Threats Library

Reusable threat definitions (causes on the left side of bow-tie diagrams).

Add Threat

Tags: clear tags
Clear all
6 threats — page 1 of 1
Name Category Tags Description
Modify Cloud Compute Infrastructure Defense Evasion An adversary may attempt to modify a cloud account's compute service infrastructure to evade defense… Edit
Modify Cloud Compute Infrastructure: Create Cloud Instance Defense Evasion An adversary may create a new instance or virtual machine (VM) within the compute service of a cloud… Edit
Modify Cloud Compute Infrastructure: Create Snapshot Defense Evasion An adversary may create a snapshot or data backup within a cloud account to evade defenses. A snapsh… Edit
Modify Cloud Compute Infrastructure: Delete Cloud Instance Defense Evasion An adversary may delete a cloud instance after they have performed malicious activities in an attemp… Edit
Modify Cloud Compute Infrastructure: Modify Cloud Compute Configurations Defense Evasion Adversaries may modify settings that directly affect the size, locations, and resources available to… Edit
Modify Cloud Compute Infrastructure: Revert Cloud Instance Defense Evasion An adversary may revert changes made to a cloud instance after they have performed malicious activit… Edit