T1136 Create Account Mappings

Adversaries may create an account to maintain access to victim systems. With a sufficient level of access, creating such accounts may be used to establish secondary credentialed access that do not require persistent remote access tools to be deployed on the system.

Accounts may be created on the local system or within a domain or cloud tenant. In cloud environments, adversaries may create accounts that only have access to specific services, which can reduce the chance of detection.

View in MITRE ATT&CK®

Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
AC-2 Account Management Protects T1136 Create Account
AC-20 Use of External Systems Protects T1136 Create Account
AC-3 Access Enforcement Protects T1136 Create Account
AC-4 Information Flow Enforcement Protects T1136 Create Account
AC-5 Separation of Duties Protects T1136 Create Account
AC-6 Least Privilege Protects T1136 Create Account
CM-5 Access Restrictions for Change Protects T1136 Create Account
CM-6 Configuration Settings Protects T1136 Create Account
CM-7 Least Functionality Protects T1136 Create Account
IA-2 Identification and Authentication (organizational Users) Protects T1136 Create Account
IA-5 Authenticator Management Protects T1136 Create Account
SC-46 Cross Domain Policy Enforcement Protects T1136 Create Account
SC-7 Boundary Protection Protects T1136 Create Account
SI-4 System Monitoring Protects T1136 Create Account
SI-7 Software, Firmware, and Information Integrity Protects T1136 Create Account
alerts_for_windows_machines Alerts for Windows Machines technique_scores T1136 Create Account
Comments
This control's detection is specific to a minority of this technique's sub-techniques resulting in a Minimal Coverage score and consequently an overall score of Minimal.
References
azure_security_center_recommendations Azure Security Center Recommendations technique_scores T1136 Create Account
Comments
This control's "Immutable (read-only) root filesystem should be enforced for containers" recommendation can mitigate a sub-technique of this technique. Due to its Minimal coverage, its score is assessed as Minimal.
References
linux_auditd_alerts_and_log_analytics_agent_integration Linux auditd alerts and Log Analytics agent integration technique_scores T1136 Create Account
Comments
This control is only relevant for Linux endpoints, and it provides partial coverage for the only sub-technique relevant on Linux endpoints, Local Account.
References
azure_sentinel Azure Sentinel technique_scores T1136 Create Account
Comments
This control provides partial coverage for all of this technique's sub-techniques, resulting in an overall score of Partial.
References
role_based_access_control Role Based Access Control technique_scores T1136 Create Account
Comments
This control only provides protection for one of this technique's sub-techniques while not providing any protection for the remaining and therefore its coverage score factor is Minimal, resulting in a Minimal score.
References
azure_ad_privileged_identity_management Azure AD Privileged Identity Management technique_scores T1136 Create Account
Comments
This control only provides protection for one of this technique's sub-techniques while not providing any detection for the remaining and therefore its coverage score is Minimal, resulting in a Minimal score.
References

ATT&CK Subtechniques

Technique ID Technique Name Number of Mappings
T1136.003 Cloud Account 18
T1136.002 Domain Account 16
T1136.001 Local Account 15