Key Management Policy Discovery

Adversaries may try to gather information about Key Management Policy implemented. Security Policies are rules and regulations that describe the operational procedures required for proper key management. This includes the specification of rules for processes such as generation, distribution, and allowed use for cryptographic keys. [1]

Standard/references: [2]

ID: T2032
Sub-techniques:  No sub-techniques
Tactic: Discovery
Platforms: Ground Segment, Space Segment
Version: 2.0
Created: 23 September 2022
Last Modified: 21 April 2023

Mitigations

This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.

References