Esc
Asset Inventory
Definition
Asset inventorying identifies and records the organization's assets and enriches each inventory item with knowledge about their vulnerabilities.
Synonyms: Asset Discovery, Asset Inventorying.Artifact Relationships:
This defensive technique is related to specific artifacts. Click the artifact node for more information.
Technique Subclasses
There are 8 techniques in this category, Asset Inventory.
| Name | ID | Definition | Synonyms |
|---|---|---|---|
| Asset Inventory | D3-AI | Asset inventorying identifies and records the organization's assets and enriches each inventory item with knowledge about their vulnerabilities. | Asset Discovery , and Asset Inventorying |
| - Software Inventory | D3-SWI | Software inventorying identifies and records the software items in the organization's architecture. | Software Discovery , and Software Inventorying |
| - Container Image Analysis | D3-CIA | Analyzing a Container Image with respect to a set of policies. | Container Image Scanning |
| - Asset Vulnerability Enumeration | D3-AVE | Asset vulnerability enumeration enriches inventory items with knowledge identifying their vulnerabilities. | |
| - Configuration Inventory | D3-CI | Configuration inventory identifies and records the configuration of software and hardware and their components throughout the organization. | |
| - Network Node Inventory | D3-NNI | Network node inventorying identifies and records all the network nodes (hosts, routers, switches, firewalls, etc.) in the organization's architecture. | System Inventorying , and System Discovery |
| - Data Inventory | D3-DI | Data inventorying identifies and records the schemas, formats, volumes, and locations of data stored and used on the organization's architecture. | Data Discovery , and Data Inventorying |
| - Hardware Component Inventory | D3-HCI | Hardware component inventorying identifies and records the hardware items in the organization's architecture. | Hardware Component Inventorying , and Hardware Component Discovery |
Related ATT&CK Techniques:
These mappings are inferred, experimental, and will improve as the
knowledge graph grows.
These offensive techniques are determined related because of the way this defensive technique,, , , and .
Lateral Movement
Software Deployment Tools
Internal Spearphishing
Replication Through Removable Media
Privilege Escalation
Abuse Elevation Control Mechanism
Event Triggered Execution
Boot or Logon Autostart Execution
Access Token Manipulation
Create or Modify System Process
Boot or Logon Initialization Scripts
Hijack Execution Flow
Domain or Tenant Policy Modification
Command And Control
Communication Through Removable Media
Impact
Inhibit System Recovery
Collection
Audio Capture
Video Capture
Data from Information Repositories
Data from Removable Media
Input Capture
Email Collection
Discovery
Cloud Service Dashboard
System Location Discovery
Software Discovery
System Owner/User Discovery
Cloud Service Discovery
Query Registry
Cloud Storage Object Discovery
Group Policy Discovery
Virtualization/Sandbox Evasion
Persistence
Office Application Startup
Implant Internal Image
Event Triggered Execution
Boot or Logon Autostart Execution
Create or Modify System Process
Server Software Component
Boot or Logon Initialization Scripts
Modify Authentication Process
Hijack Execution Flow
Pre-OS Boot
Software Extensions
Compromise Host Software Binary
Modify Registry
Initial Access
Phishing
Supply Chain Compromise
Replication Through Removable Media
Hardware Additions
Execution
Software Deployment Tools
Credential Access
Exploitation for Credential Access
Credentials from Password Stores
Modify Authentication Process
OS Credential Dumping
Unsecured Credentials
Multi-Factor Authentication Interception
Input Capture
Steal or Forge Authentication Certificates
Defense Evasion
Abuse Elevation Control Mechanism
System Binary Proxy Execution
Impair Defenses
Access Token Manipulation
Hide Artifacts
Trusted Developer Utilities Proxy Execution
Modify Authentication Process
Modify Cloud Compute Infrastructure
Rogue Domain Controller
Hijack Execution Flow
Rootkit
Pre-OS Boot
Modify Cloud Resource Hierarchy
File and Directory Permissions Modification
Subvert Trust Controls
Domain or Tenant Policy Modification
Modify Registry
Virtualization/Sandbox Evasion