1. Account Discovery. 2. Cloud Infrastructure Discovery. 3. Cloud Service Dashboard. 4. Cloud Service Discovery. 5. Network Service Scanning. 6. Permission Group Discovery. 7. Software Discovery. 8. System Information Discovery. 9. System Location Discovery. 10. System Network Connections Discovery.
Collection of Data in the IaaS by Adversaries
1. Data from Cloud Storage Object. 2. Data Staged.
Exfiltration of Infrastucture-as-a-Service (IaaS)
1. Transfer data to a Cloud Account
Impact of Infrastucture-as-a-Service (IaaS) Hacks
1. Data Destruction. 2. Data Encrypted for Impact. 3. Defacement. 4. Endpoint Denial of Service. 5. Network Denial of Service. 6. Resource Hijacking.