T1562 Impair Defenses

Adversaries may maliciously modify components of a victim environment in order to hinder or disable defensive mechanisms. This not only involves impairing preventative defenses, such as firewalls and anti-virus, but also detection capabilities that defenders can use to audit activity and identify malicious behavior. This may also span both native defenses as well as supplemental capabilities installed by users and administrators.

Adversaries may also impair routine operations that contribute to defensive hygiene, such as blocking users from logging out, preventing a system from shutting down, or disabling or modifying the update process. Adversaries could also target event aggregation and analysis mechanisms, or otherwise disrupt these procedures by altering other system components. These restrictions can further enable malicious operations as well as the continued propagation of incidents.(Citation: Google Cloud Mandiant UNC3886 2024)(Citation: Emotet shutdown)

View in MITRE ATT&CK®

CRI Profile Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
PR.PS-01.01 Configuration baselines Mitigates T1562 Impair Defenses
Comments
This diagnostic statement provides for securely configuring production systems. This includes hardening default configurations and making security-focused setting adjustments to reduce the attack surface, enforce best practices, and protect sensitive data thereby mitigating adversary exploitation.
References
    PR.PS-01.02 Least functionality Mitigates T1562 Impair Defenses
    Comments
    This diagnostic statement provides for limiting unnecessary software, services, ports, protocols, etc. Ensuring systems only have installed and enabled what is essential for their operation reduces the attack surface and minimizes vulnerabilities, which mitigates a wide range of techniques.
    References
      PR.AA-05.02 Privileged system access Mitigates T1562 Impair Defenses
      Comments
      This diagnostic statement protects against Impair Defenses through the use of privileged account management and the use of multi-factor authentication.
      References
        DE.CM-09.03 Unauthorized software, hardware, or configuration changes Mitigates T1562 Impair Defenses
        Comments
        This Diagnostic Statement addresses measures for managing configuration integrity and unauthorized changes that can mitigate risks associated with adversary techniques attempting to make changes to how the hardware, software, and firmware operates.
        References
          PR.AA-05.01 Access privilege limitation Mitigates T1562 Impair Defenses
          Comments
          This diagnostic statement describes the implementation of least privilege principle, which can be applied to limiting permissions through role-based access controls, file and directory permissions, and the execution of systems and services. Ensure proper Registry permissions are in place to prevent unnecessary users and adversaries from disabling or interfering with security/logging services.
          References
            PR.PS-01.03 Configuration deviation Mitigates T1562 Impair Defenses
            Comments
            This diagnostic statement provides protection from Impair Defenses through the implementation of security configuration baselines for OS, software, file integrity monitoring and imaging. Security baselining and integrity checking can help protect against adversaries attempting to compromise and modify software and its configurations.
            References
              PR.PS-01.09 Virtualized end point protection Mitigates T1562 Impair Defenses
              Comments
              The diagnostic statement highlights several mechanisms that organizations can implement to protect endpoint systems using virtualization technologies, essentially hypervisor hardening. Hypervisor hardening can limit the ability of virtual machines to disable or modify security tools or configurations within the host system, making it harder for attackers to evade detection.
              References
                PR.AA-01.02 Physical and logical access Mitigates T1562 Impair Defenses
                Comments
                This diagnostic statement describes how the organization ensures users are identified and authenticated before accessing systems, applications, and hardware, with logical access controls permitting access only to authorized individuals with legitimate business needs. Logical access controls in relation to systems can refer to the use of MFA, user account management, and other role-based access control mechanisms to enforce policies for authentication and authorization of user accounts.
                References
                  PR.AA-01.01 Identity and credential management Mitigates T1562 Impair Defenses
                  Comments
                  This diagnostic statement protects against Impair Defenses through the use of hardened access control policies, secure defaults, password complexity requirements, multifactor authentication requirements, and removal of terminated accounts.
                  References

