Skip to content

Commit c76f4a1

Browse files
committed
Adds updated mitre-attack-coverage-matrices.md file
Signed-off-by: Anthony Mendonca <[email protected]>
1 parent 0f61d56 commit c76f4a1

File tree

1 file changed

+50
-30
lines changed

1 file changed

+50
-30
lines changed
Original file line numberDiff line numberDiff line change
@@ -1,16 +1,50 @@
11

22
<style>
3-
table { width: 100%; border-collapse: collapse; margin: 20px 0; font-size: 16px; }
4-
th, td { border: 1px solid #ddd; padding: 8px; text-align: center; }
5-
.md-sidebar.md-sidebar--secondary { display: none; }
6-
.md-content { min-width: 100%; }
3+
.table-container {
4+
overflow-x: auto; /* Enables horizontal scrolling */
5+
max-width: 80%; /* Ensures it doesn't go beyond the page */
6+
border: 1px solid #ddd;
7+
padding: 10px;
8+
margin-bottom: 20px;
9+
}
10+
table {
11+
width: 100%;
12+
border-collapse: collapse;
13+
margin: 20px 0;
14+
font-size: 16px;
15+
white-space: nowrap; /* Prevents text wrapping in cells */
16+
}
17+
th, td {
18+
border: 1px solid #ddd;
19+
padding: 8px;
20+
text-align: center;
21+
}
22+
.md-sidebar.md-sidebar--secondary { display: none; }
23+
.md-content { min-width: 100%; }
724
</style>
825

