| T1087.004 | Cloud Account | | Discovery | MITRE ATT&CK |
| T1098.003_Azure | Account Manipulation: Additional Cloud Roles (Azure) | Entra ID | Persistence, Privilege Escalation | MITRE ATT&CK |
| T1580 | Cloud Infrastructure Discovery | | Discovery | MITRE ATT&CK |
| T1078.004 | Cloud Accounts | | Defense Evasion, Persistence, Privilege Escalation, Initial Access | MITRE ATT&CK |
| T1078.004_Azure | Valid Accounts: Cloud Accounts | Entra ID | Defense Evasion, Persistence, Privilege Escalation, Initial Access | MITRE ATT&CK |
| T1069.003 | Cloud Groups | | Discovery | MITRE ATT&CK |
| T1526 | Cloud Service Discovery | | Discovery | MITRE ATT&CK |
| T1098.001_Azure | Account Manipulation: Additional Cloud Credentials | Entra ID | Persistence | MITRE ATT&CK |
| T1548.005 | Temporary Elevated Cloud Access | | Defense Evasion, Privilege Escalation | MITRE ATT&CK |
| T1059.009 | Cloud API | | Execution | MITRE ATT&CK |
| T1098.001_AWS | Account Manipulation: Additional Cloud Credentials | AWS | Persistence | MITRE ATT&CK |
| T1098.003 | Additional Cloud Roles | | Persistence, Privilege Escalation | MITRE ATT&CK |
| T1087.004_AWS | Account Discovery: Cloud Account (AWS) | AWS | Discovery | MITRE ATT&CK |
| T1204.002_AWS | User Execution: Malicious File (AWS) | AWS | Execution | MITRE ATT&CK |
| T1528 | Steal Application Access Token | | Collection | MITRE ATT&CK |
| T1619_AWS | Cloud Storage Object Discovery(AWS) | AWS | Discovery | MITRE ATT&CK |
| T1555.006 | Cloud Secrets Management Stores | | Credential Access | MITRE ATT&CK |
| T1565.003 | Runtime Data Manipulation | | Impact | MITRE ATT&CK |
| T1072 | Software Deployment Tools | | Execution, Lateral Movement | MITRE ATT&CK |
| T1110.001 | Password Guessing | | Credential Access | MITRE ATT&CK |
| T1548.005_Azure | Abuse Elevation Control Mechanism: Temporary Elevated Cloud Access | Entra ID | Defense Evasion, Privilege Escalation | MITRE ATT&CK |
| T1021.007_Azure | Remote Services: Cloud Services | Azure | Lateral Movement | MITRE ATT&CK |
| T1069.003_AWS | Permission Groups Discovery: Cloud Groups (AWS) | AWS | Discovery | MITRE ATT&CK |
| T1021.007 | Cloud Services | | Lateral Movement | MITRE ATT&CK |
| T1083 | File and Directory Discovery | | Discovery | MITRE ATT&CK |
| T1530 | Data from Cloud Storage | | Collection | MITRE ATT&CK |
| T1530_AWS | Data from Cloud Storage Object (AWS) | AWS | Collection | MITRE ATT&CK |
| T1537_AWS | Transfer Data to Cloud Account | AWS | Exfiltration | MITRE ATT&CK |
| T1580_AWS | Cloud Infrastructure Discovery(AWS) | AWS | Discovery | MITRE ATT&CK |
| T1037.003_Windows | Boot or Logon Initialization Scripts: Network Logon Script (Windows) | Windows | Persistence, Privilege Escalation | MITRE ATT&CK |
| T1087.004_Azure | Account Discovery:Cloud Account(Azure) | Entra ID | Discovery | MITRE ATT&CK |
| T1110.001_Windows | Brute Force: Password Guessing (Windows) | Windows | Credential Access | MITRE ATT&CK |
| T1110.003 | Password Spraying | | Credential Access | MITRE ATT&CK |
| T1110.003_Windows | Brute Force: Password Spraying (Windows) | Windows | Credential Access | MITRE ATT&CK |
| T1110.004 | Credential Stuffing | | Credential Access | MITRE ATT&CK |
| T1134.005_Windows | Access Token Manipulation: SID-History Injection | Windows | Defense Evasion, Privilege Escalation | MITRE ATT&CK |
| T1207_Windows | Rogue Domain Controller | Windows | Defense Evasion | MITRE ATT&CK |
| T1558.001_Windows | Steal or Forge Kerberos Tickets: Golden Ticket | Windows | Credential Access | MITRE ATT&CK |
| T1615_Windows | Group Policy Discovery | Windows | Discovery | MITRE ATT&CK |
| T1098.001 | Additional Cloud Credentials | | Persistence | MITRE ATT&CK |
| T1098.004 | SSH Authorized Keys | | Privilege Escalation, Persistence | MITRE ATT&CK |
| T1537 | Transfer Data to Cloud Account | | Exfiltration | MITRE ATT&CK |
| T1619 | Cloud Storage Object Discovery | | Discovery | MITRE ATT&CK |
| T1648 | Serverless Execution | | Execution | MITRE ATT&CK |
| T1648_AWS | Serverless Execution | AWS | Execution | MITRE ATT&CK |
| T1190_Aws | Exploit Public-Facing Application (Aws) | Aws | Initial Access, Persistence | MITRE ATT&CK |
| T1003.006_Windows | OS Credential Dumping: DCSync | Windows | Credential Access | MITRE ATT&CK |
| T1482 | Domain Trust Discovery | | Discovery | MITRE ATT&CK |
| T1548_Windows | Abuse Elevation Control Mechanism | Windows | Privilege Escalation, Defense Evasion | MITRE ATT&CK |
| T1558.003 | Kerberoasting | | Credential Access | MITRE ATT&CK |