An adversary may add the Global Administrator role to an adversary-controlled account to maintain persistent access to an Office 365 tenant.(Citation: Microsoft Support O365 Add Another Admin, October 2019)(Citation: Microsoft O365 Admin Roles) With sufficient permissions, a compromised account can gain almost unlimited access to data and settings (including the ability to reset the passwords of other admins) via the global admin role.(Citation: Microsoft O365 Admin Roles)
This account modification may immediately follow Create Account or other malicious account activity.
View in MITRE ATT&CK®Capability ID | Capability Description | Mapping Type | ATT&CK ID | ATT&CK Name | Notes |
---|---|---|---|---|---|
role_based_access_control | Role Based Access Control | technique_scores | T1098.003 | Add Office 365 Global Administrator Role |
Comments
This control can be used to implement the least-privilege principle for account management and thereby limit the number of accounts that can modify accounts.
References
|
azure_ad_privileged_identity_management | Azure AD Privileged Identity Management | technique_scores | T1098.003 | Add Office 365 Global Administrator Role |
Comments
This control can require MFA to be triggered when the Global Administrator role is assigned to an account or when the role is activated by a user.
References
|
azure_ad_privileged_identity_management | Azure AD Privileged Identity Management | technique_scores | T1098.003 | Add Office 365 Global Administrator Role |
Comments
This control can notify administrators whenever the Global Administrator role is assigned to an account and can therefore be used to detect the execution of this sub-technique. Assigning the Global Administrator role to an account is an infrequent operation and as a result, the false positive rate should be minimal.
References
|
cloud_app_security_policies | Cloud App Security Policies | technique_scores | T1098.003 | Add Office 365 Global Administrator Role |
Comments
This control can detect anomalous admin activity that may be indicative of account manipulation. Relevant alerts include "Unusual administrative activity (by user)" and "Unusual addition of credentials to an OAuth app".
References
|