Skip to main content

CCC.CntrReg.TH01: Vulnerabilities in Artifacts are Exploited

Threat ID:CCC.CntrReg.TH01
Title:Vulnerabilities in Artifacts are Exploited
Description:

Attackers exploit known vulnerabilities in container images or artifacts stored in the registry, leading to unauthorized access, data breaches, or system compromise.

Related Capabilities

IDTitleDescription
CCC.CntrReg.F05Image ScanningProvides vulnerability scanning for container images (built-in or through integration to scanning services) to detect security issues and generate reports for known CVEs (Common Vulnerabilities and Exposures).

External Mappings

Reference IDEntry IDStrengthRemarks
MITRE-ATT&CK
T1190
0
-
MITRE-ATT&CK
T1195
0
-

Controls

IDTitleObjectiveControl FamilyThreat MappingsGuideline MappingsAssessment Requirements
CCC.CntrReg.C01Implement Vulnerability Scanning for ArtifactsEnsure that container images and artifacts stored in the container registry are scanned for vulnerabilities to identify and remediate security issues before deployment. Risk Management
1
3
1