Appended or updated MITRE techniques with information on common
event names that are logged in Cloudtrail event history as a result
of the technique being used; and in most cases, add more detail
around methods for detectino and options for mitigation.
|
New techniques or sub-techniques to allow us to capture data on the
different methods that threat actors are utilizing as part of their
unauthorized actions. The catalog will be a continual work-in-progress
as techniques and sub-techniques are observed by the AWS CIRT during
security events.
|