ID | Name |
---|---|
T2015.001 | Compromise of Key Management Facility |
T2015.002 | Cryptographic Key Corruption |
T2015.003 | Interception of Key Management Communication |
This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.