T1021.001 Remote Desktop Protocol

Adversaries may use Valid Accounts to log into a computer using the Remote Desktop Protocol (RDP). The adversary may then perform actions as the logged-on user.

Remote desktop is a common feature in operating systems. It allows a user to log into an interactive session with a system desktop graphical user interface on a remote system. Microsoft refers to its implementation of the Remote Desktop Protocol (RDP) as Remote Desktop Services (RDS).(Citation: TechNet Remote Desktop Services)

Adversaries may connect to a remote system over RDP/RDS to expand access if the service is enabled and allows access to accounts with known credentials. Adversaries will likely use Credential Access techniques to acquire credentials to use with RDP. Adversaries may also use RDP in conjunction with the Accessibility Features or Terminal Services DLL for Persistence.(Citation: Alperovitch Malware)

View in MITRE ATT&CK®

CRI Profile Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
PR.IR-01.05 Remote access protection Mitigates T1021.001 Remote Desktop Protocol
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
References
    PR.IR-01.06 Production environment segregation Mitigates T1021.001 Remote Desktop Protocol
    Comments
    This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
    References
      PR.PS-01.01 Configuration baselines Mitigates T1021.001 Remote Desktop Protocol
      Comments
      This diagnostic statement provides for securely configuring production systems. This includes hardening default configurations and making security-focused setting adjustments to reduce the attack surface, enforce best practices, and protect sensitive data thereby mitigating adversary exploitation.
      References
        PR.PS-01.02 Least functionality Mitigates T1021.001 Remote Desktop Protocol
        Comments
        This diagnostic statement provides for limiting unnecessary software, services, ports, protocols, etc. Ensuring systems only have installed and enabled what is essential for their operation reduces the attack surface and minimizes vulnerabilities, which mitigates a wide range of techniques.
        References
          PR.AA-05.02 Privileged system access Mitigates T1021.001 Remote Desktop Protocol
          Comments
          This diagnostic statement protects against Remote Desktop Protocol through the use of privileged account management and the use of multi-factor authentication.
          References
            DE.CM-06.02 Third-party access monitoring Mitigates T1021.001 Remote Desktop Protocol
            Comments
            This diagnostic statement protects against Remote Desktop Protocol through the use of privileged account management. Employing auditing, privilege access management, and just in time access protects against adversaries trying to obtain illicit access to critical systems.
            References
              PR.AA-02.01 Authentication of identity Mitigates T1021.001 Remote Desktop Protocol
              Comments
              This diagnostic statement provides protection from Remote Services through the implementation of authentication and identity management controls to limit lateral movement. Employing limitations to specific accounts, access control mechanisms, and auditing the attribution logs provides protection against adversaries attempting to move laterally.
              References
                PR.PS-01.03 Configuration deviation Mitigates T1021.001 Remote Desktop Protocol
                Comments
                This diagnostic statement provides protection from Remote Desktop Protocol through the implementation of security configuration baselines for OS, software, file integrity monitoring and imaging. Security baseline configuration of the Operating System and integrity checking can help protect against adversaries attempting to compromise and modify software and its configurations.
                References
                  PR.PS-01.07 Cryptographic keys and certificates Mitigates T1021.001 Remote Desktop Protocol
                  Comments
                  This diagnostic statement protects against Remote Services: Remote Desktop Protocol (RDP) through the use of revocation of keys and key management. Employing key protection strategies such as multi-factor authentication for key material used in authentication for RDP, limitations to specific accounts along with access control mechanisms provides protection against adversaries attempting to use valid accounts over RDP.
                  References
                    PR.AA-03.01 Authentication requirements Mitigates T1021.001 Remote Desktop Protocol
                    Comments
                    This diagnostic statement describes how the organization implement appropriate authentication requirements, including selecting mechanisms based on risk, utilizing multi-factor authentication where necessary, and safeguarding the storage of authenticators like pins and passwords to protect sensitive access credentials.
                    References
                      PR.IR-01.01 Network segmentation Mitigates T1021.001 Remote Desktop Protocol
                      Comments
                      This diagnostic statement is for the implementation of network segmentation which helps prevent access to critical systems and sensitive information. Employing measures such as blocking RDP traffic between network security zones provides protection against adversaries attempting to use RDP to expand access.
                      References
                        PR.IR-01.02 Network device configurations Mitigates T1021.001 Remote Desktop Protocol
                        Comments
                        This diagnostic statement provides protection through secure network device configurations (e.g., firewall rules, ports, protocols) aligned to security baselines. Using network appliances to block or filter network traffic that is not necessary within the environment can mitigate adversary use of remote services.
                        References
                          PR.IR-01.03 Network communications integrity and availability Mitigates T1021.001 Remote Desktop Protocol
                          Comments
                          This diagnostic statement protects against Remote Desktop Protocol through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
                          References
                            PR.IR-01.04 Wireless network protection Mitigates T1021.001 Remote Desktop Protocol
                            Comments
                            This diagnostic statement provides protections for wireless networks. Implementation of wireless network management measures such as network segmentation and access controls reduces the attack surface, restricts movement by adversaries, and protects data from compromise.
                            References
                              PR.AA-01.01 Identity and credential management Mitigates T1021.001 Remote Desktop Protocol
                              Comments
                              This diagnostic statement protects against Remote Desktop Protocol through the use of hardened access control policies, secure defaults, password complexity requirements, multifactor authentication requirements, and removal of terminated accounts.
                              References
                                PR.PS-01.08 End-user device protection Mitigates T1021.001 Remote Desktop Protocol
                                Comments
                                This diagnostic statement protects against Remote Desktop Protocol through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
                                References

