You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/attack-path-reference.md
+24-24Lines changed: 24 additions & 24 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ titleSuffix: Defender for Cloud
4
4
description: This article lists Microsoft Defender for Cloud's list of attack paths based on resource.
5
5
ms.topic: reference
6
6
ms.custom: ignite-2022
7
-
ms.date: 01/17/2023
7
+
ms.date: 01/18/2023
8
8
---
9
9
10
10
@@ -22,43 +22,43 @@ Prerequisite: For a list of prerequisites, see the [Availability table](how-to-m
22
22
23
23
| Attack Path Display Name | Attack Path Description |
24
24
|--|--|
25
-
| Internet exposed VM has high severity vulnerabilities |Virtual machine '\[MachineName]' is reachable from the internet and has high severity vulnerabilities\[RCE]|
26
-
| Internet exposed VM has high severity vulnerabilities and high permission to a subscription |Virtual machine '\[MachineName]' is reachable from the internet, has high severity vulnerabilities \[RCE] and \[IdentityDescription]with \[PermissionType]permission to subscription '\[SubscriptionName]'|
27
-
| Internet exposed VM has high severity vulnerabilities and read permission to a data store with sensitive data |Virtual machine '\[MachineName]' is reachable from the internet, has high severity vulnerabilities \[RCE] and \[IdentityDescription]with read permission to \[DatabaseType] '\[DatabaseName]' containing sensitive data. For more details, you can learn how to [prioritize security actions by data sensitivity](./information-protection.md). |
28
-
| Internet exposed VM has high severity vulnerabilities and read permission to a data store |Virtual machine '\[MachineName]' is reachable from the internet, has high severity vulnerabilities \[RCE] and \[IdentityDescription]with read permission to \[DatabaseType] '\[DatabaseName]'. |
29
-
| Internet exposed VM has high severity vulnerabilities and read permission to a Key Vault |Virtual machine '\[MachineName]' is reachable from the internet, has high severity vulnerabilities \[RCE] and \[IdentityDescription]with read permission to Key Vault '\[KVName]'|
30
-
| VM has high severity vulnerabilities and high permission to a subscription |Virtual machine '\[MachineName]' has high severity vulnerabilities \[RCE]and has high permission to subscription '\[SubscriptionName]'|
31
-
| VM has high severity vulnerabilities and read permission to a data store with sensitive data |Virtual machine '\[MachineName]' has high severity vulnerabilities \[RCE] and \[IdentityDescription]with read permission to \[DatabaseType] '\[DatabaseName]' containing sensitive data. For more details, you can learn how to [prioritize security actions by data sensitivity](./information-protection.md). |
32
-
| VM has high severity vulnerabilities and read permission to a Key Vault|Virtual machine '\[MachineName]' has high severity vulnerabilities \[RCE] and \[IdentityDescription]with read permission to Key Vault '\[KVName]'|
33
-
| VM has high severity vulnerabilities and read permission to a data store |Virtual machine '\[MachineName]' has high severity vulnerabilities \[RCE] and \[IdentityDescription]with read permission to \[DatabaseType] '\[DatabaseName]'|
25
+
| Internet exposed VM has high severity vulnerabilities |A virtual machine is reachable from the internet and has high severity vulnerabilities |
26
+
| Internet exposed VM has high severity vulnerabilities and high permission to a subscription |A virtual machine is reachable from the internet, has high severity vulnerabilities an identity with permission to a subscription|
27
+
| Internet exposed VM has high severity vulnerabilities and read permission to a data store with sensitive data |A virtual machine is reachable from the internet, has high severity vulnerabilities with read permission to a data store containing sensitive data. For more details, you can learn how to [prioritize security actions by data sensitivity](./information-protection.md). |
28
+
| Internet exposed VM has high severity vulnerabilities and read permission to a data store |A virtual machine is reachable from the internet, has high severity vulnerabilities with read permission to a data store. |
29
+
| Internet exposed VM has high severity vulnerabilities and read permission to a Key Vault |A virtual machine is reachable from the internet, has high severity vulnerabilities with read permission to a key vault|
