Critical Infrastructure Cybersecurity Framework
T1098Persistence3 Mitigations

Account Manipulation

Adversaries may manipulate accounts to maintain access to victim systems.

Description

Adversaries may manipulate accounts to maintain access to victim systems.

Available Mitigations

This technique can be mitigated using 3 documented security measures.

AuditPrivileged Account ManagementUser Account Management

Quick Info

Technique ID
T1098
Sub-Techniques
7
Mitigations
3

By using this website, you agree to our legal documents. Please review our Privacy Policy, Terms of Use, and Accessibility Statement in the footer.