Preparation
Archive Data
Authorization Token Staging
Boot Order Manipulation
CCTV Enumeration
Circumventing Security Controls
Data Obfuscation
Data Staging
Delegated Preparation via Artificial Intelligence Agents
Device Mounting
Email Collection
External Media Formatting
File Download
File Exploration
Hardware-Based Remote Access (IP-KVM)
Impersonation
Increase Privileges
IT Ticketing System Exploration
Joiner
Media Capture via External Device
Mover
Network Scanning
On-Screen Data Collection
Oversight Circumvention and Control Degradation
Persistent Access via Bots
Physical Disk Removal
Physical Exploration
Physical Item Smuggling
Private / Incognito Browsing
Read Windows Registry
Remote Desktop (RDP)
Security Software Enumeration
Social Engineering (Outbound)
Software Installation
- Installation of Dark Web-Capable Browsers
- Installing Browser Extensions
- Installing Browsers
- Installing Cloud Storage Applications
- Installing FTP Clients
- Installing Messenger Applications
- Installing Note-Taking Applications
- Installing RDP Clients
- Installing Screen Sharing Software
- Installing SSH Clients
- Installing Virtual Machines
- Installing VPN Applications
Software or Access Request
Suspicious Web Browsing
Testing Ability to Print
VPN Usage
- ID: PR037.003
- Created: 25th March 2026
- Updated: 25th March 2026
- Contributors: The ITM Team, João Rodrigues,
Segregation of Duties Circumvention
A subject consolidates control authority by obtaining, retaining, or exploiting permissions that allow them to perform multiple stages of a controlled process without independent oversight.
This includes scenarios where the subject holds or acquires overlapping roles that are intended to remain separate, such as the ability to request and approve actions, initiate and authorize transactions, or develop and deploy changes. The behavior may arise from misconfigured access controls, privilege accumulation over time, or informal deviations from defined role boundaries.
The defining characteristic of this behavior is the structural collapse of role separation, where control mechanisms designed to enforce independence are no longer effective.
By eliminating separation between responsibilities, the subject creates conditions in which actions can be completed without challenge or verification. This removes a foundational safeguard against error, misuse, and unauthorized activity, significantly increasing the likelihood that subsequent infringement can occur undetected.