30
+
| VM has high severity vulnerabilities and high permission to a subscription |A virtual machine has high severity vulnerabilities and has high permission to a subscription|
31
+
| VM has high severity vulnerabilities and read permission to a data store with sensitive data |A virtual machine has high severity vulnerabilities with read permission to a data store containing sensitive data. For more details, you can learn how to [prioritize security actions by data sensitivity](./information-protection.md). |
32
+
| VM has high severity vulnerabilities and read permission to a key vault|A virtual machine has high severity vulnerabilities with read permission to a key vault|
33
+
| VM has high severity vulnerabilities and read permission to a data store |A virtual machine has high severity vulnerabilities with read permission to a data store|
| Attack Path Display Name | Attack Path Description |
40
40
|--|--|
41
-
| Internet exposed EC2 instance has high severity vulnerabilities and high permission to an account | AWS EC2 instance '\[EC2Name]' is reachable from the internet, has high severity vulnerabilities\[RCE] and has '\[permission]' permission to account '\[AccountName]'|
42
-
| Internet exposed EC2 instance has high severity vulnerabilities and read permission to a DB | AWS EC2 instance '\[MachineName]' is reachable from the internet, has high severity vulnerabilities\[RCE] and has '\[permission]' permission to DB '\[DatabaseName]'|
43
-
| Internet exposed EC2 instance has high severity vulnerabilities and read permission to S3 bucket |Option 1 <br> AWS EC2 instance '\[MachineName]' is reachable from the internet, has high severity vulnerabilities\[RCE] and has IAM role attached with '\[Rolepermission]' permission via IAM policy to S3 bucket '\[BucketName]' <br> <br> Option 2 <br> AWS EC2 instance '\[MachineName]' is reachable from the internet, has high severity vulnerabilities\[RCE] and has IAM role attached with '\[S3permission]' permission via bucket policy to S3 bucket '\[BucketName]' <br> <br> Option 3 <br> AWS EC2 instance '\[MachineName]' is reachable from the internet, has high severity vulnerabilities\[RCE]and has IAM role attached with '\[Rolepermission]' permission via IAM policy and '\[S3permission]' permission via bucket policy to S3 bucket '\[BucketName]'|
44
-
| Internet exposed EC2 instance has high severity vulnerabilities and read permission to a S3 bucket with sensitive data | Option 1 <br> AWS EC2 instance '\[MachineName]' is reachable from the internet, has high severity vulnerabilities\[RCE] and has IAM role attached with '\[Rolepermission]' permission via IAM policy to S3 bucket '\[BucketName]' containing sensitive data <br> <br> Option 2 <br> AWS EC2 instance '\[MachineName]' is reachable from the internet, has high severity vulnerabilities\[RCE] and has IAM role attached with '\[S3permission]' permission via bucket policy to S3 bucket '\[BucketName]' containing sensitive data <br> <br> Option 3 <br> AWS EC2 instance '\[MachineName]' is reachable from the internet, has high severity vulnerabilities\[RCE] and has IAM role attached with '\[Rolepermission]' permission via IAM policy and '\[S3permission] permission via bucket policy to S3 bucket '\[BucketName]' containing sensitive data <br><br> . For more details, you can learn how to [prioritize security actions by data sensitivity](./information-protection.md). |
45
-
| Internet exposed EC2 instance has high severity vulnerabilities and read permission to a KMS |Option 1 <br> AWS EC2 instance '\[MachineName]' is reachable from the internet, has high severity vulnerabilities\[RCE] and has IAM role attached with '\[Rolepermission]' permission via IAM policy to AWS Key Management Service (KMS) '\[KeyName]' <br> <br> Option 2 <br> AWS EC2 instance '\[MachineName]' is reachable from the internet, has vulnerabilities allowing remote code execution and has IAM role attached with '\[Keypermission]' permission via AWS Key Management Service (KMS) policy to key '\[KeyName]' <br> <br> Option 3 <br> AWS EC2 instance '\[MachineName]' is reachable from the internet, has vulnerabilities allowing remote code execution and has IAM role attached with '\[Rolepermission]' permission via IAM policy and '\[Keypermission] permission via AWS Key Management Service (KMS) policy to key '\[KeyName]' |
