Critical Infrastructure Cybersecurity Framework

Unused/Unsupported Cloud Regions

Adversaries may create cloud instances in unused geographic service regions in order to evade detection.

Description

Adversaries may create cloud instances in unused geographic service regions in order to evade detection.

Quick Info

Technique ID
T1535
Mitigations
0

By using this website, you agree to our legal documents. Please review our Privacy Policy, Terms of Use, and Accessibility Statement in the footer.