@@ -7,20 +7,20 @@ threats:
77 unintended data exposure or unauthorized actions being performed within
88 the system.
99 features :
10- - CCC.F06 # Identity Based Access Control
11- mitre_technique :
12- - T1078 # Valid Accounts
13- - T1548 # Abuse Elevation Control Mechanism
14- - T1203 # Exploitation for Credential Access
15- - T1098 # Account Manipulation
16- - T1484 # Domain or Tenant Policy Modification
17- - T1546 # Event Triggered Execution
18- - T1537 # Transfer Data to Cloud Account
19- - T1567 # Exfiltration Over Web Services
20- - T1048 # Exfiltration Over Alternative Protocol
21- - T1485 # Data Destruction
22- - T1565 # Data Manipulation
23- - T1027 # Obfuscated Files or Information
10+ - CCC.F06 # Identity Based Access Control
11+ mitre_technique :
12+ - T1078 # Valid Accounts
13+ - T1548 # Abuse Elevation Control Mechanism
14+ - T1203 # Exploitation for Credential Access
15+ - T1098 # Account Manipulation
16+ - T1484 # Domain or Tenant Policy Modification
17+ - T1546 # Event Triggered Execution
18+ - T1537 # Transfer Data to Cloud Account
19+ - T1567 # Exfiltration Over Web Services
20+ - T1048 # Exfiltration Over Alternative Protocol
21+ - T1485 # Data Destruction
22+ - T1565 # Data Manipulation
23+ - T1027 # Obfuscated Files or Information
2424
2525 - id : CCC.TH02
2626 title : Data is Intercepted in Transit
@@ -30,10 +30,10 @@ threats:
3030 properly implemented. This could result in unauthorized access to
3131 sensitive information or unintended data alterations.
3232 features :
33- - CCC.F01 # Encryption in Transit Enabled by Default
33+ - CCC.F01 # Encryption in Transit Enabled by Default
3434 mitre_technique :
35- - T1557 # Adversary-in-the-Middle
36- - T1040 # Network Sniffing
35+ - T1557 # Adversary-in-the-Middle
36+ - T1040 # Network Sniffing
3737
3838 - id : CCC.TH03
3939 title : Deployment Region Network is Untrusted
@@ -44,13 +44,13 @@ threats:
4444 vulnerabilities. This could result in unintended data disclosure or
4545 compromised system integrity.
4646 features :
47- - CCC.F08 # Multi-zone Deployment
47+ - CCC.F08 # Multi-zone Deployment
4848 mitre_technique :
49- - T1040 # Network Sniffing
50- - T1110 # Brute Force
51- - T1105 # Ingress Tool Transfer
52- - T1583 # Acquire Infrastructure
53- - T1557 # Adversary-in-the-Middle
49+ - T1040 # Network Sniffing
50+ - T1110 # Brute Force
51+ - T1105 # Ingress Tool Transfer
52+ - T1583 # Acquire Infrastructure
53+ - T1557 # Adversary-in-the-Middle
5454
5555 - id : CCC.TH04
5656 title : Data is Replicated to Untrusted or External Locations
@@ -60,9 +60,9 @@ threats:
6060 in unintended data leakage or exposure outside the organization's trusted
6161 perimeter.
6262 features :
63- - CCC.F21 # Replication
63+ - CCC.F21 # Replication
6464 mitre_technique :
65- - T1565 # Data Manipulation
65+ - T1565 # Data Manipulation
6666
6767 - id : CCC.TH05
6868 title : Data is Corrupted During Replication
@@ -73,14 +73,14 @@ threats:
7373 and availability, potentially affecting recovery processes and system
7474 reliability.
7575 features :
76- - CCC.F08 # Multi-zone Deployment
77- - CCC.F12 # Recovery
78- - CCC.F21 # Replication
76+ - CCC.F08 # Multi-zone Deployment
77+ - CCC.F12 # Recovery
78+ - CCC.F21 # Replication
7979 mitre_technique :
80- - T1485 # Data Destruction
81- - T1565 # Data Manipulation
82- - T1491 # Defacement
83- - T1490 # Inhibit System Recovery
80+ - T1485 # Data Destruction
81+ - T1565 # Data Manipulation
82+ - T1491 # Defacement
83+ - T1490 # Inhibit System Recovery
8484
8585 - id : CCC.TH06
8686 title : Data is Lost or Corrupted
@@ -89,13 +89,13 @@ threats:
8989 misconfiguration. This can result in the loss of critical data, service
9090 disruption, or unintended exposure of sensitive information.
