Remote Services
Adversaries may use Valid Accounts to log into a service specifically designed to accept remote connections.
Description
Adversaries may use Valid Accounts to log into a service specifically designed to accept remote connections.
Available Mitigations
This technique can be mitigated using 4 documented security measures.
Limit Access to Resource Over NetworkMulti-factor AuthenticationNetwork SegmentationPrivileged Account Management
Quick Info
- Technique ID
- T1021
- Tactic
- Lateral Move
- Sub-Techniques
- 8
- Mitigations
- 4
