Critical Infrastructure Cybersecurity Framework
T1580Discovery1 Mitigations

Cloud Infrastructure Discovery

An adversary may attempt to discover infrastructure and resources that are available within an infrastructure-as-a-service environment.

Description

An adversary may attempt to discover infrastructure and resources that are available within an infrastructure-as-a-service environment.

Available Mitigations

This technique can be mitigated using 1 documented security measures.

User Account Management

Quick Info

Technique ID
T1580
Tactic
Discovery
Mitigations
1

By using this website, you agree to our legal documents. Please review our Privacy Policy, Terms of Use, and Accessibility Statement in the footer.