T1078.004 Cloud Accounts Mappings

Adversaries may obtain and abuse credentials of a cloud account as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion. Cloud accounts are those created and configured by an organization for use by users, remote support, services, or for administration of resources within a cloud service provider or SaaS application. In some cases, cloud accounts may be federated with traditional identity management system, such as Window Active Directory. (Citation: AWS Identity Federation)(Citation: Google Federating GC)(Citation: Microsoft Deploying AD Federation)

Compromised credentials for cloud accounts can be used to harvest sensitive data from online storage accounts and databases. Access to cloud accounts can also be abused to gain Initial Access to a network by abusing a Trusted Relationship. Similar to Domain Accounts, compromise of federated cloud accounts may allow adversaries to more easily move laterally within an environment.

View in MITRE ATT&CK®

Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name
AC-2 Account Management Protects T1078.004 Cloud Accounts
AC-20 Use of External Systems Protects T1078.004 Cloud Accounts
AC-3 Access Enforcement Protects T1078.004 Cloud Accounts
AC-5 Separation of Duties Protects T1078.004 Cloud Accounts
AC-6 Least Privilege Protects T1078.004 Cloud Accounts
AC-7 Unsuccessful Logon Attempts Protects T1078.004 Cloud Accounts
CA-7 Continuous Monitoring Protects T1078.004 Cloud Accounts
CM-5 Access Restrictions for Change Protects T1078.004 Cloud Accounts
CM-6 Configuration Settings Protects T1078.004 Cloud Accounts
IA-12 Identity Proofing Protects T1078.004 Cloud Accounts
IA-2 Identification and Authentication (organizational Users) Protects T1078.004 Cloud Accounts
IA-5 Authenticator Management Protects T1078.004 Cloud Accounts
SA-10 Developer Configuration Management Protects T1078.004 Cloud Accounts
SA-11 Developer Testing and Evaluation Protects T1078.004 Cloud Accounts
SA-15 Development Process, Standards, and Tools Protects T1078.004 Cloud Accounts
SA-16 Developer-provided Training Protects T1078.004 Cloud Accounts
SA-17 Developer Security and Privacy Architecture and Design Protects T1078.004 Cloud Accounts
SA-3 System Development Life Cycle Protects T1078.004 Cloud Accounts
SA-4 Acquisition Process Protects T1078.004 Cloud Accounts
SA-8 Security and Privacy Engineering Principles Protects T1078.004 Cloud Accounts
SC-28 Protection of Information at Rest Protects T1078.004 Cloud Accounts
SI-4 System Monitoring Protects T1078.004 Cloud Accounts
action.hacking.variety.Use of stolen creds Use of stolen authentication credentials (including credential stuffing) related-to T1078.004 Valid Accounts: Cloud Accounts
aws_config AWS Config technique_scores T1078.004 Cloud Accounts
amazon_guardduty Amazon GuardDuty technique_scores T1078.004 Cloud Accounts
aws_iot_device_defender AWS IoT Device Defender technique_scores T1078.004 Cloud Accounts
aws_iot_device_defender AWS IoT Device Defender technique_scores T1078.004 Cloud Accounts
aws_organizations AWS Organizations technique_scores T1078.004 Cloud Accounts
amazon_cognito Amazon Cognito technique_scores T1078.004 Cloud Accounts
aws_security_hub AWS Security Hub technique_scores T1078.004 Cloud Accounts
aws_identity_and_access_management AWS Identity and Access Management technique_scores T1078.004 Cloud Accounts
aws_identity_and_access_management AWS Identity and Access Management technique_scores T1078.004 Cloud Accounts
aws_single_sign-on AWS Single Sign-On technique_scores T1078.004 Cloud Accounts