Deploy Container
Adversaries may deploy a container into an environment to facilitate execution or evade defenses. In some cases, adversaries may deploy a new container to execute processes associated with a particular image or deployment, such as processes that execute or download malware. In others, an adversary may deploy a new container configured without network rules, user limitations, etc. to bypass existing defenses within the environment. In Kubernetes environments, an adversary may attempt to deploy a ...
BY SOURCE
PROCEDURES (13)
Auto-extracted: 3 detections for privilege
Auto-extracted: 2 detections for unusual
Auto-extracted: 1 detections for api
Auto-extracted: 1 detections for lateral
Auto-extracted: 1 detections for process creation monitoring
Auto-extracted: 1 detections for registry monitoring
Auto-extracted: 1 detections for kubernetes
Auto-extracted: 1 detections for privilege
Auto-extracted: 1 detections for lateral
Auto-extracted: 1 detections for kubernetes
Auto-extracted: 1 detections for persist
Auto-extracted: 1 detections for unusual
Auto-extracted: 1 detections for lateral