Critical Infrastructure Cybersecurity Framework
T1078Initial Access6 Mitigations

Valid Accounts

Adversaries may obtain and abuse credentials of existing accounts as a means of gaining Initial Access.

Description

Adversaries may obtain and abuse credentials of existing accounts as a means of gaining Initial Access.

Available Mitigations

This technique can be mitigated using 6 documented security measures.

Account Use PoliciesAuditMulti-factor AuthenticationPassword PoliciesPrivileged Account Management+1 more

Quick Info

Technique ID
T1078
Sub-Techniques
4
Mitigations
6

By using this website, you agree to our legal documents. Please review our Privacy Policy, Terms of Use, and Accessibility Statement in the footer.