Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
14 changes: 7 additions & 7 deletions docs/administration/enterprise.md
Original file line number Diff line number Diff line change
Expand Up @@ -42,34 +42,34 @@ Be able to use AI for content generation including emails, media pressure articl

### CrowdStrike Falcon Agent

The CrowdStrike Falcon Agent can be leveraged to execute implants as detached processes that will then execute payloads
The CrowdStrike Falcon Agent can be leveraged to execute implants as detached processes that will then execute threat arsenal actions
according to the [OpenAEV architecture](../deployment/platform/overview.md#architecture)

### Tanium Agent

The Tanium Agent can be leveraged to execute implants as detached processes that will then execute payloads
The Tanium Agent can be leveraged to execute implants as detached processes that will then execute threat arsenal actions
according to the [OpenAEV architecture](../deployment/platform/overview.md#architecture)

### SentinelOne Agent

The SentinelOne Agent can be leveraged to execute implants as detached processes that will then execute payloads
The SentinelOne Agent can be leveraged to execute implants as detached processes that will then execute threat arsenal actions
according to the [OpenAEV architecture](../deployment/platform/overview.md#architecture)

### Palo Alto Cortex Agent

The Palo Alto Cortex Agent can be leveraged to execute implants as detached processes that will then execute payloads
The Palo Alto Cortex Agent can be leveraged to execute implants as detached processes that will then execute threat arsenal actions
according to the [OpenAEV architecture](../deployment/platform/overview.md#architecture).

On Windows, because Palo Alto Cortex whitelists its own process tree, OpenAEV creates a scheduled task to detach the process that will execute the payloads.
On Windows, because Palo Alto Cortex whitelists its own process tree, OpenAEV creates a scheduled task to detach the process that will execute the threat arsenal actions.

## Remediations in CVES

More detail: [CVES](taxonomies.md) and [Findings view](../usage/findings.md)
.

## Detection Remediation in Payloads and Injects
## Detection Remediation in Threat Arsenal Actions and Injects

More detail: [Detection remediations in payloads](../usage/payloads/payloads.md)
More detail: [Detection remediations in threat arsenal actions](../usage/threat-arsenals/threat-arsenals.md)
and [Atomic testing remediations](../usage/atomic.md).

## More to come
Expand Down
4 changes: 2 additions & 2 deletions docs/administration/taxonomies.md
Original file line number Diff line number Diff line change
Expand Up @@ -35,15 +35,15 @@ OpenAEV supports the following attack pattern models:

- **MITRE ATT&CK Framework (Enterprise, PRE, Mobile, and ICS)**

You can add, edit, or delete attack patterns in the settings page and assign them to payloads or injectors.
You can add, edit, or delete attack patterns in the settings page and assign them to threat arsenal actions or injectors.

## CVEs (EE)

CVEs (Common Vulnerabilities and Exposures) are standardized identifiers for publicly disclosed cybersecurity
vulnerabilities. Each CVE provides a unique reference, enabling consistent communication and tracking across tools and
teams.

In OpenAEV, CVEs are used to associate known vulnerabilities with assets, payloads, and injects. This allows users to
In OpenAEV, CVEs are used to associate known vulnerabilities with assets, threat arsenal actions, and injects. This allows users to
simulate attacks based on real-world flaws, enhancing the relevance and precision of security testing.

You can add, edit, or delete CVEs.
90 changes: 45 additions & 45 deletions docs/administration/users-and-rbac.md
Original file line number Diff line number Diff line change
Expand Up @@ -64,49 +64,49 @@ Capabilities in OpenAEV are organized hierarchically. A parent capability (e.g.

