Below are the tactics and techniques representing the MITRE ATT&CK® Containers platform. The techniques below are known to target containers and container orchestration systems such as Kubernetes. The Matrix contains information for the Containers platform.
| Initial Access | Execution | Persistence | Privilege Escalation | Stealth | Defense Impairment | Credential Access | Discovery | Lateral Movement | Impact | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| 3 techniques | 5 techniques | 7 techniques | 6 techniques | 4 techniques | 1 techniques | 3 techniques | 3 techniques | 1 techniques | 5 techniques | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|
|
|
|
|
|
|
|
|
| Initial Access | Execution | Persistence | Privilege Escalation | Stealth | Defense Impairment | Credential Access | Discovery | Lateral Movement | Impact | ||||||||||||||||||||||||||||||||||||||
| 3 techniques | 5 techniques | 7 techniques | 6 techniques | 4 techniques | 1 techniques | 3 techniques | 3 techniques | 1 techniques | 5 techniques | ||||||||||||||||||||||||||||||||||||||
|
|
|
|
|
|
|
|