© 2021, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
What do we need to know to answer this question?
Common attack paths
Main theme of attack scenarios
TTP (Tactics, Techniques & Procedures) used by
attackers
Control effectiveness
Residual risk