Below is a full list of capabilities in OpenAEV

| Capability | Description |
|:-----------|:------------|
| `Bypass (user has all rights)` | Grants unconditional access to all platform features, bypassing every individual capability check and any data segregation enforcement. |
| **Assessments: Scenarios, simulations and atomic testings** | |
| `Access assessment` | Read-only access to assessments, including scenarios, simulations and atomic tests. |
|   `Manage assessment` | Create and update assessments (scenarios, simulations, atomic tests). Requires *Access assessment*. |
|     `Delete assessment` | Permanently delete assessments. Requires *Manage assessment*. |
|   `Launch assessment` | Execute / run an assessment against defined targets. Requires *Access assessment*. |
| **Targets** | |
| `Access teams & players` | Read-only access to teams and player definitions used as assessment targets. |
|   `Manage teams & players` | Create and update teams and players. Requires *Access teams & players*. |
|     `Delete teams & players` | Permanently delete teams and players. Requires *Manage teams & players*. |
| `Access assets` | Read-only access to asset inventory (hosts, endpoints, and other infrastructure targets). |
|   `Manage assets` | Create and update assets in the inventory. Requires *Access assets*. |
|     `Delete assets` | Permanently delete assets from the inventory. Requires *Manage assets*. |
| `Access security platforms` | Read-only access to integrated security platform configurations (e.g. SIEM, EDR, firewall connectors). |
|   `Manage security platforms` | Create and update security platform integrations. Requires *Access security platforms*. |
|     `Delete security platforms` | Permanently delete security platform integrations. Requires *Manage security platforms*. |
| **Payloads** | |
| `Access payloads` | Read-only access to the payload library (attack scripts, tools, and techniques used in simulations). |
|   `Manage payloads` | Create and update payloads in the library. Requires *Access payloads*. |
|     `Delete payloads` | Permanently delete payloads from the library. Requires *Manage payloads*. |
| **Dashboards** | |
| `Access dashboards` | Read-only access to platform dashboards and their visualizations. |
|   `Manage dashboards` | Create, update, and configure dashboards. Requires *Access dashboards*. |
|     `Delete dashboards` | Permanently delete dashboards. Requires *Manage dashboards*. |
| **Findings** | |
| `Access findings` | Read-only access to assessment findings and results generated from simulations and atomic tests. |
| **Content** | |
| `Access documents` | Read-only access to documents stored in the platform (reports, attachments, playbooks). |
|   `Manage documents` | Upload, create, and update documents. Requires *Access documents*. |
|     `Delete documents` | Permanently delete documents. Requires *Manage documents*. |
| `Access channels` | Read-only access to communication channels used to deliver exercise injects to players. |
|   `Manage channels` | Create and update channels. Requires *Access channels*. |
|     `Delete channels` | Permanently delete channels. Requires *Manage channels*. |
| `Access challenges` | Read-only access to challenges (CTF-style tasks or objectives assigned to players during exercises). |
|   `Manage challenges` | Create and update challenges. Requires *Access challenges*. |
|     `Delete challenges` | Permanently delete challenges. Requires *Manage challenges*. |
| `Access lessons learned` | Read-only access to lessons learned records captured after assessments or exercises. |
|   `Manage lessons learned` | Create and update lessons learned entries. Requires *Access lessons learned*. |
|     `Delete lessons learned` | Permanently delete lessons learned entries. Requires *Manage lessons learned*. |
| **Platform Settings** | |
| `Access Platform Settings` | Read-only access to platform-wide configuration and administration settings. |
| Capability | Description |
|:-----------|:------------------------------------------------------------------------------------------------------------------------------------------|
| `Bypass (user has all rights)` | Grants unconditional access to all platform features, bypassing every individual capability check and any data segregation enforcement. |
| **Assessments: Scenarios, simulations and atomic testings** | |
| `Access assessment` | Read-only access to assessments, including scenarios, simulations and atomic tests. |
|   `Manage assessment` | Create and update assessments (scenarios, simulations, atomic tests). Requires *Access assessment*. |
|     `Delete assessment` | Permanently delete assessments. Requires *Manage assessment*. |
|   `Launch assessment` | Execute / run an assessment against defined targets. Requires *Access assessment*. |
