Data from Cloud Storage
Adversaries may access data from improperly secured cloud storage.
Description
Adversaries may access data from improperly secured cloud storage.
Available Mitigations
This technique can be mitigated using 3 documented security measures.
AuditEncrypt Sensitive InformationMulti-factor Authentication
Quick Info
- Technique ID
- T1530
- Tactic
- Collection
- Mitigations
- 3
