Critical Infrastructure Cybersecurity Framework
T1612Impact2 Mitigations

Build Image on Host

Adversaries may build a container image directly on a host to bypass defenses that monitor for the retrieval of malicious images from a public registry.

Description

Adversaries may build a container image directly on a host to bypass defenses that monitor for the retrieval of malicious images from a public registry.

Available Mitigations

This technique can be mitigated using 2 documented security measures.

Limit Access to Resource Over NetworkNetwork Segmentation

Quick Info

Technique ID
T1612
Tactic
Impact
Mitigations
2

By using this website, you agree to our legal documents. Please review our Privacy Policy, Terms of Use, and Accessibility Statement in the footer.