Skip to content

MITRE ATT&CK Coverage by Platform

This provides coverage matrices of MITRE ATT&CK tactics and techniques currently covered by Stratus Red Team for different cloud platforms.

AWS

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementExfiltrationImpact
Console Login without MFALaunch Unusual EC2 instancesBackdoor an IAM RoleExecute Commands on EC2 Instance via User DataDelete CloudTrail TrailRetrieve EC2 Password DataExecute Discovery Commands on an EC2 InstanceUsage of EC2 Serial Console to push SSH public keyOpen Ingress Port 22 on a Security GroupInvoke Bedrock Model
Execute Commands on EC2 Instance via User DataCreate an Access Key on an IAM UserExecute Commands on SageMaker Notebook Instance via Lifecycle ConfigurationDisable CloudTrail Logging Through Event SelectorsSteal EC2 Instance CredentialsDownload EC2 Instance User DataUsage of EC2 Instance Connect on multiple instancesExfiltrate an AMI by Sharing ItS3 Ransomware through batch file deletion
Execute Commands on SageMaker Notebook Instance via Lifecycle ConfigurationCreate an administrative IAM UserCreate an Access Key on an IAM UserCloudTrail Logs Impairment Through S3 Lifecycle RuleRetrieve a High Number of Secrets Manager secrets (Batch)Enumerate SESExfiltrate EBS Snapshot by Sharing ItS3 Ransomware through client-side encryption
Usage of ssm:SendCommand on multiple instancesCreate a backdoored IAM RoleCreate an administrative IAM UserStop CloudTrail TrailRetrieve a High Number of Secrets Manager secretsExfiltrate RDS Snapshot by SharingS3 Ransomware through individual file deletion
Usage of ssm:StartSession on multiple instancesCreate a Login Profile on an IAM UserCreate a Login Profile on an IAM UserDelete DNS query logsRetrieve And Decrypt SSM ParametersBackdoor an S3 Bucket via its Bucket Policy
Backdoor Lambda Function Through Resource-Based PolicyAdd a Malicious Lambda ExtensionAttempt to Leave the AWS Organization
Add a Malicious Lambda ExtensionCreate an IAM Roles Anywhere trust anchorRemove VPC Flow Logs
Overwrite Lambda Function CodeChange IAM user password
Create an IAM Roles Anywhere trust anchor
Generate temporary AWS credentials using GetFederationToken

Azure

GCP

Kubernetes

Entra ID

EKS