                    NIST 800-53 Mappings

                    Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
                    CA-07 Continuous Monitoring mitigates T1562 Impair Defenses
                    CM-06 Configuration Settings mitigates T1562 Impair Defenses
                    CM-05 Access Restrictions for Change mitigates T1562 Impair Defenses
                    IA-04 Identifier Management mitigates T1562 Impair Defenses
                    RA-05 Vulnerability Monitoring and Scanning mitigates T1562 Impair Defenses
                    SC-08 Transmission Confidentiality and Integrity mitigates T1562 Impair Defenses
                    SC-08 Transmission Confidentiality and Integrity mitigates T1562 Impair Defenses
                    SI-03 Malicious Code Protection mitigates T1562 Impair Defenses
                    SI-07 Software, Firmware, and Information Integrity mitigates T1562 Impair Defenses
                    CM-02 Baseline Configuration mitigates T1562 Impair Defenses
                    CM-02 Baseline Configuration mitigates T1562 Impair Defenses
                    IA-02 Identification and Authentication (Organizational Users) mitigates T1562 Impair Defenses
                    CM-07 Least Functionality mitigates T1562 Impair Defenses
                    SI-04 System Monitoring mitigates T1562 Impair Defenses
                    AC-02 Account Management mitigates T1562 Impair Defenses
                    AC-03 Access Enforcement mitigates T1562 Impair Defenses
                    AC-05 Separation of Duties mitigates T1562 Impair Defenses
                    AC-06 Least Privilege mitigates T1562 Impair Defenses

                    Azure Mappings

                    Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
                    microsoft_sentinel Microsoft Sentinel technique_scores T1562 Impair Defenses
                    Comments
                    This control provides minimal (mostly) to partial coverage for most of this technique's sub-techniques, resulting in an overall score of Minimal. The Microsoft Sentinel Hunting "Anomalous Defensive Mechanism Modification" query detects users performing delete operations on security policies, which may indicate an adversary attempting to impair defenses.
                    References
                    file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring technique_scores T1562 Impair Defenses
                    Comments
                    Due to low detection coverage, this technique is scored as minimal.
                    References
                    alerts_for_linux_machines Alerts for Linux Machines technique_scores T1562 Impair Defenses
                    Comments
                    This control only provides coverage for a miniority of the sub-techniques under this technique and provides no coverage for other relevant sub-techniques, such as Impair Command History Logging or Disable or Modify Tools, resulting in a score of Minimal.
                    References
                    alerts_for_windows_machines Alerts for Windows Machines technique_scores T1562 Impair Defenses
                    Comments
                    This control's detection is specific to a minority of this technique's sub-techniques resulting in a Minimal Coverage score and consequently an overall score of Minimal.
                    References
                    defender_for_resource_manager Microsoft Defender for Resource Manager technique_scores T1562 Impair Defenses
                    Comments
                    This control may alert on Windows Defender security features being disabled but does not alert on other security tools or logging being disabled or tampered with. Consequently, its Coverage score is Minimal resulting in an overall Minimal score.
                    References

                    GCP Mappings

                    Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
                    identity_platform Identity Platform technique_scores T1562 Impair Defenses
                    Comments
                    Identity Platform provides Admin APIs to manage users and authentication tokens. To prevent unwanted access to your users and tokens through these APIs, Identity Platform leverages IAM to manage permission to specific Identity Platform APIs. This control will ensure proper process and file permissions are in place to prevent adversaries from disabling or interfering with security/logging services.
                    References
                    policy_intelligence Policy Intelligence technique_scores T1562 Impair Defenses
                    Comments
                    Adversaries that try to disable cloud logging capabilities have the advantage to limit the amount of the data that can be collected and can possibly control not being detected. This control may be used to ensure that permissions are in place to prevent adversaries from disabling or interfering with security/logging services.
                    References
                    resource_manager Resource Manager technique_scores T1562 Impair Defenses
                    Comments
                    An adversary may disable cloud logging capabilities and integrations to limit what data is collected on their activities and avoid detection. GCP allows configuration of account policies to enable logging and IAM permissions and roles to determine your ability to access audit logs data in Google Cloud resources.
                    References
                    security_command_center Security Command Center technique_scores T1562 Impair Defenses
                    Comments
                    SCC ingests VPC Audit logs to detect changes which would lead to changes in the security posture. This security solution protects against network modifications that are used to reduce the security perimeter, disable logs, and evade cyber-defense of a target environment. Because of the near-real time temporal factor this control was graded as significant.
                    References