                                  NIST 800-53 Mappings

                                  Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
                                  CM-06 Configuration Settings mitigates T1021.001 Remote Desktop Protocol
                                  CM-05 Access Restrictions for Change mitigates T1021.001 Remote Desktop Protocol
                                  IA-05 Authenticator Management mitigates T1021.001 Remote Desktop Protocol
                                  AC-17 Remote Access mitigates T1021.001 Remote Desktop Protocol
                                  IA-06 Authentication Feedback mitigates T1021.001 Remote Desktop Protocol
                                  SC-46 Cross Domain Policy Enforcement mitigates T1021.001 Remote Desktop Protocol
                                  IA-04 Identifier Management mitigates T1021.001 Remote Desktop Protocol
                                  RA-05 Vulnerability Monitoring and Scanning mitigates T1021.001 Remote Desktop Protocol
                                  CM-08 System Component Inventory mitigates T1021.001 Remote Desktop Protocol
                                  AC-20 Use of External Systems mitigates T1021.001 Remote Desktop Protocol
                                  CM-02 Baseline Configuration mitigates T1021.001 Remote Desktop Protocol
                                  CM-02 Baseline Configuration mitigates T1021.001 Remote Desktop Protocol
                                  IA-02 Identification and Authentication (Organizational Users) mitigates T1021.001 Remote Desktop Protocol
                                  CM-07 Least Functionality mitigates T1021.001 Remote Desktop Protocol
                                  SI-04 System Monitoring mitigates T1021.001 Remote Desktop Protocol
                                  AC-11 Device Lock mitigates T1021.001 Remote Desktop Protocol
                                  AC-12 Session Termination mitigates T1021.001 Remote Desktop Protocol
                                  AC-02 Account Management mitigates T1021.001 Remote Desktop Protocol
                                  AC-03 Access Enforcement mitigates T1021.001 Remote Desktop Protocol
                                  AC-04 Information Flow Enforcement mitigates T1021.001 Remote Desktop Protocol
                                  AC-05 Separation of Duties mitigates T1021.001 Remote Desktop Protocol
                                  AC-06 Least Privilege mitigates T1021.001 Remote Desktop Protocol
                                  AC-07 Unsuccessful Logon Attempts mitigates T1021.001 Remote Desktop Protocol
                                  SC-07 Boundary Protection mitigates T1021.001 Remote Desktop Protocol

                                  Azure Mappings

                                  Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
                                  azure_network_security_groups Azure Network Security Groups technique_scores T1021.001 Remote Desktop Protocol
                                  Comments
                                  This control can be used to restrict direct access to remote services to trusted networks. This mitigates even an adversary with a valid account from accessing resources. This can be circumvented though if an adversary is able to compromise a trusted host and move laterally to a protected network. This results in an overall partial (coverage) score.
                                  References
                                  azure_network_watcher_traffic_analytics Azure Network Watcher: Traffic Analytics technique_scores T1021.001 Remote Desktop Protocol
                                  Comments
                                  This control can detect anomalous traffic with respect to remote access protocols and groups.
                                  References
                                  azure_policy Azure Policy technique_scores T1021.001 Remote Desktop Protocol
                                  Comments
                                  This control may provide recommendations to restrict public access to Remote Desktop Protocol.
                                  References

                                  AWS Mappings

                                  Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
                                  amazon_virtual_private_cloud Amazon Virtual Private Cloud technique_scores T1021.001 Remote Desktop Protocol
                                  Comments
                                  VPC security groups and network access control lists (NACLs) can be used to restrict direct access to remote services to trusted networks. This mitigates even an adversary with a valid account from accessing resources. This can be circumvented though if an adversary is able to compromise a trusted host and move laterally to a protected network. This results in an overall partial (coverage) score.
                                  References
                                    aws_network_firewall AWS Network Firewall technique_scores T1021.001 Remote Desktop Protocol
                                    Comments
                                    AWS Network Firewall has the ability to pass, drop, or alert on traffic based on the network protocol as well as perform deep packet inspection on the payload. This functionality can be used to only allow remote services from trusted hosts (i.e., only allow remote access traffic from certain hosts). This mapping is given a score of Partial because even though it can restrict remote services traffic from untrusted hosts, it cannot protect against an adversary using a trusted host that is permitted to use remote services as part of an attack.
                                    References