test_scratch / cti-ATT-CK-v13.1 /enterprise-attack /relationship /relationship--00c4456d-cea9-43bf-913b-ec566699ce61.json
khoicrtp's picture
Upload 2298 files
5fe70fd
raw
history blame
1.29 kB
{
"type": "bundle",
"id": "bundle--afa67681-fa67-4588-a698-9d6e377e9fa2",
"spec_version": "2.0",
"objects": [
{
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"id": "relationship--00c4456d-cea9-43bf-913b-ec566699ce61",
"type": "relationship",
"created": "2020-08-20T18:47:28.174Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"modified": "2022-03-11T17:38:16.986Z",
"description": "Limit permissions to discover cloud infrastructure in accordance with least privilege. Organizations should limit the number of users within the organization with an IAM role that has administrative privileges, strive to reduce all permanent privileged role assignments, and conduct periodic entitlement reviews on IAM users, roles and policies.",
"relationship_type": "mitigates",
"source_ref": "course-of-action--93e7968a-9074-4eac-8ae9-9f5200ec3317",
"target_ref": "attack-pattern--57a3d31a-d04f-4663-b2da-7df8ec3f8c9d",
"x_mitre_version": "1.0",
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5"
}
]
}