Skip to content

T1538 Cloud Service Dashboard

An adversary may use a cloud service dashboard GUI with stolen credentials to gain useful information from an operational cloud environment, such as specific services, resources, and features. For example, the GCP Command Center can be used to view all assets, review findings of potential security risks, and run additional queries, such as finding public IP addresses and open ports.2

Depending on the configuration of the environment, an adversary may be able to enumerate more information via the graphical dashboard than an API. This also allows the adversary to gain information without manually making any API requests.

Item Value
ID T1538
Sub-techniques
Tactics TA0007
Platforms IaaS, Identity Provider, Office Suite, SaaS
Version 1.5
Created 30 August 2019
Last Modified 24 October 2025

Procedure Examples

ID Name Description
G1015 Scattered Spider Scattered Spider abused AWS Systems Manager Inventory to identify targets on the compromised network prior to lateral movement.3

Mitigations

ID Mitigation Description
M1018 User Account Management Enforce the principle of least-privilege by limiting dashboard visibility to only the resources required. This may limit the discovery value of the dashboard in the event of a compromised account.

References