Learn about some of the types of components found in potential attack paths.
A potential attack path contains:
-
A potential threat source
-
Vulnerable assets
-
A potential path for lateral movement
-
Assets likely to be targeted
The tables below provide examples and descriptions of some potential attack path components.
Potential threat sources
Example
|
Description
|
Internet exposure
|
The asset can be accessed from the internet.
|
Detected threat
|
Malware, trojans, malicious traffic, or backdoors have been detected on the asset
|
Suspicious activity/behavior
|
The asset is displaying unusual behavior or activities that may indicate compromise
|
Leaked credentials
|
The credentials of an identity-related asset were leaked or otherwise compromised
|
Vulnerable assets
Example
|
Description
|
Open session with detected threat source
|
The asset has opened a legitimate session with a potential threat source.
|
Administrated by detected threat source
|
The asset is administrated by a potential threat source and can grant permissions.
|
Detected high-impact vulnerabilities
|
High-impact vulnerabilities have been detected on the asset.
|
Detected misconfigurations
|
The asset contains highly exploitable misconfigurations.
|
Weak authentication
|
The asset uses a weak method of authentication that could be exploited.
|
Excessive permissions
|
The asset has been granted more permissions than needed and can access large parts
of the network.
|
Relationships facilitating potential lateral movement
Example
|
Description
|
Connects
|
The asset has network activity with other assets.
|
Routes traffic to
|
The source asset can route traffic to a secondary asset.
|
Runs
|
The asset runs a secondary asset,
|
Contains
|
The asset contains a secondary asset.
|
Uses
|
The asset performs activities with a secondary asset.
|
Manages
|
The asset has administrative privileges over one or more assets.
|
Has permission to
|
The asset has permission to access one or a group of resources.
|
Admin to
|
The asset has direct administrative permission to one or more assets.
|
Can authenticate as
|
The Azure asset can authenticate to a particular identity and use the identity's privileges.
|
Controls
|
The asset dictates or orchestrates the actions of other assets.
|
Member of
|
The asset is a member of another asset.
|
Likely targets
Critical devices or cloud infrastructure
|
Devices or cloud resources that are highly critical to business operations and are
required for the functionality of other assets
|
Important users
|
User accounts with high organizational ranks or functionality
|
Highly privileged accounts
|
User accounts granted high privileges to administrate or control multiple assets
|
Highly privileged service accounts, IAM accounts, or keys
|
Highly privileged non-human identities used by applications or cloud resources
|
Assets with sensitive data
|
A storage-related asset that contains critical data such as keys or financial information
|