Critical Infrastructure Cybersecurity Framework
T1548Priv Esc3 Mitigations

Abuse Elevation Control Mechanism

Adversaries may circumvent mechanisms designed to control elevated privileges to gain higher-level permissions.

Description

Adversaries may circumvent mechanisms designed to control elevated privileges to gain higher-level permissions.

Available Mitigations

This technique can be mitigated using 3 documented security measures.

Operating System ConfigurationPrivileged Account ManagementUser Account Control

Quick Info

Technique ID
T1548
Tactic
Priv Esc
Sub-Techniques
6
Mitigations
3

By using this website, you agree to our legal documents. Please review our Privacy Policy, Terms of Use, and Accessibility Statement in the footer.