Capability ID | Capability Description | Category | Value | ATT&CK ID | ATT&CK Name | Notes |
---|---|---|---|---|---|---|
EID-PIM-E5 | Privileged Identity Management | protect | minimal | T1078 | Valid Accounts |
Comments
This control only provides protection for one of this technique's sub-techniques while not providing any protection for the remaining and therefore its coverage score is Minimal, resulting in a Minimal score.
References
|
EID-PIM-E5 | Privileged Identity Management | protect | minimal | T1078 | Valid Accounts |
Comments
The PIM control supports an Access Review feature, which can partially be used to avoid stale role assignment for Valid Accounts: Cloud Accounts. The control does not protect against this technique's other sub-techniques, resulting in a Minimal coverage score, for an overall score of Minimal.
License Requirements:
Microsoft Entra ID P2 or Microsoft Entra ID Governance
References
|
EID-PIM-E5 | Privileged Identity Management | protect | partial | T1078.004 | Cloud Accounts |
Comments
This control's Access Review feature supports scheduling a routine review of cloud account permission levels to look for those that could allow an adversary to gain wide access. This information can then be used to validate if such access is required and identify which (privileged) accounts should be monitored closely. This reduces the availability of valid accounts to adversaries. This review would normally be scheduled periodically, at most weekly, and therefore its temporal score is Partial.
References
|
EID-PIM-E5 | Privileged Identity Management | protect | partial | T1078.004 | Cloud Accounts |
Comments
The PIM control supports an Access Review feature, which can be created to review privileged access to avoid stale role assignments. Access Reviews can be scheduled routinely, and used to help evaluate the state of privileged access. Performing this review can help minimize the availability of valid accounts to adversaries. Although this review can be scheduled periodically, it would not occur at real-time frequency, and is therefore assigned Partial.
License Requirements:
Microsoft Entra ID P2 or Microsoft Entra ID Governance
References
|
EID-PIM-E5 | Privileged Identity Management | protect | partial | T1098 | Account Manipulation |
Comments
This control provides significant protection for some of this technique's sub-techniques while not providing any protection for others, resulting in a Partial score.
References
|
EID-PIM-E5 | Privileged Identity Management | detect | minimal | T1098 | Account Manipulation |
Comments
This control only provides detection for one of this technique's sub-techniques while not providing any detection for the remaining and therefore its coverage score is Minimal, resulting in a Minimal score.
References
|
EID-PIM-E5 | Privileged Identity Management | detect | minimal | T1098 | Account Manipulation |
Comments
The PIM control can assist post-execution detection by alerting on the assignment of privileged Additional Cloud Roles. This is not extendable to detect against the technique's other sub-techniques, resulting in overall minimal detection coverage.
License Requirements:
Microsoft Entra ID P2 or Microsoft Entra ID Governance
References
|
EID-PIM-E5 | Privileged Identity Management | protect | significant | T1098 | Account Manipulation |
Comments
The PIM control provides significant protection against multiple sub-techniques, although not all, resulting in partial coverage. The control scores Significant for the temporal aspects of its protection, which include requiring activation by eligible privileged roles, and confirming user identity with MFA before execution.
License Requirements:
Microsoft Entra ID P2 or Microsoft Entra ID Governance
References
|
EID-PIM-E5 | Privileged Identity Management | protect | significant | T1098.001 | Additional Cloud Credentials |
Comments
Privileged roles such as the Application Administrator role can be configured to require MFA on activation to provide additional protection against the execution of this technique. In addition these privileged roles can be assigned as eligible rather than permanently active roles to further reduce the attack surface.
References
|
EID-PIM-E5 | Privileged Identity Management | protect | significant | T1098.001 | Additional Cloud Credentials |
Comments
The PIM control can enforce on-activation requirements for privileged roles, such as the Application Administrator. Configuration can include an MFA requirement, which can provide additional protection against Additional Cloud Credentials. PIM can also be used to assigned privileged roles as "eligible" rather than "active" to further, requiring activation of the assigned role before use. Due to these features, a score of Significant is assigned.
License Requirements:
Microsoft Entra ID P2 or Microsoft Entra ID Governance
References
|
EID-PIM-E5 | Privileged Identity Management | protect | significant | T1098.003 | Additional Cloud Roles |
Comments
This control can require MFA to be triggered when the Global Administrator role is assigned to an account or when the role is activated by a user.
References
|
EID-PIM-E5 | Privileged Identity Management | detect | significant | T1098.003 | Additional Cloud Roles |
Comments
This control can notify administrators whenever the Global Administrator role is assigned to an account and can therefore be used to detect the execution of this sub-technique. Assigning the Global Administrator role to an account is an infrequent operation and as a result, the false positive rate should be minimal.
