Adversaries may abuse permission configurations that allow them to gain temporarily elevated access to cloud resources.
Sub-technique of
T1548
See: MITRE ATT&CK
Adversaries may abuse permission configurations that allow them to gain temporarily elevated access to cloud resources.
Sub-technique of
T1548
See: MITRE ATT&CK