforms to make threat-informed decisions about which capabilities to use and how to use them.

The Google Cloud mappings are part of our Mappings Explorer program. Use the Mappings Explorer website to navigate, explore, search, and download our mappings of security capabilities to MITRE ATT&CK®.

Problem

Administrators and defenders of Google Cloud Platform (GCP) lack a comprehensive view of how native GCP security controls defend against real-world adversary TTPs.

Solution

Map the effectiveness of native security capabilities available in GCP to specific ATT&CK techniques.

Impact

Empowers defenders with independent assessments of which GCP controls are effective to mitigate relevant adversary TTPs.


Funding Research Participants


Explore More of Our Work:

Ambiguous Techniques

Building upon the research of Summiting the Pyramid, Ambiguous Techniques is a methodology to determine malicious intent behind seemingly benign …

Continue reading

Prioritize Known Exploited Vulnerabilities

Prioritize Known Exploited Vulnerabilities shows defenders how to take a threat informed approach to vulnerability management.

Continue reading

Security Stack Mappings – Hardware-Enabled Defense

The Security Stack Mappings – Hardware-Enabled Defense project demonstrates full stack threat-informed defense, from the hardware board to the …

Continue reading

Stay Informed

Sign up for our "Stay Informed" mailing list to receive announcements for project publications, upcoming events, and other news about the Center.