Skip to content

Impact

The adversary is trying to manipulate, interrupt, or destroy your systems and data.

Impact consists of techniques that adversaries use to disrupt availability or compromise integrity by manipulating business and operational processes. Techniques used for impact can include destroying or tampering with data. In some cases, business processes can look fine, but may have been altered to benefit the adversaries’ goals. These techniques might be used by adversaries to follow through on their end goal or to provide cover for a confidentiality breach.

In cloud environments, impact techniques include deleting critical resources (databases, storage, compute instances), encrypting data for ransom, modifying DNS records, or disrupting services by changing security configurations. Adversaries may also terminate instances, delete backups, or exhaust service quotas to cause denial of service.

View Impact on MITRE ATT&CK →

AWS DeleteDBInstance

Permanently deletes an RDS database instance, with an option to take a final snapshot before deletion.

Cloud Service: AWS - RDS
Tactics:
Techniques:

AWS DeleteObject

Deletes a single object from an S3 bucket; with versioning enabled, a delete marker is created instead.

Cloud Service: AWS - S3
Tactics:
Techniques:

AWS DeleteObjects

Deletes multiple S3 objects in a single batch request, more efficient than individual delete operations.

Cloud Service: AWS - S3
Tactics:
Techniques:

AWS DeleteVolume

Permanently deletes an EBS volume; the volume must be detached from any instance before deletion.

Cloud Service: AWS - EC2
Tactics:
Techniques:

AWS DisableKey

Disables a KMS encryption key, preventing any operations that depend on it until the key is re-enabled.

Cloud Service: AWS - KMS
Tactics:
Techniques: