A deep dive into the techniques in the cloud framework
As mentioned in Chapter 4, What Is the ATT&CK Framework?, the MITRE ATT&CK framework has different matrices for the different enterprises, one of those enterprises being the cloud. While this is great, you have to remember that you might have to customize any techniques so that they fit your specific cloud environment, but there are currently matrices for Office 365, Azure AD, Google Workspace, Software as a Service (SaaS), and Infrastructure as a Service (IaaS). In this section, we will start by looking at the tactics that are covered and the unique techniques before discussing the sub-techniques and supplemental information.
We’ll start at the top by discussing the generic cloud enterprise matrix, which has the following tactics and techniques:
- Initial Access
- Drive-by Compromise, Exploit Public Facing Application, Phishing, Trusted Relationship, and Valid Accounts
- Execution
- User Execution and Serverless...