Views:

Run simulated attacks on your cloud workloads to test your defenses and practice using Workbench and Observed Attack Techniques to analyze network threats.

To run cloud attack simulations, you need to enable Trend Vision One Container Security and configure the T1552.001 ruleset. Then you can execute a command in a Linux container to trigger the simulated attack and review the results.

Procedure

  1. Enable Trend Vision One Container Security
  2. Configure the T1552.001 ruleset
  3. Run the cloud attack simulation by executing the following command in a Linux container monitored by Container Security:
    find / -name "credentials" -path "*/.aws/credentials" 2>/dev/null
  4. Review the simulation results:
    • In the Trend Vision One console, go to the Workbench or Observed Attack Techniques page.
    • Look for detections related to the T1552.001 attack technique.
    • Analyze the alerts to see how Container Security identified and responded to the simulated attack.
    Note
    Note
    It may take a few minutes after running the simulation script for the results to appear in the console.