Threats Library
Reusable threat definitions (causes on the left side of bow-tie diagrams).
Add Threat
Tags:
clear tags
5 threats — page 1 of 1
| Name | Category | Tags | Description | |
|---|---|---|---|---|
| Valid Accounts | Defense Evasion | Adversaries may obtain and abuse credentials of existing accounts as a means of gaining Initial Acce… | Edit | |
| Valid Accounts: Cloud Accounts | Defense Evasion | Valid accounts in cloud environments may allow adversaries to perform actions to achieve Initial Acc… | Edit | |
| Valid Accounts: Default Accounts | Defense Evasion | Adversaries may obtain and abuse credentials of a default account as a means of gaining Initial Acce… | Edit | |
| Valid Accounts: Domain Accounts | Defense Evasion | Adversaries may obtain and abuse credentials of a domain account as a means of gaining Initial Acces… | Edit | |
| Valid Accounts: Local Accounts | Defense Evasion | Adversaries may obtain and abuse credentials of a local account as a means of gaining Initial Access… | Edit |