Manage the creation, modification, use, and permissions associated to user accounts.
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1197 | BITS任务 |
Consider limiting access to the BITS interface to specific users or groups.[1] |
|
| Enterprise | T1047 | Windows管理规范 |
By default, only administrators are allowed to connect remotely using WMI. Restrict other users who are allowed to connect, or disallow all users to connect remotely to WMI. |
|
| Enterprise | T1546 | .003 | 事件触发执行: Windows Management Instrumentation Event Subscription |
By default, only administrators are allowed to connect remotely using WMI; restrict other users that are allowed to connect, or disallow all users from connecting remotely to WMI. |
| Enterprise | T1580 | 云基础设施发现 |
Limit permissions to discover cloud infrastructure in accordance with least privilege. Organizations should limit the number of users within the organization with an IAM role that has administrative privileges, strive to reduce all permanent privileged role assignments, and conduct periodic entitlement reviews on IAM users, roles and policies. |
|
| Enterprise | T1619 | 云存储对象发现 |
Restrict granting of permissions related to listing objects in cloud storage to necessary accounts. |
|
| Enterprise | T1538 | 云服务控制面板 |
Enforce the principle of least-privilege by limiting dashboard visibility to only the resources required. This may limit the discovery value of the dashboard in the event of a compromised account. |
|
| Enterprise | T1530 | 从云存储获取数据 |
Configure user permissions groups and roles for access to cloud storage.[2] Implement strict Identity and Access Management (IAM) controls to prevent access to storage solutions except for the applications, users, and services that require access.[3] Ensure that temporary access tokens are issued rather than permanent credentials, especially when access is being granted to entities outside of the internal security boundary.[4] |
|
| Enterprise | T1213 | 从信息存储库获取数据 |
Enforce the principle of least-privilege. Consider implementing access control mechanisms that include both authentication and authorization. |
|
| .001 | Confluence |
Enforce the principle of least-privilege. Consider implementing access control mechanisms that include both authentication and authorization. |
||
| .002 | Sharepoint |
Enforce the principle of least-privilege. Consider implementing access control mechanisms that include both authentication and authorization. |
||
| .003 | Code Repositories |
Enforce the principle of least-privilege. Consider implementing access control mechanisms that include both authentication and authorization for code repositories. |
||
| .004 | Customer Relationship Management Software |
Enforce the principle of least-privilege. Consider implementing access control mechanisms that include both authentication and authorization. |
||
| Enterprise | T1555 | .003 | 从密码存储中获取凭证: Credentials from Web Browsers |
Implement strict user account management policies to prevent unnecessary accounts from accessing sensitive systems. Regularly audit user accounts to identify and disable inactive accounts that may be targeted by attackers to extract credentials or gain unauthorized access. |
| .005 | 从密码存储中获取凭证: Password Managers |
Implement strict user account management policies to prevent unnecessary accounts from accessing sensitive systems. Regularly audit user accounts to identify and disable inactive accounts that may be targeted by attackers to extract credentials or gain unauthorized access. |
||
| Enterprise | T1537 | 传输数据至云账户 |
Limit user account and IAM policies to the least privileges required. |
|
| Enterprise | T1036 | 伪装 |
Consider defining and enforcing a naming convention for user accounts to more easily spot generic account names that do not fit the typical schema. |
|
| .010 | Masquerade Account Name |
Consider defining and enforcing a naming convention for user accounts to more easily spot generic account names that do not fit the typical schema. |
||
| Enterprise | T1606 | 伪造Web凭证 |
Ensure that user accounts with administrative rights follow best practices, including use of privileged access workstations, Just in Time/Just Enough Administration (JIT/JEA), and strong authentication. Reduce the number of users that are members of highly privileged Directory Roles.[5] In AWS environments, prohibit users from calling the |
|
| .002 | SAML Tokens |
Ensure that user accounts with administrative rights follow best practices, including use of privileged access workstations, Just in Time/Just Enough Administration (JIT/JEA), and strong authentication. Reduce the number of users that are members of highly privileged Directory Roles.[5] |
||
| Enterprise | T1550 | 使用备用认证材料 |
Enforce the principle of least-privilege. Do not allow a domain user to be in the local administrator group on multiple systems. |
|
| .002 | Pass the Hash |
Do not allow a domain user to be in the local administrator group on multiple systems. |
||
| .003 | Pass the Ticket |
Do not allow a user to be a local administrator for multiple systems. |
||
| Enterprise | T1195 | 供应链破坏 |
