Esc
Data Inventory
Definition
Data inventorying identifies and records the schemas, formats, volumes, and locations of data stored and used on the organization's architecture.
Synonyms: Data Discovery, Data Inventorying.Artifact Relationships:
This defensive technique is related to specific artifacts. Click the artifact node for more information.
Related ATT&CK Techniques:
These mappings are inferred, experimental, and will improve as the
knowledge graph grows.
These offensive techniques are determined related because of the way this defensive technique,, , and .
Lateral Movement
Internal Spearphishing
Privilege Escalation
Event Triggered Execution
Abuse Elevation Control Mechanism
Create or Modify System Process
Collection
Data from Information Repositories
Email Collection
Discovery
System Location Discovery
System Owner/User Discovery
Query Registry
Persistence
Event Triggered Execution
Create or Modify System Process
Office Application Startup
Modify Registry
Credential Access
Credentials from Password Stores
OS Credential Dumping
Unsecured Credentials
Defense Evasion
Abuse Elevation Control Mechanism
System Binary Proxy Execution
Hide Artifacts
Rogue Domain Controller
Modify Registry
References
All
Patent
The following references were used to develop the Data Inventory knowledge-base article.
(Note: the consideration of references does not imply specific functionality exists in an offering.)
Data processing and scanning systems for generating and populating a data inventory
Reference Type: Patent Organization: OneTrust LLC Author: Kabir A. Barday, Mihir S. Karanjkar, Steven W. Finch, Ken A. Browne, Nathan W. Heard, Aakash H. Patel, Jason L. Sabourin, Richard L. Daniel, Dylan D. Patton-Kuhl, Jonathan Blake Brannon