Below are the tactics and techniques representing the MITRE ATT&CK® Matrix for Enterprise covering techniques against container technologies. The Matrix contains information for the Containers platform.
| Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Impact | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| 3 techniques | 4 techniques | 4 techniques | 4 techniques | 6 techniques | 2 techniques | 3 techniques | 3 techniques | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|
|
|
|
|
|
|
| Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Impact | ||||||||||||||||||||||||
| 3 techniques | 4 techniques | 4 techniques | 4 techniques | 6 techniques | 2 techniques | 3 techniques | 3 techniques | ||||||||||||||||||||||||
|
|
|
|
|
|