All Downloads are FREE. Search and download functionalities are using the official Maven repository.

com.google.cloud.securitycenter.v1.MitreAttackProto Maven / Gradle / Ivy

There is a newer version: 2.63.0
Show newest version
/*
 * Copyright 2024 Google LLC
 *
 * Licensed under the Apache License, Version 2.0 (the "License");
 * you may not use this file except in compliance with the License.
 * You may obtain a copy of the License at
 *
 *     https://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 */
// Generated by the protocol buffer compiler.  DO NOT EDIT!
// source: google/cloud/securitycenter/v1/mitre_attack.proto

// Protobuf Java Version: 3.25.5
package com.google.cloud.securitycenter.v1;

public final class MitreAttackProto {
  private MitreAttackProto() {}

  public static void registerAllExtensions(com.google.protobuf.ExtensionRegistryLite registry) {}

  public static void registerAllExtensions(com.google.protobuf.ExtensionRegistry registry) {
    registerAllExtensions((com.google.protobuf.ExtensionRegistryLite) registry);
  }

  static final com.google.protobuf.Descriptors.Descriptor
      internal_static_google_cloud_securitycenter_v1_MitreAttack_descriptor;
  static final com.google.protobuf.GeneratedMessageV3.FieldAccessorTable
      internal_static_google_cloud_securitycenter_v1_MitreAttack_fieldAccessorTable;

  public static com.google.protobuf.Descriptors.FileDescriptor getDescriptor() {
    return descriptor;
  }

  private static com.google.protobuf.Descriptors.FileDescriptor descriptor;

