Assets

IAMObject

notPresent

attemptAssume

successfulAssume

assume

deny

write

attemptLockout

successfulLockout

lockout

Identity

assume

lockoutFromCredentials

lockout

Privileges

assume

Group

assume

lockoutFromMembers

Credentials

notDisclosed

notGuessable

unique

notPhishable

read

write

deny

useLeakedCredentials

attemptCredentialsReuse

credentialsReuse

use

attemptPropagateOneCredentialCompromised

propagateOneCredentialCompromised

attemptCredentialTheft

credentialTheft

weakCredentials

guessCredentialsFromHash

guessCredentials

Information

read

write

delete

deny

extract

attemptReadFromReplica

attemptWriteFromReplica

attemptDeleteFromReplica

attemptDenyFromReplica

attemptExtractFromReplica

Data

authorizedAccessFromApplication

bypassPayloadInspectionFromEncryptedData

accessUnencryptedData

accessUnsignedData

accessSpoofedData

accessDecryptedData

attemptApplicationRespondConnect

applicationRespondConnect

authorizedApplicationRespondConnectFromApplication

authorizedApplicationRespondConnectFromIAM

authorizedApplicationRespondConnect

attemptRead

successfulRead

read

authorizedReadFromIAM

authorizedReadFromApplication

authorizedRead

attemptWrite

successfulWrite

write

authorizedWriteFromIAM

authorizedWriteFromApplication

authorizedWrite

attemptDelete

successfulDelete

delete

authorizedDeleteFromIAM

authorizedDeleteFromApplication

authorizedDelete

attemptDeny

successfulDeny

deny

denyFromLockout

attemptReverseReach

reverseReach

extract

Hardware

attemptUseVulnerabilityFromPhysicalAccess

successfulUseVulnerabilityFromPhysicalAccess

attemptUseVulnerabilityFromSoftwareFullAccess

useVulnerability

attemptSpreadWormThroughRemovableMedia

successfulSpreadWormThroughRemovableMedia

spreadWormThroughRemovableMedia

fullAccess

attemptSupplyChainAttack

successfulSupplyChainAttack

supplyChainAttack

bypassSupplyChainAuditing

supplyChainAuditingBypassed

physicalAccess

attemptHardwareModifications

successfulHardwareModifications

hardwareModifications

hardwareModificationsProtection

bypassHardwareModificationsProtection

hardwareModificationsProtectionBypassed

attemptUnsafeUserActivity

successfulUnsafeUserActivity

unsafeUserActivity

deny

read

modify

SoftwareProduct

compromiseApplications

write

readApplications

modifyApplications

denyApplications

Application

notPresent

attemptUseVulnerability

successfulUseVulnerability

useVulnerability

attemptReverseReach

successfulReverseReach

reverseReach

localConnect

networkConnectUninspected

networkConnectInspected

networkConnect

specificAccessNetworkConnect

accessNetworkAndConnections

attemptNetworkConnectFromResponse

networkConnectFromResponse

specificAccessFromLocalConnection

specificAccessFromNetworkConnection

specificAccess

bypassContainerization

authenticate

specificAccessAuthenticate

localAccess

networkAccess

fullAccess

physicalAccessAchieved

attemptUnsafeUserActivity

successfulUnsafeUserActivity

unsafeUserActivity

attackerUnsafeUserActivityCapability

attackerUnsafeUserActivityCapabilityWithReverseReach

attackerUnsafeUserActivityCapabilityWithoutReverseReach

bypassSupplyChainAuditing

supplyChainAuditingBypassed

attemptFullAccessFromSupplyChainCompromise

fullAccessFromSupplyChainCompromise

attemptReadFromSoftProdVulnerability

attemptModifyFromSoftProdVulnerability

attemptDenyFromSoftProdVulnerability

softwareProductVulnerabilityLocalAccessAchieved

softwareProductVulnerabilityNetworkAccessAchieved

softwareProductVulnerabilityPhysicalAccessAchieved

softwareProductVulnerabilityLowPrivilegesAchieved

softwareProductVulnerabilityHighPrivilegesAchieved

softwareProductVulnerabilityUserInteractionAchieved

attemptSoftwareProductAbuse

softwareProductAbuse

readFromSoftProdVulnerability

modifyFromSoftProdVulnerability

denyFromSoftProdVulnerability

attemptApplicationRespondConnectThroughData

successfulApplicationRespondConnectThroughData

applicationRespondConnectThroughData

attemptAuthorizedApplicationRespondConnectThroughData

successfulAuthorizedApplicationRespondConnectThroughData

authorizedApplicationRespondConnectThroughData

attemptRead

successfulRead

read

specificAccessRead

attemptModify

successfulModify

modify

specificAccessModify

attemptDeny

successfulDeny

deny

specificAccessDelete

denyFromNetworkingAsset

denyFromLockout

IDPS

bypassEffectiveness

effectivenessBypassed

fullAccess

deny

PhysicalZone

gainPhysicalAccess

Network

physicalAccess

bypassEavesdropDefenseFromPhysicalAccess

bypassAdversaryInTheMiddleDefenseFromPhysicalAccess

bypassAccessControl

accessControlBypassed

attemptAccessUninspected

attemptAccessInspected

successfulAccessUninspected

successfulAccessInspected

accessUninspected

accessInspected

attemptReverseReach

reverseReach

networkForwardingUninspected

networkForwardingInspected

deny

accessNetworkData

eavesdropDefense

bypassEavesdropDefense

eavesdropDefenseBypassed

attemptEavesdrop

successfulEavesdrop

eavesdrop

adversaryInTheMiddleDefense

bypassAdversaryInTheMiddleDefense

adversaryInTheMiddleDefenseBypassed

attemptAdversaryInTheMiddle

successfulAdversaryInTheMiddle

adversaryInTheMiddle

RoutingFirewall

deny

fullAccess

ConnectionRule

restricted

payloadInspection

bypassRestricted

restrictedBypassed

bypassPayloadInspection

payloadInspectionBypassed

attemptReverseReach

reverseReach

attemptAccessNetworksUninspected

attemptAccessNetworksInspected

successfulAccessNetworksUninspected

successfulAccessNetworksInspected

accessNetworksUninspected

accessNetworksInspected

attemptConnectToApplicationsUninspected

attemptConnectToApplicationsInspected

connectToApplicationsUninspected

connectToApplicationsInspected

attemptDeny

deny

User

noPasswordReuse

noRemovableMediaUsage

securityAwareness

bypassSecurityAwareness

securityAwarenessBypassed

oneCredentialCompromised

passwordReuseCompromise

weakCredentials

attemptSocialEngineering

successfulSocialEngineering

socialEngineering

attemptDeliverMaliciousRemovableMedia

successfulDeliverMaliciousRemovableMedia

deliverMaliciousRemovableMedia

phishUser

credentialTheft

attemptUnsafeUserActivity

successfulUnsafeUserActivity

unsafeUserActivity

Vulnerability

attemptAbuse

abuse

attemptExploit

exploit

impact

SoftwareVulnerability

notPresent

inherentUserInteraction

networkAccessAchieved

localAccessAchieved

physicalAccessAchieved

lowPrivilegesAchieved

highPrivilegesAchieved

userInteractionAchieved

impact

read

modify

deny

attemptAbuse

attemptExploit

exploitTrivially

exploitWithEffort

HardwareVulnerability

physicalAccessAchieved

impact

read

modify

deny

attemptExploit

exploitTrivially

exploitWithEffort