Esc
Cloud Service Dashboard - T1538
(ATT&CK® Technique)
Definition
An adversary may use a cloud service dashboard GUI with stolen credentials to gain useful information from an operational cloud environment, such as specific services, resources, and features. For example, the GCP Command Center can be used to view all assets, findings of potential security risks, and to run additional queries, such as finding public IP addresses and open ports.
D3FEND Inferred Relationships
Browse the D3FEND knowledge graph by clicking on the nodes below.