Critical Infrastructure Cybersecurity Framework
T1578Defense Evasion2 Mitigations

Modify Cloud Compute Infrastructure

Adversaries may modify cloud compute infrastructure to evade defenses.

Description

Adversaries may modify cloud compute infrastructure to evade defenses.

Available Mitigations

This technique can be mitigated using 2 documented security measures.

AuditUser Account Management

Quick Info

Technique ID
T1578
Sub-Techniques
5
Mitigations
2

By using this website, you agree to our legal documents. Please review our Privacy Policy, Terms of Use, and Accessibility Statement in the footer.