Cloud Service Discovery
An adversary may attempt to enumerate the cloud services running on a system after gaining access. These methods can differ from platform-as-a-service (PaaS), to infrastructure-as-a-service (IaaS), or software-as-a-service (SaaS). Many services exist throughout the various cloud providers and can include Continuous Integration and Continuous Delivery (CI/CD), Lambda Functions, Entra ID, etc. They may also include security services, such as AWS GuardDuty and Microsoft Defender for Cloud, and logg...
BY SOURCE
PROCEDURES (17)
Auto-extracted: 2 detections for kubernetes
Auto-extracted: 2 detections for exfiltrat
Auto-extracted: 2 detections for evasion
Auto-extracted: 2 detections for credential
Auto-extracted: 2 detections for privilege
Auto-extracted: 2 detections for kubernetes
Auto-extracted: 1 detections for service
Auto-extracted: 1 detections for service
Auto-extracted: 1 detections for process creation monitoring
Auto-extracted: 1 detections for evasion
Auto-extracted: 1 detections for general monitoring
Auto-extracted: 1 detections for privilege
Auto-extracted: 1 detections for credential
Auto-extracted: 1 detections for exfiltrat
Auto-extracted: 1 detections for azure
Auto-extracted: 1 detections for api
Auto-extracted: 1 detections for azure