Enterprise Matrix

Below are the tactics and techniques representing the Venafi Machine Identity Threat Model, based on MITRE’s ATT&CK matrix for Enterprise. The Matrix contains information for the following platforms: Windows, macOS, Linux, PRE, AWS, GCP, Azure, Azure AD, Office 365, SaaS, Network.

Reconnaissance Resource Development Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Collection Command and Control Impact
1 techniques 3 techniques 5 techniques 1 techniques 4 techniques 1 techniques 4 techniques 6 techniques 3 techniques 3 techniques 2 techniques 2 techniques 4 techniques
Reconnaissance Resource Development Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Collection Command and Control Impact
1 techniques 3 techniques 5 techniques 1 techniques 4 techniques 1 techniques 4 techniques 6 techniques 3 techniques 3 techniques 2 techniques 2 techniques 4 techniques