926
# MITRE ATT&CK Coverage by Platform
1027

1128
This provides coverage matrices of MITRE ATT&CK tactics and techniques currently covered by Stratus Red Team for different cloud platforms.
12-
<h2>entra-id</h2>
13-
<table>
29+
<h2 style="text-transform: uppercase;">azure</h2>
30+
<div class="table-container"><table>
31+
<thead><tr><th>Execution</th><th>Persistence</th><th>Exfiltration</th></tr></thead>
32+
<tbody>
33+
<tr><td><a href="../Azure/azure.execution.vm-custom-script-extension">Execute Command on Virtual Machine using Custom Script Extension</a></td><td><a href="../Azure/azure.persistence.create-bastion-shareable-link">Create Azure VM Bastion shareable link</a></td><td><a href="../Azure/azure.exfiltration.disk-export">Export Disk Through SAS URL</a></td></tr>
34+
<tr><td><a href="../Azure/azure.execution.vm-run-command">Execute Commands on Virtual Machine using Run Command</a></td><td></td><td></td></tr>
35+
</tbody>
36+
</table>
37+
</div>
38+
<h2 style="text-transform: uppercase;">EKS</h2>
39+
<div class="table-container"><table>
40+
<thead><tr><th>Persistence</th><th>Privilege Escalation</th><th>Lateral Movement</th></tr></thead>
41+
<tbody>
42+
<tr><td><a href="../EKS/eks.persistence.backdoor-aws-auth-configmap">Backdoor aws-auth EKS ConfigMap</a></td><td><a href="../EKS/eks.persistence.backdoor-aws-auth-configmap">Backdoor aws-auth EKS ConfigMap</a></td><td><a href="../EKS/eks.lateral-movement.create-access-entry">Create Admin EKS Access Entry</a></td></tr>
43+
</tbody>
44+
</table>
45+
</div>
46+
<h2 style="text-transform: uppercase;">entra-id</h2>
47+
<div class="table-container"><table>
1448
<thead><tr><th>Persistence</th><th>Privilege Escalation</th></tr></thead>
1549
<tbody>
1650
<tr><td><a href="../Entra ID/entra-id.persistence.backdoor-application-sp">Backdoor Entra ID application through service principal</a></td><td><a href="../Entra ID/entra-id.persistence.backdoor-application-sp">Backdoor Entra ID application through service principal</a></td></tr>
@@ -21,8 +55,9 @@ This provides coverage matrices of MITRE ATT&CK tactics and techniques currently
2155
<tr><td><a href="../Entra ID/entra-id.persistence.restricted-au">Create Sticky Backdoor User Through Restricted Management AU</a></td><td></td></tr>
2256
</tbody>
2357
</table>
24-
<h2>GCP</h2>
25-
<table>
58+
</div>
59+
<h2 style="text-transform: uppercase;">GCP</h2>
60+
<div class="table-container"><table>
2661
<thead><tr><th>Persistence</th><th>Privilege Escalation</th><th>Credential Access</th><th>Exfiltration</th></tr></thead>
2762
<tbody>
2863
<tr><td><a href="../GCP/gcp.persistence.backdoor-service-account-policy">Backdoor a GCP Service Account through its IAM Policy</a></td><td><a href="../GCP/gcp.persistence.create-admin-service-account">Create an Admin GCP Service Account</a></td><td><a href="../GCP/gcp.credential-access.secretmanager-retrieve-secrets">Retrieve a High Number of Secret Manager secrets</a></td><td><a href="../GCP/gcp.exfiltration.share-compute-disk">Exfiltrate Compute Disk by sharing it</a></td></tr>
@@ -31,8 +66,9 @@ This provides coverage matrices of MITRE ATT&CK tactics and techniques currently
3166
<tr><td><a href="../GCP/gcp.persistence.invite-external-user">Invite an External User to a GCP Project</a></td><td></td><td></td><td></td></tr>
3267
</tbody>
3368
</table>
34-
<h2>kubernetes</h2>
35-
<table>
69+
</div>
70+
<h2 style="text-transform: uppercase;">kubernetes</h2>
71+
<div class="table-container"><table>
3672
<thead><tr><th>Persistence</th><th>Privilege Escalation</th><th>Credential Access</th></tr></thead>
3773
<tbody>
3874
<tr><td><a href="../Kubernetes/k8s.persistence.create-admin-clusterrole">Create Admin ClusterRole</a></td><td><a href="../Kubernetes/k8s.persistence.create-admin-clusterrole">Create Admin ClusterRole</a></td><td><a href="../Kubernetes/k8s.credential-access.dump-secrets">Dump All Secrets</a></td></tr>
@@ -41,8 +77,9 @@ This provides coverage matrices of MITRE ATT&CK tactics and techniques currently
4177
<tr><td></td><td><a href="../Kubernetes/k8s.privilege-escalation.privileged-pod">Run a Privileged Pod</a></td><td></td></tr>
4278
</tbody>
4379
</table>
44-
<h2>AWS</h2>
45-
<table>
80+
</div>
81+
<h2 style="text-transform: uppercase;">AWS</h2>
82+
<div class="table-container"><table>
4683
<thead><tr><th>Initial Access</th><th>Execution</th><th>Persistence</th><th>Privilege Escalation</th><th>Defense Evasion</th><th>Credential Access</th><th>Discovery</th><th>Lateral Movement</th><th>Exfiltration</th><th>Impact</th></tr></thead>
4784
<tbody>
4885
<tr><td><a href="../AWS/aws.initial-access.console-login-without-mfa">Console Login without MFA</a></td><td><a href="../AWS/aws.execution.ec2-launch-unusual-instances">Launch Unusual EC2 instances</a></td><td><a href="../AWS/aws.persistence.iam-backdoor-role">Backdoor an IAM Role</a></td><td><a href="../AWS/aws.execution.ec2-user-data">Execute Commands on EC2 Instance via User Data</a></td><td><a href="../AWS/aws.defense-evasion.cloudtrail-delete">Delete CloudTrail Trail</a></td><td><a href="../AWS/aws.credential-access.ec2-get-password-data">Retrieve EC2 Password Data</a></td><td><a href="../AWS/aws.discovery.ec2-enumerate-from-instance">Execute Discovery Commands on an EC2 Instance</a></td><td><a href="../AWS/aws.lateral-movement.ec2-serial-console-send-ssh-public-key">Usage of EC2 Serial Console to push SSH public key</a></td><td><a href="../AWS/aws.exfiltration.ec2-security-group-open-port-22-ingress">Open Ingress Port 22 on a Security Group</a></td><td><a href="../AWS/aws.impact.bedrock-invoke-model">Invoke Bedrock Model</a></td></tr>
@@ -57,21 +94,4 @@ This provides coverage matrices of MITRE ATT&CK tactics and techniques currently
5794
<tr><td></td><td></td><td><a href="../AWS/aws.persistence.sts-federation-token">Generate temporary AWS credentials using GetFederationToken</a></td><td></td><td></td><td></td><td></td><td></td><td></td><td></td></tr>
5895
</tbody>
5996
</table>
60-
<h2>azure</h2>
61-
<table>
62-
<thead><tr><th>Execution</th><th>Persistence</th><th>Exfiltration</th></tr></thead>
63-
<tbody>
64-
<tr><td><a href="../Azure/azure.execution.vm-custom-script-extension">Execute Command on Virtual Machine using Custom Script Extension</a></td><td><a href="../Azure/azure.persistence.create-bastion-shareable-link">Create Azure VM Bastion shareable link</a></td><td><a href="../Azure/azure.exfiltration.disk-export">Export Disk Through SAS URL</a></td></tr>
65-
<tr><td><a href="../Azure/azure.execution.vm-run-command">Execute Commands on Virtual Machine using Run Command</a></td><td></td><td></td></tr>
66-
</tbody>
67-
</table>
68-
<h2>EKS</h2>
69-
<table>
70-
<thead><tr><th>Persistence</th><th>Privilege Escalation</th><th>Lateral Movement</th></tr></thead>
71-
<tbody>
72-
<tr><td><a href="../EKS/eks.persistence.backdoor-aws-auth-configmap">Backdoor aws-auth EKS ConfigMap</a></td><td><a href="../EKS/eks.persistence.backdoor-aws-auth-configmap">Backdoor aws-auth EKS ConfigMap</a></td><td><a href="../EKS/eks.lateral-movement.create-access-entry">Create Admin EKS Access Entry</a></td></tr>
73-
</tbody>
74-
</table>
75-
76-
</body>
77-
</html>
97+
</div>

0 commit comments

Comments
 (0)