All Downloads are FREE. Search and download functionalities are using the official Maven repository.

com.google.cloud.securitycenter.v1.MitreAttackProto Maven / Gradle / Ivy

There is a newer version: 2.62.0
Show newest version
/*
 * Copyright 2024 Google LLC
 *
 * Licensed under the Apache License, Version 2.0 (the "License");
 * you may not use this file except in compliance with the License.
 * You may obtain a copy of the License at
 *
 *     https://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 */
// Generated by the protocol buffer compiler.  DO NOT EDIT!
// source: google/cloud/securitycenter/v1/mitre_attack.proto

// Protobuf Java Version: 3.25.3
package com.google.cloud.securitycenter.v1;

public final class MitreAttackProto {
  private MitreAttackProto() {}

  public static void registerAllExtensions(com.google.protobuf.ExtensionRegistryLite registry) {}

  public static void registerAllExtensions(com.google.protobuf.ExtensionRegistry registry) {
    registerAllExtensions((com.google.protobuf.ExtensionRegistryLite) registry);
  }

  static final com.google.protobuf.Descriptors.Descriptor
      internal_static_google_cloud_securitycenter_v1_MitreAttack_descriptor;
  static final com.google.protobuf.GeneratedMessageV3.FieldAccessorTable
      internal_static_google_cloud_securitycenter_v1_MitreAttack_fieldAccessorTable;

  public static com.google.protobuf.Descriptors.FileDescriptor getDescriptor() {
    return descriptor;
  }

  private static com.google.protobuf.Descriptors.FileDescriptor descriptor;