9191 features :
92- - CCC.F11 # Backup
93- - CCC.F18 # Versioning
92+ - CCC.F11 # Backup
93+ - CCC.F18 # Versioning
9494 mitre_technique :
95- - T1485 # Data Destruction
96- - T1565 # Data Manipulation
97- - T1491 # Defacement
98- - T1490 # Inhibit System Recovery
95+ - T1485 # Data Destruction
96+ - T1565 # Data Manipulation
97+ - T1491 # Defacement
98+ - T1490 # Inhibit System Recovery
9999
100100 - id : CCC.TH07
101101 title : Logs are Tampered With or Deleted
@@ -105,12 +105,12 @@ threats:
105105 incidents, disrupt forensic investigations, and affect the accuracy of
106106 audit trails.
107107 features :
108- - CCC.F03 # Access/Activity Logs
109- - CCC.F10 # Logging
108+ - CCC.F03 # Access/Activity Logs
109+ - CCC.F10 # Logging
110110 mitre_technique :
111- - T1070 # Indicator Removal on Host
112- - T1565 # Data Manipulation (for altering log entries)
113- - T1027 # Obfuscated Files or Information
111+ - T1070 # Indicator Removal on Host
112+ - T1565 # Data Manipulation (for altering log entries)
113+ - T1027 # Obfuscated Files or Information
114114
115115 - id : CCC.TH08
116116 title : Cost Management Data is Manipulated
@@ -120,10 +120,10 @@ threats:
120120 reporting, budget exhaustion, financial losses, and hinder incident
121121 detection.
122122 features :
123- - CCC.F15 # Cost Management
123+ - CCC.F15 # Cost Management
124124 mitre_technique :
125- - T1565 # Data Manipulation
126- - T1070 # Indicator Removal on Host
125+ - T1565 # Data Manipulation
126+ - T1070 # Indicator Removal on Host
127127
128128 - id : CCC.TH09
129129 title : Logs or Monitoring Data are Read by Unauthorized Users
@@ -134,22 +134,22 @@ threats:
134134 enable the planning of attacks, or hinder the detection of ongoing
135135 incidents.
136136 features :
137- - CCC.F03 # Access/Activity Logs
138- - CCC.F09 # Monitoring
139- mitre_technique :
140- - T1003 # Credential Dumping
141- - T1007 # System Service Discovery
142- - T1018 # Remote System Discovery
143- - T1033 # System Owner/User Discovery
144- - T1046 # Network Service Discovery
145- - T1057 # Process Discovery
146- - T1069 # Permission Groups Discovery
147- - T1070 # Indicator Removal
148- - T1082 # System Information Discovery
149- - T1120 # Peripheral Device Discovery
150- - T1124 # System Time Discovery
151- - T1497 # Virtualization/Sandbox Evasion
152- - T1518 # Software Discovery
137+ - CCC.F03 # Access/Activity Logs
138+ - CCC.F09 # Monitoring
139+ mitre_technique :
140+ - T1003 # Credential Dumping
141+ - T1007 # System Service Discovery
142+ - T1018 # Remote System Discovery
143+ - T1033 # System Owner/User Discovery
144+ - T1046 # Network Service Discovery
145+ - T1057 # Process Discovery
146+ - T1069 # Permission Groups Discovery
147+ - T1070 # Indicator Removal
148+ - T1082 # System Information Discovery
149+ - T1120 # Peripheral Device Discovery
150+ - T1124 # System Time Discovery
151+ - T1497 # Virtualization/Sandbox Evasion
152+ - T1518 # Software Discovery
153153
154154 - id : CCC.TH10
155155 title : Alerts are Intercepted
@@ -159,14 +159,14 @@ threats:
159159 information about sensitive operations or access patterns, potentially
160160 impacting system security and integrity.
161161 features :
162- - CCC.F03 # Access/Activity Logs
163- - CCC.F07 # Event Notifications
164- - CCC.F09 # Monitoring
165- - CCC.F17 # Alerting
162+ - CCC.F03 # Access/Activity Logs
163+ - CCC.F07 # Event Notifications
164+ - CCC.F09 # Monitoring
165+ - CCC.F17 # Alerting
166166 mitre_technique :
167- - T1057 # Process Discovery
168- - T1049 # System Network Connections Discovery
169- - T1083 # File and Directory Discovery
167+ - T1057 # Process Discovery
168+ - T1049 # System Network Connections Discovery
169+ - T1083 # File and Directory Discovery
170170
171171 - id : CCC.TH11
172172 title : Event Notifications are Incorrectly Triggered
@@ -176,12 +176,12 @@ threats:
176176 triggered unintentionally, obfuscate other issues, or overwhelm the
177177 system, potentially disrupting legitimate operations.
