Preventions
- Home
- - Preventions
- -PV023
- ID: PV023
- Created: 19th June 2024
- Updated: 19th June 2024
- Contributor: The ITM Team
Access Reviews
Routine reviews of user accounts and their associated privileges and permissions should be conducted to identify overly-permissive accounts, or accounts that are no longer required to be active.
Sections
ID | Name | Description |
---|---|---|
ME021 | Unrevoked Access | The subject has left the organization but still has access to services or data that is reserved for employees. |
MT015 | Recklessness | The subject does not have a threatening motive. However, the subject under takes actions without due care and attention to the outcome, which causes an infringement. |
PR024 | Increase Privileges | A subject uses a mechanism to increase or add privileges assigned to a user account under their control. This enables them to access systems, services, or data that is not possible with their standard permissions. |
AF019 | Decrease Privileges | A subject uses a mechanism to decrease or remove the privileges assigned to a user account under their control. This may represent an anti-forensics technique where the subject attempts to obscure previously held privileges that could associate them with activity relating to an infringement. |
ME021.001 | User Account Credentials | User credentials that were available to the subject during employment are not revoked and can still be used. |
ME021.002 | Web Service Credentials | Web credentials that were available to the subject during employment are not revoked and can still be used. |
ME021.003 | Physical Access Credentials | Physical security credentials, such as an ID card or physical keys, that were available to the subject during employment are not revoked and can still be used. |
ME021.004 | API Keys | API keys that were available to the subject during employment are not revoked and can still be used. |
ME021.005 | SSH Keys | SSH keys that were available to the subject during employment are not revoked and can still be used. |
AF018.002 | Environment Tripwires | The subject develops a custom API that monitors specific activities, network traffic, and system changes within the target environment. The API could monitor HTTP/HTTPS requests directed at sensitive endpoints, track modifications to security group settings (such as firewalls or access policies), and identify administrative actions like changes to user accounts, data access requests, or logging configurations.
This tripwire API is embedded within various parts of the environment:
Once deployed, the tripwire API continuously monitors network traffic, API calls, and system changes for indicators of an investigation. It looks for:
The API can use whitelists for expected IP addresses or user accounts, triggering alerts if unexpected access occurs.
Upon detecting activity, the API tripwire can take immediate evasive actions:
|
PR020.002 | Modification of Sensitivity Labels | The subject modifies or downgrades the sensitivity label of a file in an attempt to bypass DLP or other security controls. |
PR020.003 | Misclassification of Sensitivity Labels | The subject intentionally misclassifies the sensitivity label of a file in an attempt to bypass DLP or other security controls. |