Threats Library

Reusable threat definitions (causes on the left side of bow-tie diagrams).

Add Threat

Tags: clear tags
Clear all
8 threats — page 1 of 1
Name Category Tags Description
Account Manipulation Persistence Adversaries may manipulate accounts to maintain and/or elevate access to victim systems. Account man… Edit
Account Manipulation: Additional Cloud Credentials Persistence Adversaries may add adversary-controlled credentials to a cloud account to maintain persistent acces… Edit
Account Manipulation: Additional Cloud Roles Persistence An adversary may add additional roles or permissions to an adversary-controlled cloud account to mai… Edit
Account Manipulation: Additional Container Cluster Roles Persistence An adversary may add additional roles or permissions to an adversary-controlled user or service acco… Edit
Account Manipulation: Additional Email Delegate Permissions Persistence Adversaries may grant additional permission levels to maintain persistent access to an adversary-con… Edit
Account Manipulation: Additional Local or Domain Groups Persistence An adversary may add additional local or domain groups to an adversary-controlled account to maintai… Edit
Account Manipulation: Device Registration Persistence Adversaries may register a device to an adversary-controlled account. Devices may be registered in a… Edit
Account Manipulation: SSH Authorized Keys Persistence Adversaries may modify the SSH authorized_keys file to maintain persistence on a victim host. Linux … Edit