Below are the tactics and techniques representing the MITRE ATT&CK® Matrix for Enterprise covering cloud-based techniques. The Matrix contains information for the SaaS platform.
| Initial Access | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Impact | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| 4 techniques | 2 techniques | 1 techniques | 2 techniques | 6 techniques | 4 techniques | 3 techniques | 2 techniques | 3 techniques | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|
|
|
|
|
|
|
|
| Initial Access | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Impact | ||||||||||||||||||||||||||||||||
| 4 techniques | 2 techniques | 1 techniques | 2 techniques | 6 techniques | 4 techniques | 3 techniques | 2 techniques | 3 techniques | ||||||||||||||||||||||||||||||||
|
|
|
|
|
|
|
|
|