References
|
EID-PIM-E5 | Privileged Identity Management | detect | significant | T1098.003 | Additional Cloud Roles |
Comments
The PIM control can notify administrators when the Global Administrator and other administrator roles are assigned to an account, allowing it to be a method of detection for Additional Cloud Roles execution. PIM supports multiple security alerts, with customizable triggers, including numeric specificity. Following Microsoft's role based access control Best Practices, assignment of Global Administrator, among other administrative roles should be uncommon, resulting in an overall low false positive rate for detecting unexpected privileged role assignments.
License Requirements:
Microsoft Entra ID P2 or Microsoft Entra ID Governance
References
|
EID-PIM-E5 | Privileged Identity Management | protect | significant | T1098.003 | Additional Cloud Roles |
Comments
The PIM control can enforce on-activation requirements for privileged roles, such as the Global Administrator. Configuration can include an MFA requirement, which can provide additional protection against Additional Cloud Roles. MFA can be required both when assigning these administrative roles, and/or when a user activates the role.
License Requirements:
Microsoft Entra ID P2 or Microsoft Entra ID Governance
References
|
EID-PIM-E5 | Privileged Identity Management | detect | significant | T1098.007 | Additional Local or Domain Groups |
Comments
Entra ID's continuous access evaluation is a security control implemented by enabling services to subscribe to critical Microsoft Entra events. Those events can then be evaluated and enforced near real time. This process enables tenant users lose access to organizational SharePoint Online files, email, calendar, or tasks, and Teams from Microsoft 365 client apps within minutes after a critical event is detected. The following events are currently evaluated:
User Account is deleted or disabled
Password for a user is changed or reset
Multifactor authentication is enabled for the user
Administrator explicitly revokes all refresh tokens for a user
High user risk detected by Microsoft Entra ID Protection
License Requirements:
Continuous access evaluation will be included in all versions of Microsoft 365.
References
|
EID-PIM-E5 | Privileged Identity Management | protect | significant | T1098.007 | Additional Local or Domain Groups |
Comments
Entra ID's continuous access evaluation is a security control implemented by enabling services to subscribe to critical Microsoft Entra events. Those events can then be evaluated and enforced near real time. This process enables tenant users lose access to organizational SharePoint Online files, email, calendar, or tasks, and Teams from Microsoft 365 client apps within minutes after a critical event is detected. The following events are currently evaluated:
User Account is deleted or disabled
Password for a user is changed or reset
Multifactor authentication is enabled for the user
Administrator explicitly revokes all refresh tokens for a user
High user risk detected by Microsoft Entra ID Protection
License Requirements:
Continuous access evaluation will be included in all versions of Microsoft 365.
References
|
EID-PIM-E5 | Privileged Identity Management | protect | minimal | T1136 | Create Account |
Comments
This control only provides protection for one of this technique's sub-techniques while not providing any detection for the remaining and therefore its coverage score is Minimal, resulting in a Minimal score.
References
|
EID-PIM-E5 | Privileged Identity Management | protect | partial | T1136 | Create Account |
Comments
The PIM control provides significant protection against Create Account: Cloud Account, but not against the technique's other sub-techniques. An overall score of Partial is provided, although overall coverage for the across the sub-techniques is minimal.
License Requirements:
Microsoft Entra ID P2 or Microsoft Entra ID Governance
References
|
EID-PIM-E5 | Privileged Identity Management | protect | significant | T1136.003 | Cloud Account |
Comments
Privileged roles such as the User Administrator role can be configured to require MFA on activation to provide additional protection against the execution of this technique. In addition, these privileged roles can be assigned as eligible rather than permanently active roles to further reduce the attack surface.
References
|
EID-PIM-E5 | Privileged Identity Management | protect | significant | T1136.003 | Cloud Account |
Comments
The PIM control can enforce on-activation requirements for privileged roles, such as the User Administrator. Configuration can include an MFA requirement, which can provide additional protection against Cloud Account creation. PIM can also be used to assigned privileged roles as "eligible" rather than "active" to further, requiring activation of the assigned role before use. Due to these features, a score of Significant is assigned.
License Requirements:
Microsoft Entra ID P2 or Microsoft Entra ID Governance
References
|
EID-PIM-E5 | Privileged Identity Management | protect | minimal | T1556 | Modify Authentication Process |
Comments
The PIM control significantly protects against the modification of Multi-Factor Authentication by placing limitations and restrictions on relevant privileged accounts. However, this is overall Minimal coverage relative to the all the technique's sub-techniques.
License Requirements:
Microsoft Entra ID P2 or Microsoft Entra ID Governance
References
|
EID-PIM-E5 | