T1136 Create Account Mappings

Adversaries may create an account to maintain access to victim systems. With a sufficient level of access, creating such accounts may be used to establish secondary credentialed access that do not require persistent remote access tools to be deployed on the system.

Accounts may be created on the local system or within a domain or cloud tenant. In cloud environments, adversaries may create accounts that only have access to specific services, which can reduce the chance of detection.

View in MITRE ATT&CK®

Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name
AC-02 Account Management Protects T1136 Create Account
AC-20 Use of External Systems Protects T1136 Create Account
AC-03 Access Enforcement Protects T1136 Create Account
AC-04 Information Flow Enforcement Protects T1136 Create Account
AC-05 Separation of Duties Protects T1136 Create Account
AC-06 Least Privilege Protects T1136 Create Account
CM-05 Access Restrictions for Change Protects T1136 Create Account
CM-06 Configuration Settings Protects T1136 Create Account
CM-07 Least Functionality Protects T1136 Create Account
IA-02 Identification and Authentication (organizational Users) Protects T1136 Create Account
IA-05 Authenticator Management Protects T1136 Create Account
SC-46 Cross Domain Policy Enforcement Protects T1136 Create Account
SC-07 Boundary Protection Protects T1136 Create Account
SI-04 System Monitoring Protects T1136 Create Account
SI-07 Software, Firmware, and Information Integrity Protects T1136 Create Account
ME-RBAC-E3 Role Based Access Control Technique Scores T1136 Create Account
ME-PIM-E5 Privileged Identity Management Technique Scores T1136 Create Account
DEF-SecScore-E3 Secure Score Technique Scores T1136 Create Account
DEF-IR-E5 Incident Response Technique Scores T1136 Create Account

ATT&CK Subtechniques

Technique ID Technique Name Number of Mappings
T1136.001 Local Account 11
T1136.002 Domain Account 15
T1136.003 Cloud Account 21