Critical Infrastructure Cybersecurity Framework
T1537Exfiltration1 Mitigations

Transfer Data to Cloud Account

Adversaries may exfiltrate data by transferring the data, including backups of cloud environments, to another cloud account they control.

Description

Adversaries may exfiltrate data by transferring the data, including backups of cloud environments, to another cloud account they control.

Available Mitigations

This technique can be mitigated using 1 documented security measures.

Password Policies

Quick Info

Technique ID
T1537
Mitigations
1

By using this website, you agree to our legal documents. Please review our Privacy Policy, Terms of Use, and Accessibility Statement in the footer.