Skip to content

Initial Access

The initial access tactic consists of techniques that are used for gaining access to the resource. In containerized environments, those techniques enable first access to the cluster. This access can be achieved directly via the cluster management layer or, alternatively, by gaining access to a malicious or vulnerable resource that is deployed on the cluster.

ID Name
MS-TA9001 Using cloud credentials
MS-TA9002 Compromised image in registry
MS-TA9003 Kubeconfig file
MS-TA9004 Application vulnerability
MS-TA9005 Exposed sensitive interfaces