                    AWS Mappings

                    Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
                    amazon_guardduty Amazon GuardDuty technique_scores T1562 Impair Defenses
                    Comments
                    GuardDuty flags the following finding type DefenseEvasion:IAMUser/AnomalousBehavior as a defense evasion technique. It looks for API calls that delete, disable, or stop operations, such as, DeleteFlowLogs, DisableAlarmActions, or StopLogging. The following Finding types are examples: Stealth:IAMUser/CloudTrailLoggingDisabled Stealth:IAMUser/PasswordPolicyChange Stealth:S3/ServerAccessLoggingDisabled
                    References
                    amazon_inspector Amazon Inspector technique_scores T1562 Impair Defenses
                    Comments
                    The Amazon Inspector Best Practices assessment package can assess security control "Configure permissions for system directories" that prevents privilege escalation by local users and ensures only the root account can modify/execute system configuration information and binaries. Amazon Inspector does not directly protect against system modifications rather it just checks to see if security controls are in place which can inform decisions around hardening the system. Furthermore, Amazon Inspector only supports a subset of the sub-techniques for this technique. Due to these things and the fact the security control is only supported for Linux platforms, the score is Minimal.
                    References
                    aws_config AWS Config technique_scores T1562 Impair Defenses
                    Comments
                    This control provides significant coverage for a minority of this technique's sub-techniques, resulting in an overall score of Minimal. "Detect the use of insecure network services and protocols with known security weaknesses"
                    References
                    aws_iot_device_defender AWS IoT Device Defender technique_scores T1562 Impair Defenses
                    aws_iot_device_defender AWS IoT Device Defender technique_scores T1562 Impair Defenses
                    aws_security_hub AWS Security Hub technique_scores T1562 Impair Defenses
                    Comments
                    AWS Security Hub performs checks from the AWS Foundations CIS Benchmark that, if implemented, would help towards detecting changes to key AWS services. AWS Security Hub provides these detections with the following checks. 3.5 Ensure a log metric filter and alarm exist for CloudTrail configuration changes 3.9 Ensure a log metric filter and alarm exist for AWS Config configuration changes 3.10 Ensure a log metric filter and alarm exist for security group changes 3.11 Ensure a log metric filter and alarm exist for changes to Network Access Control Lists (NACL) 3.12 Ensure a log metric filter and alarm exist for changes to network gateways 3.13 Ensure a log metric filter and alarm exist for route table changes 3.14 Ensure a log metric filter and alarm exist for VPC changes This is scored as Partial because it only supports a subset of the sub-techniques (3 of 8).
                    References

