Critical Infrastructure Cybersecurity Framework
T1552Cred Access3 Mitigations

Unsecured Credentials

Adversaries may search compromised systems to find and obtain insecurely stored credentials.

Description

Adversaries may search compromised systems to find and obtain insecurely stored credentials.

Available Mitigations

This technique can be mitigated using 3 documented security measures.

AuditEncrypt Sensitive InformationPassword Policies

Quick Info

Technique ID
T1552
Sub-Techniques
8
Mitigations
3

By using this website, you agree to our legal documents. Please review our Privacy Policy, Terms of Use, and Accessibility Statement in the footer.