  static {
    java.lang.String[] descriptorData = {
      "\n1google/cloud/securitycenter/v1/mitre_a"
          + "ttack.proto\022\036google.cloud.securitycenter"
          + ".v1\"\274\023\n\013MitreAttack\022J\n\016primary_tactic\030\001 "
          + "\001(\01622.google.cloud.securitycenter.v1.Mit"
          + "reAttack.Tactic\022Q\n\022primary_techniques\030\002 "
          + "\003(\01625.google.cloud.securitycenter.v1.Mit"
          + "reAttack.Technique\022N\n\022additional_tactics"
          + "\030\003 \003(\01622.google.cloud.securitycenter.v1."
          + "MitreAttack.Tactic\022T\n\025additional_techniq"
          + "ues\030\004 \003(\01625.google.cloud.securitycenter."
          + "v1.MitreAttack.Technique\022\017\n\007version\030\005 \001("
          + "\t\"\264\002\n\006Tactic\022\026\n\022TACTIC_UNSPECIFIED\020\000\022\022\n\016"
          + "RECONNAISSANCE\020\001\022\030\n\024RESOURCE_DEVELOPMENT"
          + "\020\002\022\022\n\016INITIAL_ACCESS\020\005\022\r\n\tEXECUTION\020\003\022\017\n"
          + "\013PERSISTENCE\020\006\022\030\n\024PRIVILEGE_ESCALATION\020\010"
          + "\022\023\n\017DEFENSE_EVASION\020\007\022\025\n\021CREDENTIAL_ACCE"
          + "SS\020\t\022\r\n\tDISCOVERY\020\n\022\024\n\020LATERAL_MOVEMENT\020"
          + "\013\022\016\n\nCOLLECTION\020\014\022\027\n\023COMMAND_AND_CONTROL"
          + "\020\004\022\020\n\014EXFILTRATION\020\r\022\n\n\006IMPACT\020\016\"\237\016\n\tTec"
          + "hnique\022\031\n\025TECHNIQUE_UNSPECIFIED\020\000\022\020\n\014MAS"
          + "QUERADING\0201\022%\n!MATCH_LEGITIMATE_NAME_OR_"
          + "LOCATION\0202\022(\n$BOOT_OR_LOGON_INITIALIZATI"
          + "ON_SCRIPTS\020%\022\021\n\rSTARTUP_ITEMS\020&\022\035\n\031NETWO"
          + "RK_SERVICE_DISCOVERY\020 \022\025\n\021PROCESS_DISCOV"
          + "ERY\0208\022%\n!COMMAND_AND_SCRIPTING_INTERPRET"
          + "ER\020\006\022\016\n\nUNIX_SHELL\020\007\022\n\n\006PYTHON\020;\022)\n%EXPL"
          + "OITATION_FOR_PRIVILEGE_ESCALATION\020?\022\037\n\033P"
          + "ERMISSION_GROUPS_DISCOVERY\020\022\022\020\n\014CLOUD_GR"
          + "OUPS\020\023\022#\n\037INDICATOR_REMOVAL_FILE_DELETIO"
          + "N\020@\022\036\n\032APPLICATION_LAYER_PROTOCOL\020-\022\007\n\003D"
          + "NS\020.\022\035\n\031SOFTWARE_DEPLOYMENT_TOOLS\020/\022\022\n\016V"
          + "ALID_ACCOUNTS\020\016\022\024\n\020DEFAULT_ACCOUNTS\020#\022\022\n"
          + "\016LOCAL_ACCOUNTS\020\017\022\022\n\016CLOUD_ACCOUNTS\020\020\022\t\n"
          + "\005PROXY\020\t\022\022\n\016EXTERNAL_PROXY\020\n\022\023\n\017MULTI_HO"
          + "P_PROXY\020\013\022\030\n\024ACCOUNT_MANIPULATION\020\026\022 \n\034A"
          + "DDITIONAL_CLOUD_CREDENTIALS\020(\022\027\n\023SSH_AUT"
          + "HORIZED_KEYS\020\027\022&\n\"ADDITIONAL_CONTAINER_C"
          + "LUSTER_ROLES\020:\022\031\n\025INGRESS_TOOL_TRANSFER\020"
          + "\003\022\016\n\nNATIVE_API\020\004\022\017\n\013BRUTE_FORCE\020,\022\022\n\016SH"
          + "ARED_MODULES\020\005\022\035\n\031ACCESS_TOKEN_MANIPULAT"
          + "ION\020!\022 \n\034TOKEN_IMPERSONATION_OR_THEFT\020\'\022"
          + "%\n!EXPLOIT_PUBLIC_FACING_APPLICATION\020\033\022\036"
          + "\n\032DOMAIN_POLICY_MODIFICATION\020\036\022\024\n\020DATA_D"
          + "ESTRUCTION\020\035\022\020\n\014SERVICE_STOP\0204\022\033\n\027INHIBI"
          + "T_SYSTEM_RECOVERY\020$\022\026\n\022RESOURCE_HIJACKIN"
          + "G\020\010\022\035\n\031NETWORK_DENIAL_OF_SERVICE\020\021\022\033\n\027CL"
          + "OUD_SERVICE_DISCOVERY\0200\022\"\n\036STEAL_APPLICA"
          + "TION_ACCESS_TOKEN\020*\022\032\n\026ACCOUNT_ACCESS_RE"
          + "MOVAL\0203\022\034\n\030STEAL_WEB_SESSION_COOKIE\020\031\022#\n"
          + "\037CREATE_OR_MODIFY_SYSTEM_PROCESS\020\030\022%\n!AB"
          + "USE_ELEVATION_CONTROL_MECHANISM\020\"\022\031\n\025UNS"
          + "ECURED_CREDENTIALS\020\r\022!\n\035MODIFY_AUTHENTIC"
          + "ATION_PROCESS\020\034\022\023\n\017IMPAIR_DEFENSES\020\037\022\033\n\027"
          + "DISABLE_OR_MODIFY_TOOLS\0207\022!\n\035EXFILTRATIO"
          + "N_OVER_WEB_SERVICE\020\024\022!\n\035EXFILTRATION_TO_"
          + "CLOUD_STORAGE\020\025\022\026\n\022DYNAMIC_RESOLUTION\020\014\022"
          + "\031\n\025LATERAL_TOOL_TRANSFER\020)\022\'\n#MODIFY_CLO"
          + "UD_COMPUTE_INFRASTRUCTURE\020\032\022\023\n\017CREATE_SN"
          + "APSHOT\0206\022\"\n\036CLOUD_INFRASTRUCTURE_DISCOVE"
          + "RY\0205\022\027\n\023OBTAIN_CAPABILITIES\020+\022\023\n\017ACTIVE_"
          + "SCANNING\020\001\022\026\n\022SCANNING_IP_BLOCKS\020\002\022$\n CO"
          + "NTAINER_ADMINISTRATION_COMMAND\020<\022\022\n\016ESCA"
          + "PE_TO_HOST\020=\022$\n CONTAINER_AND_RESOURCE_D"
          + "ISCOVERY\0209\022.\n*STEAL_OR_FORGE_AUTHENTICAT"
          + "ION_CERTIFICATES\020>B\352\001\n\"com.google.cloud."
          + "securitycenter.v1B\020MitreAttackProtoP\001ZJc"
          + "loud.google.com/go/securitycenter/apiv1/"
          + "securitycenterpb;securitycenterpb\252\002\036Goog"
          + "le.Cloud.SecurityCenter.V1\312\002\036Google\\Clou"
          + "d\\SecurityCenter\\V1\352\002!Google::Cloud::Sec"
          + "urityCenter::V1b\006proto3"
    };
    descriptor =
        com.google.protobuf.Descriptors.FileDescriptor.internalBuildGeneratedFileFrom(
            descriptorData, new com.google.protobuf.Descriptors.FileDescriptor[] {});
    internal_static_google_cloud_securitycenter_v1_MitreAttack_descriptor =
        getDescriptor().getMessageTypes().get(0);
    internal_static_google_cloud_securitycenter_v1_MitreAttack_fieldAccessorTable =
        new com.google.protobuf.GeneratedMessageV3.FieldAccessorTable(
            internal_static_google_cloud_securitycenter_v1_MitreAttack_descriptor,
            new java.lang.String[] {
              "PrimaryTactic",
              "PrimaryTechniques",
              "AdditionalTactics",
              "AdditionalTechniques",
              "Version",
            });
  }

  // @@protoc_insertion_point(outer_class_scope)
}




© 2015 - 2024 Weber Informatics LLC | Privacy Policy