Remote Services: Cloud Services

Description

Adversaries may log into accessible cloud services within a compromised environment using Valid Accounts that are synchronized with or federated to on-premises user identities. The adversary may then perform management actions or access cloud-hosted resources as the logged-on user.

Products, Sensors, and Dependencies

ProductDependenciesData sourceAccess requiredProtocolData CollectedNotes
Tenable Cloud SecurityEntra IDRead-onlyAPIAzure Manage Identity Services

Attack Path Technique Details

Framework: MITRE ATT&CK

Family: Lateral Movement

Technique: Remote Services

Sub-Technique: Cloud Services

Platform: Azure

Products Required: Tenable Cloud Security

Tenable Release Date: 2024 Q3