  static {
    java.lang.String[] descriptorData = {
      "\n1google/cloud/securitycenter/v1/mitre_a"
          + "ttack.proto\022\036google.cloud.securitycenter"
          + ".v1\"\366\021\n\013MitreAttack\022J\n\016primary_tactic\030\001 "
          + "\001(\01622.google.cloud.securitycenter.v1.Mit"
          + "reAttack.Tactic\022Q\n\022primary_techniques\030\002 "
          + "\003(\01625.google.cloud.securitycenter.v1.Mit"
          + "reAttack.Technique\022N\n\022additional_tactics"
          + "\030\003 \003(\01622.google.cloud.securitycenter.v1."
          + "MitreAttack.Tactic\022T\n\025additional_techniq"
          + "ues\030\004 \003(\01625.google.cloud.securitycenter."
          + "v1.MitreAttack.Technique\022\017\n\007version\030\005 \001("
          + "\t\"\264\002\n\006Tactic\022\026\n\022TACTIC_UNSPECIFIED\020\000\022\022\n\016"
          + "RECONNAISSANCE\020\001\022\030\n\024RESOURCE_DEVELOPMENT"
          + "\020\002\022\022\n\016INITIAL_ACCESS\020\005\022\r\n\tEXECUTION\020\003\022\017\n"
          + "\013PERSISTENCE\020\006\022\030\n\024PRIVILEGE_ESCALATION\020\010"
          + "\022\023\n\017DEFENSE_EVASION\020\007\022\025\n\021CREDENTIAL_ACCE"
          + "SS\020\t\022\r\n\tDISCOVERY\020\n\022\024\n\020LATERAL_MOVEMENT\020"
          + "\013\022\016\n\nCOLLECTION\020\014\022\027\n\023COMMAND_AND_CONTROL"
          + "\020\004\022\020\n\014EXFILTRATION\020\r\022\n\n\006IMPACT\020\016\"\331\014\n\tTec"
          + "hnique\022\031\n\025TECHNIQUE_UNSPECIFIED\020\000\022\020\n\014MAS"
          + "QUERADING\0201\022%\n!MATCH_LEGITIMATE_NAME_OR_"
          + "LOCATION\0202\022(\n$BOOT_OR_LOGON_INITIALIZATI"
          + "ON_SCRIPTS\020%\022\021\n\rSTARTUP_ITEMS\020&\022\035\n\031NETWO"
          + "RK_SERVICE_DISCOVERY\020 \022\025\n\021PROCESS_DISCOV"
          + "ERY\0208\022%\n!COMMAND_AND_SCRIPTING_INTERPRET"
          + "ER\020\006\022\016\n\nUNIX_SHELL\020\007\022\037\n\033PERMISSION_GROUP"
          + "S_DISCOVERY\020\022\022\020\n\014CLOUD_GROUPS\020\023\022\036\n\032APPLI"
          + "CATION_LAYER_PROTOCOL\020-\022\007\n\003DNS\020.\022\035\n\031SOFT"
          + "WARE_DEPLOYMENT_TOOLS\020/\022\022\n\016VALID_ACCOUNT"
          + "S\020\016\022\024\n\020DEFAULT_ACCOUNTS\020#\022\022\n\016LOCAL_ACCOU"
          + "NTS\020\017\022\022\n\016CLOUD_ACCOUNTS\020\020\022\t\n\005PROXY\020\t\022\022\n\016"
          + "EXTERNAL_PROXY\020\n\022\023\n\017MULTI_HOP_PROXY\020\013\022\030\n"
          + "\024ACCOUNT_MANIPULATION\020\026\022 \n\034ADDITIONAL_CL"
          + "OUD_CREDENTIALS\020(\022\027\n\023SSH_AUTHORIZED_KEYS"
          + "\020\027\022&\n\"ADDITIONAL_CONTAINER_CLUSTER_ROLES"
          + "\020:\022\031\n\025INGRESS_TOOL_TRANSFER\020\003\022\016\n\nNATIVE_"
          + "API\020\004\022\017\n\013BRUTE_FORCE\020,\022\022\n\016SHARED_MODULES"
          + "\020\005\022\035\n\031ACCESS_TOKEN_MANIPULATION\020!\022 \n\034TOK"
          + "EN_IMPERSONATION_OR_THEFT\020\'\022%\n!EXPLOIT_P"
          + "UBLIC_FACING_APPLICATION\020\033\022\036\n\032DOMAIN_POL"
          + "ICY_MODIFICATION\020\036\022\024\n\020DATA_DESTRUCTION\020\035"
          + "\022\020\n\014SERVICE_STOP\0204\022\033\n\027INHIBIT_SYSTEM_REC"
          + "OVERY\020$\022\026\n\022RESOURCE_HIJACKING\020\010\022\035\n\031NETWO"
          + "RK_DENIAL_OF_SERVICE\020\021\022\033\n\027CLOUD_SERVICE_"
          + "DISCOVERY\0200\022\"\n\036STEAL_APPLICATION_ACCESS_"
          + "TOKEN\020*\022\032\n\026ACCOUNT_ACCESS_REMOVAL\0203\022\034\n\030S"
          + "TEAL_WEB_SESSION_COOKIE\020\031\022#\n\037CREATE_OR_M"
          + "ODIFY_SYSTEM_PROCESS\020\030\022%\n!ABUSE_ELEVATIO"
          + "N_CONTROL_MECHANISM\020\"\022\031\n\025UNSECURED_CREDE"
          + "NTIALS\020\r\022!\n\035MODIFY_AUTHENTICATION_PROCES"
          + "S\020\034\022\023\n\017IMPAIR_DEFENSES\020\037\022\033\n\027DISABLE_OR_M"
          + "ODIFY_TOOLS\0207\022!\n\035EXFILTRATION_OVER_WEB_S"
          + "ERVICE\020\024\022!\n\035EXFILTRATION_TO_CLOUD_STORAG"
          + "E\020\025\022\026\n\022DYNAMIC_RESOLUTION\020\014\022\031\n\025LATERAL_T"
          + "OOL_TRANSFER\020)\022\'\n#MODIFY_CLOUD_COMPUTE_I"
          + "NFRASTRUCTURE\020\032\022\023\n\017CREATE_SNAPSHOT\0206\022\"\n\036"
          + "CLOUD_INFRASTRUCTURE_DISCOVERY\0205\022\027\n\023OBTA"
          + "IN_CAPABILITIES\020+\022\023\n\017ACTIVE_SCANNING\020\001\022\026"
          + "\n\022SCANNING_IP_BLOCKS\020\002\022$\n CONTAINER_AND_"
          + "RESOURCE_DISCOVERY\0209B\352\001\n\"com.google.clou"
          + "d.securitycenter.v1B\020MitreAttackProtoP\001Z"
          + "Jcloud.google.com/go/securitycenter/apiv"
          + "1/securitycenterpb;securitycenterpb\252\002\036Go"
          + "ogle.Cloud.SecurityCenter.V1\312\002\036Google\\Cl"
          + "oud\\SecurityCenter\\V1\352\002!Google::Cloud::S"
          + "ecurityCenter::V1b\006proto3"
    };
    descriptor =
        com.google.protobuf.Descriptors.FileDescriptor.internalBuildGeneratedFileFrom(
            descriptorData, new com.google.protobuf.Descriptors.FileDescriptor[] {});
    internal_static_google_cloud_securitycenter_v1_MitreAttack_descriptor =
        getDescriptor().getMessageTypes().get(0);
    internal_static_google_cloud_securitycenter_v1_MitreAttack_fieldAccessorTable =
        new com.google.protobuf.GeneratedMessageV3.FieldAccessorTable(
            internal_static_google_cloud_securitycenter_v1_MitreAttack_descriptor,
            new java.lang.String[] {
              "PrimaryTactic",
              "PrimaryTechniques",
              "AdditionalTactics",
              "AdditionalTechniques",
              "Version",
            });
  }

  // @@protoc_insertion_point(outer_class_scope)
}




© 2015 - 2024 Weber Informatics LLC | Privacy Policy