46
-
| Internet exposed EC2 instance has high severity vulnerabilities | AWS EC2 instance '\[EC2Name]' is reachable from the internet and has high severity vulnerabilities\[RCE]|
47
-
| EC2 instance with high severity vulnerabilities has high privileged permissions to an account | EC2 instance '\[EC2Name]' has high severity vulnerabilities\[RCE] and has '\[Permissions]' permissions to account '\[AccountName]'|
48
-
| EC2 instance with high severity vulnerabilities has read permissions to a data store | Option 1 <br> EC2 instance '\[MachineName]' has high severity vulnerabilities\[RCE] and has '\[Permissions]' permissions to database '\[DatabaseName]' <br> <br> Option 2 <br> EC2 instance '\[MachineName]' has high severity vulnerabilities\[RCE] and has IAM role attached which is granted with '\[RolePermissions]' permissions through IAM policy to S3 bucket '\[BucketName]' <br><br> Option 3 <br> EC2 instance '\[MachineName]' has high severity vulnerabilities\[RCE] and has IAM role attached which is granted with '\[Permissions]' permissions through bucket policy to S3 bucket '\[BucketName]' <br><br> Option 4 <br> EC2 instance '\[MachineName]' has high severity vulnerabilities\[RCE]and has IAM role attached which is granted with '\[RolePermissions]' permissions through IAM policy and '\[Permissions]' permissions through bucket policy to S3 bucket '\[BucketName]'|
49
-
| EC2 instance with high severity vulnerabilities has read permissions to a data store with sensitive data |Option 1 <br> EC2 instance '\[MachineName]' has high severity vulnerabilities\[RCE] and has IAM role attached which is granted with '\[RolePermissions]' permissions through IAM policy to S3 bucket '\[BucketName]' containing sensitive data <br><br> Option 2 <br> EC2 instance '\[MachineName]' has high severity vulnerabilities\[RCE] and has IAM role attached which is granted with '\[Permissions]' permissions through bucket policy to S3 bucket '\[BucketName]' containing sensitive data <br><br> Option 3 <br> EC2 instance '\[MachineName]' has high severity vulnerabilities\[RCE] and has IAM role attached which is granted with '\[RolePermissions]' permissions through IAM policy and '\[Permissions]' permissions through bucket policy to S3 bucket '\[BucketName]' containing sensitive data |
50
-
| EC2 instance with high severity vulnerabilities has read permissions to a KMS key |Option 1 <br> EC2 instance '\[MachineName]' has high severity vulnerabilities\[RCE] and has IAM role attached which is granted with '\[RolePermissions]' permissions through IAM policy to AWS Key Management Service (KMS) key '\[KeyName]' <br><br> option 2 <br> EC2 instance '\[MachineName]' has vulnerabilities allowing remote code execution and has IAM role attached which is granted with '\[KeyPermissions]' permissions through AWS Key Management Service (KMS) policy to key '\[KeyName]' <br><br> Option 3 <br> EC2 instance '\[MachineName]' has vulnerabilities allowing remote code execution and has IAM role attached which is granted with '\[RolePermissions]' permissions through IAM policy and '\[KeyPermissions]' permissions through AWS Key Management Service (KMS) policy to key '\[KeyName]'|
41
+
| Internet exposed EC2 instance has high severity vulnerabilities and high permission to an account |An AWS EC2 instance is reachable from the internet, has high severity vulnerabilities and has permissionto an account|
42
+
| Internet exposed EC2 instance has high severity vulnerabilities and read permission to a DB |AN AWS EC2 instance is reachable from the internet, has high severity vulnerabilities and has permissionto a database |
43
+
| Internet exposed EC2 instance has high severity vulnerabilities and read permission to S3 bucket | An AWS EC2 instance is reachable from the internet, has high severity vulnerabilities and has an IAM role attached with permission via an IAM policy, and/or via a bucket policy to an S3 bucket
44
+
| Internet exposed EC2 instance has high severity vulnerabilities and read permission to a S3 bucket with sensitive data | An AWS EC2 instance is reachable from the internet has high severity vulnerabilities and has an IAM role attached with permission via an IAM policy and/or via a bucket policy to an S3 bucket containing sensitive data. For more details, you can learn how to [prioritize security actions by data sensitivity](./information-protection.md). |