| **Targets** | |
| `Access teams & players` | Read-only access to teams and player definitions used as assessment targets. |
|   `Manage teams & players` | Create and update teams and players. Requires *Access teams & players*. |
|     `Delete teams & players` | Permanently delete teams and players. Requires *Manage teams & players*. |
| `Access assets` | Read-only access to asset inventory (hosts, endpoints, and other infrastructure targets). |
|   `Manage assets` | Create and update assets in the inventory. Requires *Access assets*. |
|     `Delete assets` | Permanently delete assets from the inventory. Requires *Manage assets*. |
| `Access security platforms` | Read-only access to integrated security platform configurations (e.g. SIEM, EDR, firewall connectors). |
|   `Manage security platforms` | Create and update security platform integrations. Requires *Access security platforms*. |
|     `Delete security platforms` | Permanently delete security platform integrations. Requires *Manage security platforms*. |
| **threat arsenal actions** | |
| `Access threat arsenal actions` | Read-only access to the threat arsenal action library (attack scripts, tools, and techniques used in simulations). |
|   `Manage threat arsenal actions` | Create and update threat arsenal actions in the library. Requires *Access threat arsenal actions*. |
|     `Delete threat arsenal actions` | Permanently delete threat arsenal actions from the library. Requires *Manage threat arsenal actions*. |
| **Dashboards** | |
| `Access dashboards` | Read-only access to platform dashboards and their visualizations. |
|   `Manage dashboards` | Create, update, and configure dashboards. Requires *Access dashboards*. |
|     `Delete dashboards` | Permanently delete dashboards. Requires *Manage dashboards*. |
| **Findings** | |
| `Access findings` | Read-only access to assessment findings and results generated from simulations and atomic tests. |
| **Content** | |
| `Access documents` | Read-only access to documents stored in the platform (reports, attachments, playbooks). |
|   `Manage documents` | Upload, create, and update documents. Requires *Access documents*. |
|     `Delete documents` | Permanently delete documents. Requires *Manage documents*. |
| `Access channels` | Read-only access to communication channels used to deliver exercise injects to players. |
|   `Manage channels` | Create and update channels. Requires *Access channels*. |
|     `Delete channels` | Permanently delete channels. Requires *Manage channels*. |
| `Access challenges` | Read-only access to challenges (CTF-style tasks or objectives assigned to players during exercises). |
|   `Manage challenges` | Create and update challenges. Requires *Access challenges*. |
|     `Delete challenges` | Permanently delete challenges. Requires *Manage challenges*. |
| `Access lessons learned` | Read-only access to lessons learned records captured after assessments or exercises. |
|   `Manage lessons learned` | Create and update lessons learned entries. Requires *Access lessons learned*. |
|     `Delete lessons learned` | Permanently delete lessons learned entries. Requires *Manage lessons learned*. |
| **Platform Settings** | |
| `Access Platform Settings` | Read-only access to platform-wide configuration and administration settings. |
|   `Manage platform settings` | Modify platform-wide settings including security configuration, integrations, and system parameters. Requires *Access Platform Settings*. |


Expand Down Expand Up @@ -167,7 +167,7 @@ Beyond global **capabilities** defined in roles, OpenAEV also allows assigning m
- Scenarios
- Organizations
- Atomic testings
- Payloads
- threat arsenal actions
4. Select the specific items you want the group to access and assign the appropriate grant level.

![Manage grants](assets/manage-grants.png)
Expand Down Expand Up @@ -214,7 +214,7 @@ They do not need all capabilities — only access to the resources explicitly gr

A user can access these either through specific **grants**, or globally if the group has the **ASSESSMENT** capability (which overrides individual grants).

!!! tip "Payloads"
!!! tip "threat arsenal actions"

Access is given either through specific **grants**, or globally if the group has the **PAYLOAD** capability.

Expand Down
2 changes: 1 addition & 1 deletion docs/deployment/configuration.md
Original file line number Diff line number Diff line change
Expand Up @@ -147,7 +147,7 @@ reindex.
#### Agents (executors)

To be able to use the power of the OpenAEV platform on endpoints, you need at least one **neutral executor** that will
be in charge of executing implants as detached processes. Implants will then execute payloads.
be in charge of executing implants as detached processes. Implants will then execute threat arsenal actions.

##### OpenAEV Agent

Expand Down
Loading