AV-01 · Phishing and credential theft
high Phishing works because it targets the person, not the system. Email lures, credential-harvesting pages, MFA fatigue, and session theft bypass firewalls and EDR by exploiting the authentication workflow itself.
$ action: Deploy phishing-resistant MFA, add conditional access controls, and build a fast account lock and session revocation playbook you've actually tested.
AV-02 · Exposed services and remote access weaknesses
critical VPNs, firewalls, admin panels, RDP, SSH, and internet-facing applications are continuously scanned. Attackers don't need to know your organization to find what you've left reachable.
$ action: Maintain a live inventory of exposed services, patch aggressively starting with internet-facing systems, and lock down administrative access paths.
AV-03 · Vulnerability exploitation and misconfiguration abuse
critical Attackers consistently exploit known weaknesses and insecure defaults, especially on public-facing systems, cloud services, and network appliances. Misconfiguration is usually the multiplier that turns a bug into a breach.
$ action: Prioritize externally exposed assets, enforce secure defaults, and validate remediation with direct testing — not just ticket status.
AV-04 · Lateral movement after initial access
high Once inside, attackers use shared credentials, over-trusted network paths, and gaps in east-west monitoring to move across systems and escalate privileges before defenders notice.
$ action: Segment networks, reduce admin sprawl, monitor east-west traffic, and alert on abnormal authentication patterns between internal hosts.
AV-05 · Insider threat and privilege misuse
high Insider threats include malicious employees, negligent users, and over-privileged contractors whose access can cause serious harm — intentionally or accidentally. The challenge is that insiders already have the keys.
$ action: Enforce least privilege, log sensitive actions, build separation of duties, and establish a fair, evidence-based investigation process before you need one.
AV-06 · State-backed and foreign targeted intrusions
critical State-backed intrusions often pursue espionage, long-term access, or pre-positioning for future disruption. The tradecraft is patient and the objectives are strategic — which means defenders need longer retention, stronger fundamentals, and the ability to investigate slow campaigns.
$ action: Harden identity and edge access, protect high-value systems, extend telemetry retention, and build investigation procedures for slow campaigns — not just fast incident response.
AV-07 · Supply chain and third-party compromise
critical Attackers target software suppliers, MSPs, and trusted access paths because one upstream compromise can open doors into dozens of downstream organizations. Defenders often trust these channels by default — which is exactly the problem.
$ action: Inventory third-party dependencies and access paths, restrict vendor privileges, verify changes against approved tickets, and monitor trusted channels the same way you monitor external threats.
AV-08 · Ransomware and data extortion operations
critical Modern ransomware operations start long before encryption. Attackers spend days or weeks gaining access, collecting credentials, disabling defenses, and staging data before triggering the event that gets everyone's attention.
$ action: Harden identity controls and backups, detect pre-encryption staging behaviors, segment critical services, and rehearse your containment and recovery decisions before a crisis forces them.
AV-09 · DDoS and service exhaustion attacks
high DDoS and service exhaustion attacks degrade availability by overwhelming network paths, applications, or supporting infrastructure like DNS and load balancers. The most painful incidents are the ones where mitigation services exist but slow recognition and bad runbooks prolong the outage.
$ action: Establish upstream scrubbing relationships, define rate limits and thresholds in advance, map service dependencies, and drill availability response before an incident forces improvisation.
AV-10 · Cloud misconfiguration and identity abuse
critical Cloud environments get compromised through over-permissioned roles, leaked keys, exposed storage, and control-plane actions that look like normal admin work until they're not. The control plane itself is the attack surface.
$ action: Harden cloud identities, reduce standing privilege, monitor control-plane changes continuously, and validate exposed resources and configuration drift on a regular cadence.
AV-11 · DNS abuse, tunneling, and command-and-control
high Attackers abuse DNS for reconnaissance, C2 beaconing, and covert data movement because DNS traffic is almost universally allowed and rarely inspected closely. Missing DNS telemetry means missing one of the best early-warning signals available.
$ action: Centralize DNS logging, baseline query behavior by host role, monitor resolver paths, and build alerts for high-entropy domains, unusual query volumes, and resolver bypass.
AV-12 · Wireless rogue access and evil twin attacks
high Wireless environments can be abused through rogue access points, evil twin networks, and credential capture because Wi-Fi is physically accessible to anyone within radio range — and users connect by name, not by cryptographic identity.
$ action: Monitor the wireless environment for rogue SSIDs, enforce strong authentication and certificate validation, segment wireless networks by trust level, and train users to recognize trusted SSIDs and certificate prompts.