THREATS, TACTICS AND PROCEDURES TTP
MITRE’S ATT&CK®
IaaS Pen Test
Discovery of IaaS by Adversaries
1. Account Discovery.
2. Cloud Infrastructure Discovery.
3. Cloud Service Dashboard.
4. Cloud Service Discovery.
5. Network Service Scanning.
6. Permission Group Discovery.
7. Software Discovery.
8. System Information Discovery.
9. System Location Discovery.
10. System Network Connections Discovery.
2. Cloud Infrastructure Discovery.
3. Cloud Service Dashboard.
4. Cloud Service Discovery.
5. Network Service Scanning.
6. Permission Group Discovery.
7. Software Discovery.
8. System Information Discovery.
9. System Location Discovery.
10. System Network Connections Discovery.