178178 features :
179- - CCC.F07 # Event Notifications
180- - CCC.F17 # Alerting
179+ - CCC.F07 # Event Notifications
180+ - CCC.F17 # Alerting
181181 mitre_technique :
182- - T1205 # Traffic Signaling
183- - T1001.001 # Data Obfuscation: Junk Data
184- - T1491.001 # Defacement: Internal Defacement
182+ - T1205 # Traffic Signaling
183+ - T1001.001 # Data Obfuscation: Junk Data
184+ - T1491.001 # Defacement: Internal Defacement
185185
186186 - id : CCC.TH12
187187 title : Resource Constraints are Exhausted
@@ -192,13 +192,13 @@ threats:
192192 systems within the same scope. Exhaustion may occur through repeated
193193 requests, resource-intensive operations, or lowering rate/budget limits.
194194 features :
195- - CCC.F04 # Transaction Rate Limits
196- - CCC.F16 # Budgeting
197- - CCC.F19 # Auto-scaling
195+ - CCC.F04 # Transaction Rate Limits
196+ - CCC.F16 # Budgeting
197+ - CCC.F19 # Auto-scaling
198198 mitre_technique :
199- - T1496 # Resource Hijacking
200- - T1499 # Endpoint Denial of Service
201- - T1498 # Network Denial of Service
199+ - T1496 # Resource Hijacking
200+ - T1499 # Endpoint Denial of Service
201+ - T1498 # Network Denial of Service
202202
203203 - id : CCC.TH13
204204 title : Resource Tags are Manipulated
@@ -208,9 +208,9 @@ threats:
208208 This could result in mismanaged resources, financial misuse, or security
209209 vulnerabilities.
210210 features :
211- - CCC.F20 # Tagging
211+ - CCC.F20 # Tagging
212212 mitre_technique :
213- - T1565 # Data Manipulation
213+ - T1565 # Data Manipulation
214214
215215 - id : CCC.TH14
216216 title : Older Resource Versions are Exploited
@@ -220,17 +220,17 @@ threats:
220220 outdated versions could lead to security measures bypass, potentially
221221 leading to security risks or operational disruptions.
222222 features :
223- - CCC.F18 # Versioning
224- mitre_technique :
225- - T1027 # Obfuscated Files or Information
226- - T1485 # Data Destruction
227- - T1565 # Data Manipulation
228- - T1489 # Service Stop
229- - T1562.01 # Impair Defenses: Downgrade Attack
230- - T1027 # Obfuscated Files or Information
231- - T1485 # Data Destruction
232- - T1565 # Data Manipulation
233- - T1489 # Service Stop
223+ - CCC.F18 # Versioning
224+ mitre_technique :
225+ - T1027 # Obfuscated Files or Information
226+ - T1485 # Data Destruction
227+ - T1565 # Data Manipulation
228+ - T1489 # Service Stop
229+ - T1562.01 # Impair Defenses: Downgrade Attack
230+ - T1027 # Obfuscated Files or Information
231+ - T1485 # Data Destruction
232+ - T1565 # Data Manipulation
233+ - T1489 # Service Stop
234234
235235 - id : CCC.TH15
236236 title : Automated Enumeration and Reconnaissance by Non-human Entities
@@ -241,6 +241,19 @@ threats:
241241 unsecured resources, which might result in unauthorized access or data
242242 exposure.
243243 features :
244- - CCC.F14 # API Access
244+ - CCC.F14 # API Access
245+ mitre_technique :
246+ - T1580 # Cloud Infrastructure Discovery
247+
248+ - id : CCC.TH16
249+ title : Logging and Monitoring are Disabled
250+ description : |
251+ Logging and monitoring may be disabled, potentially hindering the
252+ detection of security events and reducing visibility into system
253+ activities. This condition can impact the organization's ability
254+ to investigate incidents and maintain operational integrity.
255+ features :
256+ - CCC.F10 # Logging
257+ - CCC.F09 # Monitoring
245258 mitre_technique :
246- - T1580 # Cloud Infrastructure Discovery
259+ - T1562 # Impair Defenses
0 commit comments