Implement robust user account management practices to limit permissions associated with software execution. Ensure that software runs with the lowest necessary privileges, avoiding the use of root or administrator accounts when possible. By restricting permissions, you can minimize the risk of propagation and unauthorized actions in the event of a supply chain compromise, reducing the attack surface for adversaries to exploit within compromised systems. |
|
| Enterprise | T1199 | 信任关系 |
Properly manage accounts and permissions used by parties in trusted relationships to minimize potential abuse by the party and if the party is compromised by an adversary. In Office 365 environments, partner relationships and roles can be viewed under the "Partner Relationships" page.[7] |
|
| Enterprise | T1578 | 修改云计算基础设施 |
Limit permissions for creating, deleting, and otherwise altering compute components in accordance with least privilege. Organizations should limit the number of users within the organization with an IAM role that has administrative privileges, strive to reduce all permanent privileged role assignments, and conduct periodic entitlement reviews on IAM users, roles and policies.[8] |
|
| .001 | Create Snapshot |
Limit permissions for creating snapshots or backups in accordance with least privilege. Organizations should limit the number of users within the organization with an IAM role that has administrative privileges, strive to reduce all permanent privileged role assignments, and conduct periodic entitlement reviews on IAM users, roles and policies.[8] |
||
| .002 | Create Cloud Instance |
Limit permissions for creating new instances in accordance with least privilege. Organizations should limit the number of users within the organization with an IAM role that has administrative privileges, strive to reduce all permanent privileged role assignments, and conduct periodic entitlement reviews on IAM users, roles and policies.[8] |
||
| .003 | Delete Cloud Instance |
Limit permissions for deleting new instances in accordance with least privilege. Organizations should limit the number of users within the organization with an IAM role that has administrative privileges, strive to reduce all permanent privileged role assignments, and conduct periodic entitlement reviews on IAM users, roles and policies.[8] |
||
| .005 | Modify Cloud Compute Configurations |
Limit permissions to request quotas adjustments or modify tenant-level compute setting to only those required. |
||
| Enterprise | T1666 | 修改云资源层次结构 |
Limit permissions to add, delete, or modify resource groups to only those required. |
|
| Enterprise | T1556 | 修改身份验证过程 |
Ensure that proper policies are implemented to dictate the the secure enrollment and deactivation of authentication mechanisms, such as MFA, for user accounts. |
|
| .006 | Multi-Factor Authentication |
Ensure that proper policies are implemented to dictate the secure enrollment and deactivation of MFA for user accounts. |
||
| .009 | Conditional Access Policies |
Limit permissions to modify conditional access policies to only those required. |
||
| Enterprise | T1543 | 创建或修改系统进程 |
Limit privileges of user accounts and groups so that only authorized administrators can interact with system-level process changes and service configurations. |
|
| .002 | Systemd Service |
Limit user access to system utilities such as |
||
| .003 | Windows Service |
Limit privileges of user accounts and groups so that only authorized administrators can interact with service changes and service configurations. |
||
| .004 | Launch Daemon |
Limit privileges of user accounts and remediate Privilege Escalation vectors so only authorized administrators can create new Launch Daemons. |
||
| .005 | Container Service |
Limit access to utilities such as docker to only users who have a legitimate need, especially if using docker in rootful mode. In Kubernetes environments, only grant privileges to deploy pods to users that require it. |
||
| Enterprise | T1574 | 劫持执行流 |
Limit privileges of user accounts and groups so that only authorized administrators can interact with service changes and service binary target path locations. Deny execution from user directories such as file download directories and temp directories where able. Ensure that proper permissions and directory access control are set to deny users the ability to write files to the top-level directory |
|
| .005 | Executable Installer File Permissions Weakness |
Limit privileges of user accounts and groups so that only authorized administrators can interact with service changes and service binary target path locations. Deny execution from user directories such as file download directories and temp directories where able. |
||
| .010 | Services File Permissions Weakness |
Limit privileges of user accounts and groups so that only authorized administrators can interact with service changes and service binary target path locations. Deny execution from user directories such as file download directories and temp directories where able. |
||
| .012 | COR_PROFILER |
Limit the privileges of user accounts so that only authorized administrators can edit system environment variables. |
||
| Enterprise | T1547 | .004 | 启动或登录自动启动执行: Winlogon Helper DLL |
