/*
 * Copyright 2020 Google LLC
 *
 * Licensed under the Apache License, Version 2.0 (the "License");
 * you may not use this file except in compliance with the License.
 * You may obtain a copy of the License at
 *
 *     https://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 */
// Generated by the protocol buffer compiler.  DO NOT EDIT!
// source: google/cloud/securitycenter/v1/mitre_attack.proto

package com.google.cloud.securitycenter.v1;

public final class MitreAttackProto {
  private MitreAttackProto() {}

  public static void registerAllExtensions(com.google.protobuf.ExtensionRegistryLite registry) {}

  public static void registerAllExtensions(com.google.protobuf.ExtensionRegistry registry) {
    registerAllExtensions((com.google.protobuf.ExtensionRegistryLite) registry);
  }

  static final com.google.protobuf.Descriptors.Descriptor
      internal_static_google_cloud_securitycenter_v1_MitreAttack_descriptor;
  static final com.google.protobuf.GeneratedMessageV3.FieldAccessorTable
      internal_static_google_cloud_securitycenter_v1_MitreAttack_fieldAccessorTable;

  public static com.google.protobuf.Descriptors.FileDescriptor getDescriptor() {
    return descriptor;
  }

  private static com.google.protobuf.Descriptors.FileDescriptor descriptor;

  static {
    java.lang.String[] descriptorData = {
      "\n1google/cloud/securitycenter/v1/mitre_a"
          + "ttack.proto\022\036google.cloud.securitycenter"
          + ".v1\"\350\014\n\013MitreAttack\022J\n\016primary_tactic\030\001 "
          + "\001(\01622.google.cloud.securitycenter.v1.Mit"
          + "reAttack.Tactic\022Q\n\022primary_techniques\030\002 "
          + "\003(\01625.google.cloud.securitycenter.v1.Mit"
          + "reAttack.Technique\022N\n\022additional_tactics"
          + "\030\003 \003(\01622.google.cloud.securitycenter.v1."
          + "MitreAttack.Tactic\022T\n\025additional_techniq"
          + "ues\030\004 \003(\01625.google.cloud.securitycenter."
          + "v1.MitreAttack.Technique\022\017\n\007version\030\005 \001("
          + "\t\"\264\002\n\006Tactic\022\026\n\022TACTIC_UNSPECIFIED\020\000\022\022\n\016"
          + "RECONNAISSANCE\020\001\022\030\n\024RESOURCE_DEVELOPMENT"
          + "\020\002\022\022\n\016INITIAL_ACCESS\020\005\022\r\n\tEXECUTION\020\003\022\017\n"
          + "\013PERSISTENCE\020\006\022\030\n\024PRIVILEGE_ESCALATION\020\010"
          + "\022\023\n\017DEFENSE_EVASION\020\007\022\025\n\021CREDENTIAL_ACCE"
          + "SS\020\t\022\r\n\tDISCOVERY\020\n\022\024\n\020LATERAL_MOVEMENT\020"
          + "\013\022\016\n\nCOLLECTION\020\014\022\027\n\023COMMAND_AND_CONTROL"
          + "\020\004\022\020\n\014EXFILTRATION\020\r\022\n\n\006IMPACT\020\016\"\313\007\n\tTec"
          + "hnique\022\031\n\025TECHNIQUE_UNSPECIFIED\020\000\022\023\n\017ACT"
          + "IVE_SCANNING\020\001\022\026\n\022SCANNING_IP_BLOCKS\020\002\022\031"
          + "\n\025INGRESS_TOOL_TRANSFER\020\003\022\016\n\nNATIVE_API\020"
          + "\004\022\022\n\016SHARED_MODULES\020\005\022%\n!COMMAND_AND_SCR"
          + "IPTING_INTERPRETER\020\006\022\016\n\nUNIX_SHELL\020\007\022\026\n\022"
          + "RESOURCE_HIJACKING\020\010\022\t\n\005PROXY\020\t\022\022\n\016EXTER"
          + "NAL_PROXY\020\n\022\023\n\017MULTI_HOP_PROXY\020\013\022\026\n\022DYNA"
          + "MIC_RESOLUTION\020\014\022\031\n\025UNSECURED_CREDENTIAL"
          + "S\020\r\022\022\n\016VALID_ACCOUNTS\020\016\022\022\n\016LOCAL_ACCOUNT"
          + "S\020\017\022\022\n\016CLOUD_ACCOUNTS\020\020\022\035\n\031NETWORK_DENIA"
          + "L_OF_SERVICE\020\021\022\037\n\033PERMISSION_GROUPS_DISC"
          + "OVERY\020\022\022\020\n\014CLOUD_GROUPS\020\023\022!\n\035EXFILTRATIO"
          + "N_OVER_WEB_SERVICE\020\024\022!\n\035EXFILTRATION_TO_"
          + "CLOUD_STORAGE\020\025\022\030\n\024ACCOUNT_MANIPULATION\020"
          + "\026\022\027\n\023SSH_AUTHORIZED_KEYS\020\027\022#\n\037CREATE_OR_"
          + "MODIFY_SYSTEM_PROCESS\020\030\022\034\n\030STEAL_WEB_SES"
          + "SION_COOKIE\020\031\022\'\n#MODIFY_CLOUD_COMPUTE_IN"
          + "FRASTRUCTURE\020\032\022%\n!EXPLOIT_PUBLIC_FACING_"
          + "APPLICATION\020\033\022!\n\035MODIFY_AUTHENTICATION_P"
          + "ROCESS\020\034\022\024\n\020DATA_DESTRUCTION\020\035\022\036\n\032DOMAIN"
          + "_POLICY_MODIFICATION\020\036\022\023\n\017IMPAIR_DEFENSE"
          + "S\020\037\022\035\n\031NETWORK_SERVICE_DISCOVERY\020 \022\035\n\031AC"
          + "CESS_TOKEN_MANIPULATION\020!\022%\n!ABUSE_ELEVA"
          + "TION_CONTROL_MECHANISM\020\"\022\024\n\020DEFAULT_ACCO"
          + "UNTS\020#B\352\001\n\"com.google.cloud.securitycent"
          + "er.v1B\020MitreAttackProtoP\001ZJcloud.google."
          + "com/go/securitycenter/apiv1/securitycent"
          + "erpb;securitycenterpb\252\002\036Google.Cloud.Sec"
          + "urityCenter.V1\312\002\036Google\\Cloud\\SecurityCe"
          + "nter\\V1\352\002!Google::Cloud::SecurityCenter:"
          + ":V1b\006proto3"
    };
    descriptor =
        com.google.protobuf.Descriptors.FileDescriptor.internalBuildGeneratedFileFrom(
            descriptorData, new com.google.protobuf.Descriptors.FileDescriptor[] {});
    internal_static_google_cloud_securitycenter_v1_MitreAttack_descriptor =
        getDescriptor().getMessageTypes().get(0);
    internal_static_google_cloud_securitycenter_v1_MitreAttack_fieldAccessorTable =
        new com.google.protobuf.GeneratedMessageV3.FieldAccessorTable(
            internal_static_google_cloud_securitycenter_v1_MitreAttack_descriptor,
            new java.lang.String[] {
              "PrimaryTactic",
              "PrimaryTechniques",
              "AdditionalTactics",
              "AdditionalTechniques",
              "Version",
            });
  }

  // @@protoc_insertion_point(outer_class_scope)
}