45
+
| Internet exposed EC2 instance has high severity vulnerabilities and read permission to a KMS |An AWS EC2 instance is reachable from the internet, has high severity vulnerabilities and has an IAM role attached with permission via IAM policy and/or via AWS Key Management Service (KMS) policy to an AWS Key Management Service (KMS)|
46
+
| Internet exposed EC2 instance has high severity vulnerabilities |An AWS EC2 instance is reachable from the internet and has high severity vulnerabilities |
47
+
| EC2 instance with high severity vulnerabilities has high privileged permissions to an account |An AWS EC2 instance has high severity vulnerabilities and has permissions to an account|
48
+
| EC2 instance with high severity vulnerabilities has read permissions to a data store |An AWS EC2 instance has high severity vulnerabilities and has an IAM role attached which is granted with permissions via an IAM policy and/or via a bucket policy to an S3 bucket |
49
+
| EC2 instance with high severity vulnerabilities has read permissions to a data store with sensitive data |An AWS EC2 instance has high severity vulnerabilities and has an IAM role attached which is granted with permissions via an IAM policy and/or via a bucket policy to an S3 bucket containing sensitive data |
50
+
| EC2 instance with high severity vulnerabilities has read permissions to a KMS key |An AWS EC2 instance has high severity vulnerabilities and has an IAM role attached which is granted with permissions via an IAM policy and/or via an AWS Key Management Service (KMS) policy to an AWS Key Management Service (KMS) key |
51
51
52
52
### Azure data
53
53
54
54
Prerequisite: [Enable Microsoft Defender for SQL servers on machines](defender-for-sql-usage.md).
55
55
56
56
| Attack Path Display Name | Attack Path Description |
57
57
|--|--|
58
-
| Internet exposed SQL on VM has a user account with commonly used username and allows code execution on the VM | SQL on VM '\[SqlVirtualMachineName]' is reachable from the internet, has a local user account with commonly used username (which is prone to brute force attacks), and has vulnerabilities allowing code execution and lateral movement to the underlying VM |
59
-
| Internet exposed SQL on VM has a user account with commonly used username and known vulnerabilities | SQL on VM '\[SqlVirtualMachineName]' is reachable from the internet, has a local user account with commonly used username (which is prone to brute force attacks), and has known vulnerabilities (CVEs) |
60
-
| SQL on VM has a user account with commonly used username and allows code execution on the VM | SQL on VM '\[SqlVirtualMachineName]' has a local user account with commonly used username (which is prone to brute force attacks), and has vulnerabilities allowing code execution and lateral movement to the underlying VM |
61
-
| SQL on VM has a user account with commonly used username and known vulnerabilities | SQL on VM '\[SqlVirtualMachineName]' has a local user account with commonly used username (which is prone to brute force attacks), and has known vulnerabilities (CVEs) |
58
+
| Internet exposed SQL on VM has a user account with commonly used username and allows code execution on the VM | SQL on VM is reachable from the internet, has a local user account with a commonly used username (which is prone to brute force attacks), and has vulnerabilities allowing code execution and lateral movement to the underlying VM |
59
+
| Internet exposed SQL on VM has a user account with commonly used username and known vulnerabilities | SQL on VM is reachable from the internet, has a local user account with a commonly used username (which is prone to brute force attacks), and has known vulnerabilities (CVEs) |
60
+
| SQL on VM has a user account with commonly used username and allows code execution on the VM | SQL on VM has a local user account with a commonly used username (which is prone to brute force attacks), and has vulnerabilities allowing code execution and lateral movement to the underlying VM |
61
+
| SQL on VM has a user account with commonly used username and known vulnerabilities | SQL on VM has a local user account with a commonly used username (which is prone to brute force attacks), and has known vulnerabilities (CVEs) |
0 commit comments