Limit the privileges of user accounts so that only authorized administrators can perform Winlogon helper changes. |
| .006 | 启动或登录自动启动执行: Kernel Modules and Extensions |
Use MDM to disable user's ability to install or approve kernel extensions, and ensure all approved kernel extensions are in alignment with policies specified in |
||
| .009 | 启动或登录自动启动执行: Shortcut Modification |
Limit Privileges for Shortcut Creation: While the SeCreateSymbolicLinkPrivilege is not directly related to .lnk file creation, you should still enforce least privilege principles by limiting user rights to create and modify shortcuts, especially in system-critical locations. This can be done through GPO: Computer Configuration > [Policies] > Windows Settings > Security Settings > Local Policies > User Rights Assignment: Create symbolic links. [11] Regular User Permissions Review: Regularly review and audit user permissions to ensure that only necessary accounts have write access to startup folders and critical system directories. |
||
| .012 | 启动或登录自动启动执行: Print Processors |
Limit user accounts that can load or unload device drivers by disabling |
||
| .013 | 启动或登录自动启动执行: XDG Autostart Entries |
Limit privileges of user accounts so only authorized privileged users can create and modify XDG autostart entries. |
||
| Enterprise | T1059 | .008 | 命令与脚本解释器: Network Device CLI |
Use of Authentication, Authorization, and Accounting (AAA) systems will limit actions users can perform and provide a history of user actions to detect unauthorized use and abuse. Ensure least privilege principles are applied to user accounts and groups so that only authorized users can perform configuration changes. [12] |
| Enterprise | T1484 | 域或租户策略修改 |
Consider implementing WMI and security filtering to further tailor which users and computers a GPO will apply to.[13][14][15] |
|
| .001 | Group Policy Modification |
Consider implementing WMI and security filtering to further tailor which users and computers a GPO will apply to.[13][14][15] |
||
| .002 | Trust Modification |
In cloud environments, limit permissions to create new identity providers to only those accounts that require them. In AWS environments, consider using Service Control policies to limit the use of API calls such as |
||
| Enterprise | T1562 | 妨碍防御 |
Ensure proper user permissions are in place to prevent adversaries from disabling or interfering with security/logging services. |
|
| .001 | Disable or Modify Tools |
Ensure proper user permissions are in place to prevent adversaries from disabling or interfering with security services. |
||
| .002 | Disable Windows Event Logging |
Ensure proper user permissions are in place to prevent adversaries from disabling or interfering with logging. |
||
| .004 | Disable or Modify System Firewall |
Ensure proper user permissions are in place to prevent adversaries from disabling or modifying firewall settings. |
||
| .006 | Indicator Blocking |
Ensure event tracers/forwarders [16], firewall policies, and other associated mechanisms are secured with appropriate permissions and access controls and cannot be manipulated by user accounts. |
||
| .007 | Disable or Modify Cloud Firewall |
Ensure least privilege principles are applied to Identity and Access Management (IAM) security policies.[17] |
||
| .008 | Disable or Modify Cloud Logs |
Configure default account policy to enable logging. Manage policies to ensure only necessary users have permissions to make changes to logging policies. |
||
| .012 | Disable or Modify Linux Audit System |
An adversary must already have root level access on the local system to make full use of this technique; be sure to restrict users and accounts to the least privileges they require. |
||
| Enterprise | T1613 | 容器与资源发现 |
Enforce the principle of least privilege by limiting dashboard visibility to only the required users. When using Kubernetes, avoid giving users wildcard permissions or adding users to the |
|
| Enterprise | T1609 | 容器管理命令 |
Enforce authentication and role-based access control on the container service to restrict users to the least privileges required.[19] When using Kubernetes, avoid giving users wildcard permissions or adding users to the |
|
| Enterprise | T1485 | 数据销毁 |
In cloud environments, limit permissions to modify cloud bucket lifecycle policies (e.g., |
|
| .001 | Lifecycle-Triggered Deletion |
In cloud environments, limit permissions to modify cloud bucket lifecycle policies (e.g., |
||
| Enterprise | T1648 | 无服务器执行 |
Remove permissions to create, modify, or run serverless resources from users that do not explicitly require them. |
|
| Enterprise | T1654 | 日志枚举 |
Limit the ability to access and export sensitive logs to privileged accounts where possible. |
|
| Enterprise | T1110 | 暴力破解 |
Proactively reset accounts that are known to be part of breached credentials either immediately, or after detecting bruteforce attempts. |
|
| .004 | Credential Stuffing |
Proactively reset accounts that are known to be part of breached credentials either immediately, or after detecting bruteforce attempts. |
||
| Enterprise | T1048 | 替代协议渗出 |
