Critical Infrastructure Cybersecurity Framework
T1530Collection3 Mitigations

Data from Cloud Storage

Adversaries may access data from improperly secured cloud storage.

Description

Adversaries may access data from improperly secured cloud storage.

Available Mitigations

This technique can be mitigated using 3 documented security measures.

AuditEncrypt Sensitive InformationMulti-factor Authentication

Quick Info

Technique ID
T1530
Mitigations
3

By using this website, you agree to our legal documents. Please review our Privacy Policy, Terms of Use, and Accessibility Statement in the footer.