Credential Access
The credential access tactic consists of techniques that are used by attackers to steal credentials.
In containerized environments, this includes credentials of the running application, identities, secrets stored in the cluster, or cloud credentials.
ID | Name |
---|---|
MS-TA9025 | List K8S secrets |
MS-TA9026 | Mount service principal |
MS-TA9016 | Container service account |
MS-TA9027 | Application credentials in configuration files |
MS-TA9028 | Access managed identity credentials |
MS-TA9015 | Malicious admission controller |