Modify Cloud Compute Infrastructure
An adversary may attempt to modify a cloud account's compute service infrastructure to evade defenses. A modification to the compute service infrastructure can include the creation, deletion, or modification of one or more components such as compute instances, virtual machines, and snapshots. Permissions gained from the modification of infrastructure components may bypass restrictions that prevent access to existing infrastructure. Modifying infrastructure components may also allow an adversary...
BY SOURCE
PROCEDURES (14)
Auto-extracted: 3 detections for cloud
Auto-extracted: 1 detections for encrypt
Auto-extracted: 1 detections for exfiltrat
Auto-extracted: 1 detections for c2
Auto-extracted: 1 detections for exfiltrat
Auto-extracted: 1 detections for bypass
Auto-extracted: 1 detections for persist
Auto-extracted: 1 detections for persist
Auto-extracted: 1 detections for bypass
Auto-extracted: 1 detections for aws
Auto-extracted: 1 detections for azure
Auto-extracted: 1 detections for encrypt
Auto-extracted: 1 detections for c2
Auto-extracted: 1 detections for cloud