T1078.004 Cloud Accounts Mappings

Adversaries may obtain and abuse credentials of a cloud account as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion. Cloud accounts are those created and configured by an organization for use by users, remote support, services, or for administration of resources within a cloud service provider or SaaS application. In some cases, cloud accounts may be federated with traditional identity management system, such as Window Active Directory.(Citation: AWS Identity Federation)(Citation: Google Federating GC)(Citation: Microsoft Deploying AD Federation)

Compromised credentials for cloud accounts can be used to harvest sensitive data from online storage accounts and databases. Access to cloud accounts can also be abused to gain Initial Access to a network by abusing a Trusted Relationship. Similar to Domain Accounts, compromise of federated cloud accounts may allow adversaries to more easily move laterally within an environment.

Once a cloud account is compromised, an adversary may perform Account Manipulation - for example, by adding Additional Cloud Roles - to maintain persistence and potentially escalate their privileges.

View in MITRE ATT&CK®

Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name
AC-2 Account Management Protects T1078.004 Cloud Accounts
AC-20 Use of External Systems Protects T1078.004 Cloud Accounts
AC-3 Access Enforcement Protects T1078.004 Cloud Accounts
AC-5 Separation of Duties Protects T1078.004 Cloud Accounts
AC-6 Least Privilege Protects T1078.004 Cloud Accounts
AC-7 Unsuccessful Logon Attempts Protects T1078.004 Cloud Accounts
CA-7 Continuous Monitoring Protects T1078.004 Cloud Accounts
CM-5 Access Restrictions for Change Protects T1078.004 Cloud Accounts
CM-6 Configuration Settings Protects T1078.004 Cloud Accounts
IA-12 Identity Proofing Protects T1078.004 Cloud Accounts
IA-2 Identification and Authentication (organizational Users) Protects T1078.004 Cloud Accounts
IA-5 Authenticator Management Protects T1078.004 Cloud Accounts
SA-10 Developer Configuration Management Protects T1078.004 Cloud Accounts
SA-11 Developer Testing and Evaluation Protects T1078.004 Cloud Accounts
SA-15 Development Process, Standards, and Tools Protects T1078.004 Cloud Accounts
SA-16 Developer-provided Training Protects T1078.004 Cloud Accounts
SA-17 Developer Security and Privacy Architecture and Design Protects T1078.004 Cloud Accounts
SA-3 System Development Life Cycle Protects T1078.004 Cloud Accounts
SA-4 Acquisition Process Protects T1078.004 Cloud Accounts
SA-8 Security and Privacy Engineering Principles Protects T1078.004 Cloud Accounts
SC-28 Protection of Information at Rest Protects T1078.004 Cloud Accounts
SI-4 System Monitoring Protects T1078.004 Cloud Accounts
action.hacking.variety.Use of stolen creds Use of stolen or default authentication credentials (including credential stuffing) related-to T1078.004 Valid Accounts: Cloud Accounts