                    M365 Mappings

                    Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
                    PUR-AUS-E5 Audit Solutions Technique Scores T1562 Impair Defenses
                    Comments
                    Microsoft Purview auditing solutions provide an integrated solution to help organizations effectively respond to security events, forensic investigations, internal investigations, and compliance obligations. Thousands of user and admin operations performed in dozens of Microsoft 365 services and solutions are captured, recorded, and retained in your organization's unified audit log. Audit records for these events are searchable by security ops, IT admins, insider risk teams, and compliance and legal investigators in your organization. This capability provides visibility into the activities performed across your Microsoft 365 organization. Microsoft's Audit Solutions protects from Impair Defense attacks due to Audit Solutions providing the visibility to allow admins to routinely check account role permissions to ensure only expected users and roles have permission to modify defensive tools and settings. License Requirements: Microsoft 365 E3 and E5
                    References
                    DEF-SSCO-E3 Secure Score Technique Scores T1562 Impair Defenses
                    Comments
                    Microsoft Secure Score is a measurement of an organization's security posture, with a higher number indicating more recommended actions taken. It can be found at Microsoft Secure Score in the Microsoft Defender portal. Following the Secure Score recommendations can protect your organization from threats. From a centralized dashboard in the Microsoft Defender portal, organizations can monitor and work on the security of their Microsoft 365 identities, apps, and devices. Your score is updated in real time to reflect the information presented in the visualizations and recommended action pages. Secure Score also syncs daily to receive system data about your achieved points for each action. To help you find the information you need more quickly, Microsoft recommended actions are organized into groups: Identity (Microsoft Entra accounts & roles) Device (Microsoft Defender for Endpoint, known as Microsoft Secure Score for Devices) Apps (email and cloud apps, including Office 365 and Microsoft Defender for Cloud Apps) Data (through Microsoft Information Protection)
                    References
                    DEF-IR-E5 Incident Response Technique Scores T1562 Impair Defenses
                    Comments
                    An incident in Microsoft Defender XDR is a collection of correlated alerts and associated data that make up the story of an attack. Microsoft 365 services and apps create alerts when they detect a suspicious or malicious event or activity. Individual alerts provide valuable clues about a completed or ongoing attack. Attacks typically employ various techniques against different types of entities, such as devices, users, and mailboxes. The result of this is multiple alerts for multiple entities in your tenant. Piecing the individual alerts together to gain insight into an attack can be challenging and time-consuming, Microsoft Defender XDR automatically aggregates the alerts and their associated information into an incident. A typical Incident Response workflow in Microsoft Defender XDR begins with a triage action, next is the investigate action, and finally is the response action. Microsoft 365 Defender Incident Response responds to Impair Defense attacks due to Incident Response monitoring for changes to account settings, newly executed processes, and abnormal execution of API functions. License Requirements: Microsoft Defender XDR
                    References
                    EID-RBAC-E3 Role Based Access Control Technique Scores T1562 Impair Defenses
                    Comments
                    The RBAC control can be used to partially protect against the ability to Disable or Modify Cloud Logs, but has minimal coverage against this technique's other sub-techniques and example procedures. Due to its Minimal coverage score, it receives an overall score of minimal. License Requirements: ME-ID Built-in Roles (Free)
                    References
                    DEF-ATH-E5 Advanced Threat Hunting Technique Scores T1562 Impair Defenses
                    Comments
                    Advanced hunting is a query-based threat hunting tool that lets you explore up to 30 days of raw data. Advanced hunting in Microsoft Defender XDR allows you to proactively hunt for threats across: Devices managed by Microsoft Defender for Endpoint, Emails processed by Microsoft 365, Cloud app activities, authentication events, and domain controller activities. With this level of visibility, you can quickly hunt for threats that traverse sections of your network, including sophisticated intrusions that arrive on email or the web, elevate local privileges, acquire privileged domain credentials, and move laterally to across your devices. Advanced hunting supports two modes, guided and advanced. Users use advanced mode if they are comfortable using Kusto Query Language (KQL) to create queries from scratch. Advanced Threat Hunting Detects Impair Defense attacks due to the DeviceNetworkEvents table in the advanced hunting schema which contains information about network connections and related events which monitors for the abnormal execution of API functions. License Requirements: Microsoft Defender XDR, Microsoft Defender for Cloud Apps, Microsoft Defender for Office 365 plan 2
                    References
                    DEF-APGV-E5 App Governance Technique Scores T1562 Impair Defenses
                    Comments
                    App governance in Defender for Cloud Apps is a set of security and policy management capabilities designed for OAuth-enabled apps registered on Microsoft Entra ID, Google, and Salesforce. App governance delivers visibility, remediation, and governance into how these apps and their users access, use, and share sensitive data in Microsoft 365 and other cloud platforms through actionable insights and automated policy alerts and actions. App governance also enables you to see which user-installed OAuth applications have access to data on Microsoft 365, Google Workspace, and Salesforce. It tells you what permissions the apps have and which users have granted access to their accounts. App governance insights enable you to make informed decisions around blocking or restricting apps that present significant risk to your organization App Governance Protects against Impair Defense attacks due to the governance feature where admins can create proactive or reactive policies to protect your users from using noncompliant or malicious apps and limiting the access of risky apps to your data to ensure that only approved security applications are used and running. License Requirements: Microsoft Defender for Cloud Apps
                    References
                    DEF-APGV-E5 App Governance Technique Scores T1562 Impair Defenses
                    Comments
                    App governance in Defender for Cloud Apps is a set of security and policy management capabilities designed for OAuth-enabled apps registered on Microsoft Entra ID, Google, and Salesforce. App governance delivers visibility, remediation, and governance into how these apps and their users access, use, and share sensitive data in Microsoft 365 and other cloud platforms through actionable insights and automated policy alerts and actions. App governance also enables you to see which user-installed OAuth applications have access to data on Microsoft 365, Google Workspace, and Salesforce. It tells you what permissions the apps have and which users have granted access to their accounts. App governance insights enable you to make informed decisions around blocking or restricting apps that present significant risk to your organization App Governance detects Impair Defense attacks due to App Governance tracking various app attributes and behaviors such as certification, data use, API access errors, and unused permissions that can indicate misuse and risk. License Requirements: Microsoft Defender for Cloud Apps
                    References

                    ATT&CK Subtechniques

                    Technique ID Technique Name Number of Mappings
                    T1562.009 Safe Mode Boot 19
                    T1562.002 Disable Windows Event Logging 18
                    T1562.004 Disable or Modify System Firewall 21
                    T1562.012 Disable or Modify Linux Audit System 14
                    T1562.006 Indicator Blocking 27
                    T1562.007 Disable or Modify Cloud Firewall 18
                    T1562.010 Downgrade Attack 12
                    T1562.003 Impair Command History Logging 10
                    T1562.001 Disable or Modify Tools 26
                    T1562.011 Spoof Security Alerting 7
                    T1562.008 Disable or Modify Cloud Logs 27