Initial Access: This tactic covers techniques adversaries use to gain initial access to a system, which could be an application or DevOps tool.
Execution: This tactic involves techniques that result in the execution of adversary-controlled code, which could target applications or DevOps environments.
Persistence: Adversaries may try to persist within applications or DevOps environments using various techniques.
Privilege Escalation: Gaining higher privileges within applications or DevOps environments can give adversaries greater control and access.
Defense Evasion: Adversaries may employ techniques to evade defenses within application or DevOps environments, such as disabling security monitoring.
Credential Access: Obtaining credentials, such as API keys or access tokens, is crucial for adversaries targeting applications and DevOps environments.
Discovery: Adversaries may perform reconnaissance activities within applications and DevOps environments to gather information about their target.
Lateral Movement: Moving between different applications, systems, or environments, especially those used in DevOps, allows adversaries to expand their access.
Collection: Gathering sensitive data from applications or DevOps environments, such as source code or customer data, is often a key objective for adversaries.
Command and Control: Establishing and maintaining communication channels with compromised applications or DevOps environments allows adversaries to control them remotely.
Exfiltration: Adversaries may try to steal data from appications or DevOps environments, exfiltrating it to external systems.
Impact: Disrupting or denying access to applications and DevOps environments can significantly impact an organization’s operations and revenue.