Configure user permissions groups and roles for access to cloud storage.[2] Implement strict Identity and Access Management (IAM) controls to prevent access to storage solutions except for the applications, users, and services that require access.[3] Ensure that temporary access tokens are issued rather than permanent credentials, especially when access is being granted to entities outside of the internal security boundary.[4] |
|
| Enterprise | T1078 | 有效账户 |
Regularly audit user accounts for activity and deactivate or remove any that are no longer needed. |
|
| .002 | Domain Accounts |
Regularly review and manage domain accounts to ensure that only active, necessary accounts exist. Remove or disable inactive and unnecessary accounts to reduce the risk of adversaries abusing these accounts to gain unauthorized access or move laterally within the network. |
||
| .003 | Local Accounts |
Enforce user account management practices for local accounts to limit access and remove inactive or unused accounts. By doing so, you reduce the attack surface available to adversaries and prevent unauthorized access to local systems. |
||
| .004 | Cloud Accounts |
Periodically review user accounts and remove those that are inactive or unnecessary. Limit the ability for user accounts to create additional accounts. |
||
| Enterprise | T1489 | 服务停止 |
Limit privileges of user accounts and groups so that only authorized administrators can interact with service changes and service configurations. |
|
| Enterprise | T1505 | 服务器软件组件 |
Enforce the principle of least privilege by limiting privileges of user accounts so only authorized accounts can modify and/or add server software components.[20] |
|
| .003 | Web Shell |
Enforce the principle of least privilege by limiting privileges of user accounts so only authorized accounts can modify the web directory.[20] |
||
| Enterprise | T1552 | .007 | 未加密凭证: Container API |
Enforce authentication and role-based access control on the container API to restrict users to the least privileges required.[19] When using Kubernetes, avoid giving users wildcard permissions or adding users to the |
| Enterprise | T1185 | 浏览器会话劫持 |
Since browser pivoting requires a high integrity process to launch from, restricting user permissions and addressing Privilege Escalation and Bypass User Account Control opportunities can limit the exposure to this technique. |
|
| Enterprise | T1548 | 滥用权限提升控制机制 |
Limit the privileges of cloud accounts to assume, create, or impersonate additional roles, policies, and permissions to only those required. Where just-in-time access is enabled, consider requiring manual approval for temporary elevation of privileges. |
|
| .005 | Temporary Elevated Cloud Access |
Limit the privileges of cloud accounts to assume, create, or impersonate additional roles, policies, and permissions to only those required. Where just-in-time access is enabled, consider requiring manual approval for temporary elevation of privileges. |
||
| Enterprise | T1006 | 直接卷访问 |
Ensure only accounts required to configure and manage backups have the privileges to do so. Monitor these accounts for unauthorized backup activity. |
|
| Enterprise | T1528 | 窃取应用访问令牌 |
Enforce role-based access control to limit accounts to the least privileges they require. A Cloud Access Security Broker (CASB) can be used to set usage policies and manage user permissions on cloud applications to prevent access to application access tokens. In Kubernetes applications, set "automountServiceAccountToken: false" in the YAML specification of pods that do not require access to service account tokens.[19] |
|
| Enterprise | T1490 | 系统恢复抑制 |
Limit the user accounts that have access to backups to only those required. In AWS environments, consider using Service Control Policies to restrict API calls to delete backups, snapshots, and images. |
|
| Enterprise | T1569 | 系统服务 |
Prevent users from installing their own launch agents or launch daemons. |
|
| .001 | Launchctl |
Prevent users from installing their own launch agents or launch daemons. |
||
| Enterprise | T1040 | 网络嗅探 |
In cloud environments, ensure that users are not granted permissions to create or modify traffic mirrors unless this is explicitly required. |
|
| Enterprise | T1020 | .001 | 自动化渗出: Traffic Duplication |
In cloud environments, ensure that users are not granted permissions to create or modify traffic mirrors unless this is explicitly required. |
| Enterprise | T1134 | 访问令牌操控 |
An adversary must already have administrator level access on the local system to make full use of this technique; be sure to restrict users and accounts to the least privileges they require. |
|
| .001 | Token Impersonation/Theft |
An adversary must already have administrator level access on the local system to make full use of this technique; be sure to restrict users and accounts to the least privileges they require. |
||
| .002 | Create Process with Token |
An adversary must already have administrator level access on the local system to make full use of this technique; be sure to restrict users and accounts to the least privileges they require. |
||
| .003 | Make and Impersonate Token |
An adversary must already have administrator level access on the local system to make full use of this technique; be sure to restrict users and accounts to the least privileges they require. |
