Adversaries may create an account to maintain access to victim systems. With a sufficient level of access, creating such accounts may be used to establish secondary credentialed access that do not require persistent remote access tools to be deployed on the system.
Accounts may be created on the local system or within a domain or cloud tenant. In cloud environments, adversaries may create accounts that only have access to specific services, which can reduce the chance of detection.
View in MITRE ATT&CK®Capability ID | Capability Description | Mapping Type | ATT&CK ID | ATT&CK Name | Notes |
---|---|---|---|---|---|
AC-2 | Account Management | Protects | T1136 | Create Account | |
AC-20 | Use of External Systems | Protects | T1136 | Create Account | |
AC-3 | Access Enforcement | Protects | T1136 | Create Account | |
AC-4 | Information Flow Enforcement | Protects | T1136 | Create Account | |
AC-5 | Separation of Duties | Protects | T1136 | Create Account | |
AC-6 | Least Privilege | Protects | T1136 | Create Account | |
CM-5 | Access Restrictions for Change | Protects | T1136 | Create Account | |
CM-6 | Configuration Settings | Protects | T1136 | Create Account | |
CM-7 | Least Functionality | Protects | T1136 | Create Account | |
IA-2 | Identification and Authentication (organizational Users) | Protects | T1136 | Create Account | |
IA-5 | Authenticator Management | Protects | T1136 | Create Account | |
SC-46 | Cross Domain Policy Enforcement | Protects | T1136 | Create Account | |
SC-7 | Boundary Protection | Protects | T1136 | Create Account | |
SI-4 | System Monitoring | Protects | T1136 | Create Account | |
SI-7 | Software, Firmware, and Information Integrity | Protects | T1136 | Create Account | |
alerts_for_windows_machines | Alerts for Windows Machines | technique_scores | T1136 | Create Account |
Comments
This control's detection is specific to a minority of this technique's sub-techniques resulting in a Minimal Coverage score and consequently an overall score of Minimal.
References
|
azure_security_center_recommendations | Azure Security Center Recommendations | technique_scores | T1136 | Create Account |
Comments
This control's "Immutable (read-only) root filesystem should be enforced for containers" recommendation can mitigate a sub-technique of this technique. Due to its Minimal coverage, its score is assessed as Minimal.
References
|
linux_auditd_alerts_and_log_analytics_agent_integration | Linux auditd alerts and Log Analytics agent integration | technique_scores | T1136 | Create Account |
Comments
This control is only relevant for Linux endpoints, and it provides partial coverage for the only sub-technique relevant on Linux endpoints, Local Account.
References
|
azure_sentinel | Azure Sentinel | technique_scores | T1136 | Create Account |
Comments
This control provides partial coverage for all of this technique's sub-techniques, resulting in an overall score of Partial.
References
|
role_based_access_control | Role Based Access Control | technique_scores | T1136 | Create Account |
Comments
This control only provides protection for one of this technique's sub-techniques while not providing any protection for the remaining and therefore its coverage score factor is Minimal, resulting in a Minimal score.
References
|
azure_ad_privileged_identity_management | Azure AD Privileged Identity Management | technique_scores | T1136 | Create Account |
Comments
This control only provides protection for one of this technique's sub-techniques while not providing any detection for the remaining and therefore its coverage score is Minimal, resulting in a Minimal score.
References
|
Technique ID | Technique Name | Number of Mappings |
---|---|---|
T1136.003 | Cloud Account | 18 |
T1136.002 | Domain Account | 16 |
T1136.001 | Local Account | 15 |