Esc
Asset Vulnerability Enumeration
Definition
Asset vulnerability enumeration enriches inventory items with knowledge identifying their vulnerabilities.
Artifact Relationships:
This defensive technique is related to specific artifacts. Click the artifact node for more information.
Technique Subclasses
There are 2 techniques in this category, Asset Vulnerability Enumeration.
| Name | ID | Definition | Synonyms |
|---|---|---|---|
| Asset Vulnerability Enumeration | D3-AVE | Asset vulnerability enumeration enriches inventory items with knowledge identifying their vulnerabilities. | |
| - Container Image Analysis | D3-CIA | Analyzing a Container Image with respect to a set of policies. | Container Image Scanning |
Related ATT&CK Techniques:
These mappings are inferred, experimental, and will improve as the
knowledge graph grows.
These offensive techniques are determined related because of the way this defensive technique,, , and .
Lateral Movement
Software Deployment Tools
Privilege Escalation
Boot or Logon Autostart Execution
Event Triggered Execution
Hijack Execution Flow
Impact
Inhibit System Recovery
Persistence
Implant Internal Image
Server Software Component
Pre-OS Boot
Office Application Startup
Software Extensions
Boot or Logon Autostart Execution
Event Triggered Execution
Compromise Host Software Binary
Hijack Execution Flow
Initial Access
Supply Chain Compromise
Execution
Software Deployment Tools
Credential Access
Exploitation for Credential Access
Input Capture
Steal or Forge Authentication Certificates
Defense Evasion
System Binary Proxy Execution
Hide Artifacts
Trusted Developer Utilities Proxy Execution
Rootkit
Pre-OS Boot
Hijack Execution Flow
Virtualization/Sandbox Evasion
References
All
Patent
The following references were used to develop the Asset Vulnerability Enumeration knowledge-base article.
(Note: the consideration of references does not imply specific functionality exists in an offering.)
Automated computer vulnerability resolution system
Reference Type: Patent Organization: McAfee LLC Author: Carl E. Banzhof
Security vulnerability information aggregation
Reference Type: Patent Organization: Nokia Technologies Oy Author: Christophe Gustave, Stanley Taihai Chow, Douglas Wiemer
System and method for vulnerability risk analysis
Reference Type: Patent Organization: CA Inc Author: Matthew Cruz Elder, Darrell Martin Kienzle, Pratyusa K. Manadhata, Ryan Kumar Persaud