Cloud Service Discovery
An adversary may attempt to enumerate the cloud services running on a system after gaining access.
Description
An adversary may attempt to enumerate the cloud services running on a system after gaining access.
Available Mitigations
This technique can be mitigated using 1 documented security measures.
User Account Management
Quick Info
- Technique ID
- T1526
- Tactic
- Discovery
- Mitigations
- 1
