T1078.003 Local Accounts Mappings

Adversaries may obtain and abuse credentials of a local account as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion. Local accounts are those configured by an organization for use by users, remote support, services, or for administration on a single system or service.

Local Accounts may also be abused to elevate privileges and harvest credentials through OS Credential Dumping. Password reuse may allow the abuse of local accounts across a set of machines on a network for the purposes of Privilege Escalation and Lateral Movement.

View in MITRE ATT&CK®

NIST 800-53 Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
AC-2 Account Management Protects T1078.003 Local Accounts
AC-3 Access Enforcement Protects T1078.003 Local Accounts
AC-5 Separation of Duties Protects T1078.003 Local Accounts
AC-6 Least Privilege Protects T1078.003 Local Accounts
CA-7 Continuous Monitoring Protects T1078.003 Local Accounts
CM-5 Access Restrictions for Change Protects T1078.003 Local Accounts
CM-6 Configuration Settings Protects T1078.003 Local Accounts
IA-12 Identity Proofing Protects T1078.003 Local Accounts
IA-2 Identification and Authentication (organizational Users) Protects T1078.003 Local Accounts
SA-10 Developer Configuration Management Protects T1078.003 Local Accounts
SA-11 Developer Testing and Evaluation Protects T1078.003 Local Accounts
SA-15 Development Process, Standards, and Tools Protects T1078.003 Local Accounts
SA-16 Developer-provided Training Protects T1078.003 Local Accounts
SA-17 Developer Security and Privacy Architecture and Design Protects T1078.003 Local Accounts
SA-3 System Development Life Cycle Protects T1078.003 Local Accounts
SA-4 Acquisition Process Protects T1078.003 Local Accounts
SA-8 Security and Privacy Engineering Principles Protects T1078.003 Local Accounts
SC-28 Protection of Information at Rest Protects T1078.003 Local Accounts
SI-4 System Monitoring Protects T1078.003 Local Accounts

Azure Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
alerts_for_windows_machines Alerts for Windows Machines technique_scores T1078.003 Local Accounts
Comments
This control may detect suspicious activity from existing Windows accounts and logons from suspicious IP addresses. The following alerts may be generated: "A logon from a malicious IP has been detected", "A logon from a malicious IP has been detected. [seen multiple times]".
References
    azure_sentinel Azure Sentinel technique_scores T1078.003 Local Accounts
    Comments
    The following Azure Sentinel Hunting queries can identify potential compromise of local accounts based on access attempts and/or account usage: "Suspicious Windows Login outside normal hours", "User Login IP Address Teleportation", "User account added or removed from a security group by an unauthorized user", "User Account added to Built in Domain Local or Global Group", "User added to SQL Server SecurityAdmin Group", "User Role altered on SQL Server", "User made Owner of multiple teams", "Tracking Privileged Account Rare Activity", and "Anomalous Login to Devices". The following Azure Sentinel Analytics queries can identify potential compromise of local accounts based on access attempts and/or account usage: "User account enabled and disabled within 10 mins", "Long lookback User Account Created and Deleted within 10mins", "Explicit MFA Deny", "Hosts with new logons", "Inactive or new account signins", "Anomalous SSH Login Detection", and "Anomalous RDP Login Detections".
    References
      azure_ad_identity_secure_score Azure AD Identity Secure Score technique_scores T1078.003 Local Accounts
      Comments
      This control's "Protect and manage local admin passwords with Microsoft LAPS" recommendation recommends periodically running and reviewing the Microsoft LAPS usage report that identifies all Windows based devices not protected by Microsoft LAPS. This can help reduce the compromise of local administrator accounts. Because this is a recommendations and not actually enforced coupled with being limited to sensitive accounts, the assessed score is Minimal.
      References