Below are the tactics and techniques representing the MITRE ATT&CK® Matrix for Enterprise covering techniques against container technologies. The Matrix contains information for the Containers platform.
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Impact | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
3 techniques | 4 techniques | 4 techniques | 4 techniques | 7 techniques | 3 techniques | 3 techniques | 1 techniques | 3 techniques | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|
|
|
|
|
|
|
|
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Impact | ||||||||||||||||||||||||||||
3 techniques | 4 techniques | 4 techniques | 4 techniques | 7 techniques | 3 techniques | 3 techniques | 1 techniques | 3 techniques | ||||||||||||||||||||||||||||
|
|
|
|
|
|
|