Skip to content

MITRE ATT&CK Coverage by Platform

This provides coverage matrices of MITRE ATT&CK tactics and techniques currently covered by Stratus Red Team for different cloud platforms.

AWS

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementExfiltrationImpact
Console Login without MFALaunch Unusual EC2 instancesBackdoor an IAM RoleExecute Commands on EC2 Instance via User DataDelete CloudTrail TrailRetrieve EC2 Password DataExecute Discovery Commands on an EC2 InstanceUsage of EC2 Serial Console to push SSH public keyOpen Ingress Port 22 on a Security GroupInvoke Bedrock Model
Execute Commands on EC2 Instance via User DataCreate an Access Key on an IAM UserCreate an Access Key on an IAM UserDisable CloudTrail Logging Through Event SelectorsSteal EC2 Instance CredentialsDownload EC2 Instance User DataUsage of EC2 Instance Connect on multiple instancesExfiltrate an AMI by Sharing ItS3 Ransomware through batch file deletion
Usage of ssm:SendCommand on multiple instancesCreate an administrative IAM UserCreate an administrative IAM UserCloudTrail Logs Impairment Through S3 Lifecycle RuleRetrieve a High Number of Secrets Manager secrets (Batch)Enumerate SESExfiltrate EBS Snapshot by Sharing ItS3 Ransomware through client-side encryption
Usage of ssm:StartSession on multiple instancesCreate a backdoored IAM RoleCreate a Login Profile on an IAM UserStop CloudTrail TrailRetrieve a High Number of Secrets Manager secretsExfiltrate RDS Snapshot by SharingS3 Ransomware through individual file deletion
Create a Login Profile on an IAM UserAdd a Malicious Lambda ExtensionDelete DNS query logsRetrieve And Decrypt SSM ParametersBackdoor an S3 Bucket via its Bucket Policy
Backdoor Lambda Function Through Resource-Based PolicyCreate an IAM Roles Anywhere trust anchorAttempt to Leave the AWS Organization
Add a Malicious Lambda ExtensionChange IAM user passwordRemove VPC Flow Logs
Overwrite Lambda Function Code
Create an IAM Roles Anywhere trust anchor
Generate temporary AWS credentials using GetFederationToken

Azure

GCP

Kubernetes

Entra ID

EKS