☁️

Cloud & Identity Compromise

Unauthorized access to cloud infrastructure or identity provider through stolen tokens, OAuth abuse, or misconfigured access policies.

25 runbook nodes8 lifecycle stages covered

Triage

(3 nodes)

Containment

(2 nodes)

Preservation

(4 nodes)

Collection

(5 nodes)

Analysis

(3 nodes)

Eradication

(4 nodes)

Recovery

(1 node)

Post-Incident Review

(3 nodes)