T1021.006 Windows Remote Management

Adversaries may use Valid Accounts to interact with remote systems using Windows Remote Management (WinRM). The adversary may then perform actions as the logged-on user.

WinRM is the name of both a Windows service and a protocol that allows a user to interact with a remote system (e.g., run an executable, modify the Registry, modify services).(Citation: Microsoft WinRM) It may be called with the winrm command or by any number of programs such as PowerShell.(Citation: Jacobsen 2014) WinRM can be used as a method of remotely interacting with Windows Management Instrumentation.(Citation: MSDN WMI)

View in MITRE ATT&CK®

CRI Profile Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
PR.IR-01.05 Remote access protection Mitigates T1021.006 Windows Remote Management
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
References
    PR.IR-01.04 Wireless network protection Mitigates T1021.006 Windows Remote Management
    Comments
    This diagnostic statement provides protections for wireless networks. Implementation of wireless network management measures such as network segmentation and access controls reduces the attack surface, restricts movement by adversaries, and protects data from compromise.
    References
      PR.AA-05.03 Service accounts Mitigates T1021.006 Windows Remote Management
      Comments
      This diagnostic statement is for the implementation of security controls for service accounts (i.e., accounts used by systems to access other systems). Minimize service account permissions and access for the service to mitigate exploitation via the WinRM service account.
      References
        PR.AA-05.02 Privileged system access Mitigates T1021.006 Windows Remote Management
        Comments
        This diagnostic statement protects against Windows Remote Management through the use of privileged account management and the use of multi-factor authentication.
        References
          DE.CM-06.02 Third-party access monitoring Mitigates T1021.006 Windows Remote Management
          Comments
          This diagnostic statement protects against Windows Remote Management through the use of privileged account management. Employing auditing, privilege access management, and just in time access protects against adversaries trying to obtain illicit access to critical systems.
          References
            PR.IR-01.01 Network segmentation Mitigates T1021.006 Windows Remote Management
            Comments
            This diagnostic statement is for the implementation of network segmentation which helps prevent access to critical systems and sensitive information. Employing measures such as blocking or restricting WinRM provides protection against adversaries attempting to exploit this service.
            References
              PR.IR-01.02 Network device configurations Mitigates T1021.006 Windows Remote Management
              Comments
              This diagnostic statement provides protection through secure network device configurations (e.g., firewall rules, ports, protocols) aligned to security baselines. Using network appliances to block or filter network traffic that is not necessary within the environment can mitigate adversary use of remote services.
              References
                PR.IR-01.06 Production environment segregation Mitigates T1021.006 Windows Remote Management
                Comments
                This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
                References

                  NIST 800-53 Mappings

                  Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
                  CM-06 Configuration Settings mitigates T1021.006 Windows Remote Management
                  CM-05 Access Restrictions for Change mitigates T1021.006 Windows Remote Management
                  AC-17 Remote Access mitigates T1021.006 Windows Remote Management
                  RA-05 Vulnerability Monitoring and Scanning mitigates T1021.006 Windows Remote Management
                  CM-08 System Component Inventory mitigates T1021.006 Windows Remote Management
                  SC-46 Cross Domain Policy Enforcement mitigates T1021.006 Windows Remote Management
                  CM-02 Baseline Configuration mitigates T1021.006 Windows Remote Management
                  IA-02 Identification and Authentication (Organizational Users) mitigates T1021.006 Windows Remote Management
                  CM-07 Least Functionality mitigates T1021.006 Windows Remote Management
                  SI-04 System Monitoring mitigates T1021.006 Windows Remote Management
                  AC-02 Account Management mitigates T1021.006 Windows Remote Management
                  AC-03 Access Enforcement mitigates T1021.006 Windows Remote Management
                  AC-04 Information Flow Enforcement mitigates T1021.006 Windows Remote Management
                  AC-05 Separation of Duties mitigates T1021.006 Windows Remote Management
                  AC-06 Least Privilege mitigates T1021.006 Windows Remote Management
                  SC-07 Boundary Protection mitigates T1021.006 Windows Remote Management

                  VERIS Mappings

                  Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
                  action.malware.variety.Export data Export data to another site or system related-to T1021.006 Windows Remote Management

                  Azure Mappings

                  Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
                  azure_network_security_groups Azure Network Security Groups technique_scores T1021.006 Windows Remote Management
                  Comments
                  This control can be used to restrict direct access to remote services to trusted networks. This mitigates even an adversary with a valid account from accessing resources. This can be circumvented though if an adversary is able to compromise a trusted host and move laterally to a protected network. This results in an overall partial (coverage) score.
                  References
                  azure_network_watcher_traffic_analytics Azure Network Watcher: Traffic Analytics technique_scores T1021.006 Windows Remote Management
                  Comments
                  This control can detect anomalous traffic with respect to remote access protocols and groups.
                  References

                  AWS Mappings

                  Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
                  amazon_virtual_private_cloud Amazon Virtual Private Cloud technique_scores T1021.006 Windows Remote Management
                  Comments
                  VPC security groups and network access control lists (NACLs) can be used to restrict direct access to remote services to trusted networks. This mitigates even an adversary with a valid account from accessing resources. This can be circumvented though if an adversary is able to compromise a trusted host and move laterally to a protected network. This results in an overall partial (coverage) score.
                  References
                    aws_network_firewall AWS Network Firewall technique_scores T1021.006 Windows Remote Management
                    Comments
                    AWS Network Firewall has the ability to pass, drop, or alert on traffic based on the network protocol as well as perform deep packet inspection on the payload. This functionality can be used to only allow remote services from trusted hosts (i.e., only allow remote access traffic from certain hosts). This mapping is given a score of Partial because even though it can restrict remote services traffic from untrusted hosts, it cannot protect against an adversary using a trusted host that is permitted to use remote services as part of an attack.
                    References