Ambiguous Techniques
With Ambiguous Techniques, you will reduce false positives, focus on the highest‑value log sources, and uncover adversarial use of …
November 16, 2022
Defending IaaS with ATT&CK developed an ATT&CK matrix that enables users to easily understand and work with the techniques applicable to Infrastructure-as-a-Service (IaaS) environments, regardless of whether the attacks target the cloud management layer, the container technology, or the hosted infrastructure. The project also developed documentation and tools to simplify creating overlays for other domains like Industrial Control Systems (ICS) or Operational Technology (OT).
Organizations using IaaS need to understand the techniques adversaries can use against them regardless of whether they occur at the cloud management layer, the container technology, or the hosted infrastructure itself (primarily, Linux servers).
Defending IaaS with ATT&CK provides a straightforward approach to understanding and working with the techniques applicable to IaaS across Cloud, Containers, and Linux.
Organizations that use IaaS can easily understand and defend against the full set of techniques that might be used against that environment.
With Ambiguous Techniques, you will reduce false positives, focus on the highest‑value log sources, and uncover adversarial use of …
Use our latest mappings to replace assumption-driven cloud defense with evidence-based decisions to stop cloud adversaries in their tracks. With …
MITRE INFORM is a program-level assessment designed to show how threat-informed your organization is and where to improve next across cyber …
Sign up for our "Stay Informed" mailing list to receive announcements for project publications, upcoming events, and other news about the Center.