T1078.003 Local Accounts Mappings

Adversaries may obtain and abuse credentials of a local account as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion. Local accounts are those configured by an organization for use by users, remote support, services, or for administration on a single system or service.

Local Accounts may also be abused to elevate privileges and harvest credentials through OS Credential Dumping. Password reuse may allow the abuse of local accounts across a set of machines on a network for the purposes of Privilege Escalation and Lateral Movement.

View in MITRE ATT&CK®

Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name
AC-02 Account Management Protects T1078.003 Local Accounts
AC-03 Access Enforcement Protects T1078.003 Local Accounts
AC-05 Separation of Duties Protects T1078.003 Local Accounts
AC-06 Least Privilege Protects T1078.003 Local Accounts
CA-07 Continuous Monitoring Protects T1078.003 Local Accounts
CM-05 Access Restrictions for Change Protects T1078.003 Local Accounts
CM-06 Configuration Settings Protects T1078.003 Local Accounts
IA-12 Identity Proofing Protects T1078.003 Local Accounts
IA-02 Identification and Authentication (organizational Users) Protects T1078.003 Local Accounts
SA-10 Developer Configuration Management Protects T1078.003 Local Accounts
SA-11 Developer Testing and Evaluation Protects T1078.003 Local Accounts
SA-15 Development Process, Standards, and Tools Protects T1078.003 Local Accounts
SA-16 Developer-provided Training Protects T1078.003 Local Accounts
SA-17 Developer Security and Privacy Architecture and Design Protects T1078.003 Local Accounts
SA-03 System Development Life Cycle Protects T1078.003 Local Accounts
SA-04 Acquisition Process Protects T1078.003 Local Accounts
SA-08 Security and Privacy Engineering Principles Protects T1078.003 Local Accounts
SC-28 Protection of Information at Rest Protects T1078.003 Local Accounts
SI-04 System Monitoring Protects T1078.003 Local Accounts