Critical Infrastructure Cybersecurity Framework
T1134Priv Esc3 Mitigations

Access Token Manipulation

Adversaries may modify access tokens to operate under a different user or system security context.

Description

Adversaries may modify access tokens to operate under a different user or system security context.

Available Mitigations

This technique can be mitigated using 3 documented security measures.

Active Directory ConfigurationPrivileged Account ManagementPrivileged Process Integrity

Quick Info

Technique ID
T1134
Tactic
Priv Esc
Sub-Techniques
5
Mitigations
3

By using this website, you agree to our legal documents. Please review our Privacy Policy, Terms of Use, and Accessibility Statement in the footer.