||
| Enterprise | T1657 | 财务窃取 |
Limit access/authority to execute sensitive transactions, and switch to systems and procedures designed to authenticate/approve payments and purchase requests outside of insecure communication lines such as email. |
|
| Enterprise | T1087 | 账号发现 |
Manage the creation, modification, use, and permissions associated to user accounts. |
|
| .004 | Cloud Account |
Limit permissions to discover cloud accounts in accordance with least privilege. Organizations should limit the number of users within the organization with an IAM role that has administrative privileges, strive to reduce all permanent privileged role assignments, and conduct periodic entitlement reviews on IAM users, roles and policies. |
||
| Enterprise | T1098 | 账号操控 |
Ensure that low-privileged user accounts do not have permissions to modify accounts or account-related policies. |
|
| .001 | Additional Cloud Credentials |
Ensure that low-privileged user accounts do not have permission to add access keys to accounts. In AWS environments, prohibit users from calling the |
||
| .003 | Additional Cloud Roles |
Ensure that low-privileged user accounts do not have permissions to add permissions to accounts or update IAM policies. |
||
| .004 | SSH Authorized Keys |
In cloud environments, ensure that only users who explicitly require the permissions to update instance metadata or configurations can do so. |
||
| .006 | Additional Container Cluster Roles |
Ensure that low-privileged accounts do not have permissions to add permissions to accounts or to update container cluster roles. |
||
| Enterprise | T1072 | 软件部署工具 |
Ensure that any accounts used by third-party providers to access these systems are traceable to the third-party and are not used throughout the network or used by other third-party providers in the same environment. Ensure there are regular reviews of accounts provisioned to these systems to verify continued business need, and ensure there is governance to trace de-provisioning of access that is no longer required. Ensure proper system and access isolation for critical network systems through use of account privilege separation. |
|
| Enterprise | T1021 | 远程服务 |
Limit the accounts that may use remote services. Limit the permissions for accounts that are at higher risk of compromise; for example, configure SSH so users can only run specific programs. |
|
| .001 | Remote Desktop Protocol |
Limit remote user permissions if remote access is necessary. |
||
| .004 | SSH |
Limit which user accounts are allowed to login via SSH. |
||
| .008 | Direct Cloud VM Connections |
Limit which users are allowed to access compute infrastructure via cloud native methods. |
||
| Enterprise | T1563 | 远程服务会话劫持 |
Limit remote user permissions if remote access is necessary. |
|
| .002 | RDP Hijacking |
Limit remote user permissions if remote access is necessary. |
||
| Enterprise | T1610 | 部署容器 |
Enforce the principle of least privilege by limiting container dashboard access to only the necessary users. When using Kubernetes, avoid giving users wildcard permissions or adding users to the |
|
| Enterprise | T1566 | .001 | 钓鱼: Spearphishing Attachment |
Apply user account management principles to limit permissions for accounts interacting with email attachments, ensuring that only necessary accounts have the ability to open or execute files. Restricting account privileges reduces the potential impact of malicious attachments by preventing unauthorized execution or spread of malware within the environment. |
| .002 | 钓鱼: Spearphishing Link |
Azure AD Administrators apply limitations upon the ability for users to grant consent to unfamiliar or unverified third-party applications. |
||
| .003 | 钓鱼: Spearphishing via Service |
Enforce strict user account management policies on third-party service accounts to control access and limit privileges. Configure accounts with the minimum permissions necessary to perform their roles and regularly review access levels. This minimizes the risk of adversaries exploiting service accounts to execute spearphishing attacks or gain unauthorized access to sensitive resources. |
||
| Enterprise | T1053 | 预定任务/作业 |
Limit privileges of user accounts and remediate Privilege Escalation vectors so only authorized administrators can create scheduled tasks on remote systems. |
|
| .002 | At |
Limit privileges of user accounts and remediate Privilege Escalation vectors so only authorized administrators can create scheduled tasks on remote systems. In Linux environments, users account-level access to |
||
| .003 | Cron |
|
||
| .005 | Scheduled Task |
Limit privileges of user accounts and remediate Privilege Escalation vectors so only authorized administrators can create scheduled tasks on remote systems. |
||
| .006 | Systemd Timers |
Limit user access to system utilities such as 'systemctl' or 'systemd-run' to users who have a legitimate need. |
||
| .007 | Container Orchestration Job |
Limit privileges of user accounts and remediate privilege escalation vectors so only authorized administrators can create container orchestration jobs. |
||