Build Image on Host
Adversaries may build a container image directly on a host to bypass defenses that monitor for the retrieval of malicious images from a public registry.
Description
Adversaries may build a container image directly on a host to bypass defenses that monitor for the retrieval of malicious images from a public registry.
Available Mitigations
This technique can be mitigated using 2 documented security measures.
Limit Access to Resource Over NetworkNetwork Segmentation
Quick Info
- Technique ID
- T1612
- Tactic
- Impact
- Mitigations
- 2
