From 95b088a7632e9e65bd07d07d9216f26a9b26f84c Mon Sep 17 00:00:00 2001 From: Caitlin Espinosa Date: Wed, 6 Jul 2022 13:49:35 -0500 Subject: [PATCH] Update ArtifactRegistry.yaml Each of the controls are categorized as `Protect`, though each of their comments mentions that once the control is deployed, it can `Detect` nefarious activity. Should the said controls be mapped to both a Protect and Detect categories? With the given description I'd recommend `Detect` only. Example: Compare T1068 with T1212. --- mappings/GCP/ArtifactRegistry.yaml | 16 ++++++++-------- 1 file changed, 8 insertions(+), 8 deletions(-) diff --git a/mappings/GCP/ArtifactRegistry.yaml b/mappings/GCP/ArtifactRegistry.yaml index eebc031..3a4b9f7 100644 --- a/mappings/GCP/ArtifactRegistry.yaml +++ b/mappings/GCP/ArtifactRegistry.yaml @@ -17,7 +17,7 @@ techniques: - id: T1190 name: Exploit Public-Facing Application technique-scores: - - category: Protect + - category: Detect value: Partial comments: >- Once this control is deployed, it can detect known vulnerabilities in various Linux OS @@ -28,7 +28,7 @@ techniques: - id: T1068 name: Exploitation for Privilege Escalation technique-scores: - - category: Protect + - category: Detect value: Partial comments: >- Once this control is deployed, it can detect known OS package vulnerabilities in various @@ -37,7 +37,7 @@ techniques: - id: T1203 name: Exploitation for Client Execution technique-scores: - - category: Protect + - category: Detect value: Partial comments: >- Once this control is deployed, it can detect known vulnerabilities in various Linux OS @@ -48,7 +48,7 @@ techniques: - id: T1210 name: Exploitation of Remote Services technique-scores: - - category: Protect + - category: Detect value: Partial comments: >- Once this control is deployed, it can detect known vulnerabilities in various Linux OS @@ -59,7 +59,7 @@ techniques: - id: T1525 name: Implant Internal Image technique-scores: - - category: Protect + - category: Detect value: Partial comments: >- Once this control is deployed, it can detect known vulnerabilities in Docker containers. @@ -68,7 +68,7 @@ techniques: - id: T1610 name: Deploy Container technique-scores: - - category: Protect + - category: Detect value: Partial comments: >- Once this control is deployed, it can detect known vulnerabilities in Docker containers. @@ -77,7 +77,7 @@ techniques: - id: T1072 name: Software Deployment Tools technique-scores: - - category: Protect + - category: Detect value: Minimal comments: >- Once this control is deployed, it can detect variations to store system packages and @@ -85,7 +85,7 @@ techniques: - id: T1211 name: Exploitation for Defense Evasion technique-scores: - - category: Protect + - category: Detect value: Partial comments: >- Once this control is deployed, it can detect variations to store system packages and