☁️ Cloud & Identity Compromise

Unauthorized access to cloud infrastructure or identity provider through stolen tokens, OAuth abuse, or misconfigured access policies.

25 procedures8 lifecycle stages

Triage

(3 procedures)

Containment

(2 procedures)
Sponsored

Preservation

(4 procedures)

Collection

(5 procedures)

Analysis

(3 procedures)

Eradication

(4 procedures)

Recovery

(1 procedure)

Post-Incident Review

(3 procedures)