Threats Library
Reusable threat definitions (causes on the left side of bow-tie diagrams).
Add Threat
Tags:
clear tags
6 threats — page 1 of 1
| Name | Category | Tags | Description | |
|---|---|---|---|---|
| Modify Cloud Compute Infrastructure | Defense Evasion | An adversary may attempt to modify a cloud account's compute service infrastructure to evade defense… | Edit | |
| Modify Cloud Compute Infrastructure: Create Cloud Instance | Defense Evasion | An adversary may create a new instance or virtual machine (VM) within the compute service of a cloud… | Edit | |
| Modify Cloud Compute Infrastructure: Create Snapshot | Defense Evasion | An adversary may create a snapshot or data backup within a cloud account to evade defenses. A snapsh… | Edit | |
| Modify Cloud Compute Infrastructure: Delete Cloud Instance | Defense Evasion | An adversary may delete a cloud instance after they have performed malicious activities in an attemp… | Edit | |
| Modify Cloud Compute Infrastructure: Modify Cloud Compute Configurations | Defense Evasion | Adversaries may modify settings that directly affect the size, locations, and resources available to… | Edit | |
| Modify Cloud Compute Infrastructure: Revert Cloud Instance | Defense Evasion | An adversary may revert changes made to a cloud instance after they have performed malicious activit… | Edit |