Skip to content

Initial Access

The adversary is trying to get into your network.

Initial Access consists of techniques that use various entry vectors to gain their initial foothold within a network. Techniques used to gain a foothold include targeted spearphishing and exploiting weaknesses on public-facing web servers. Footholds gained through initial access may allow for continued access, like valid accounts and use of external remote services, or may be limited-use due to changing passwords.

In cloud environments, initial access often involves compromised credentials, misconfigured identity providers, or exploiting exposed cloud services. Adversaries may leverage stolen API keys, abuse federated authentication (SAML/OIDC), or exploit publicly accessible storage buckets and serverless endpoints to establish their first foothold.

View Initial Access on MITRE ATT&CK →