macOS Matrix

Below are the tactics and techniques representing the Venafi Machine Identity Threat Model, based on MITRE’s ATT&CK matrix for Enterprise. The Matrix contains information for the macOS platform.

Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Collection Command and Control Impact
4 techniques 1 techniques 3 techniques 1 techniques 4 techniques 6 techniques 3 techniques 3 techniques 2 techniques 2 techniques 4 techniques
Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Collection Command and Control Impact
4 techniques 1 techniques 3 techniques 1 techniques 4 techniques 6 techniques 3 techniques 3 techniques 2 techniques 2 techniques 4 techniques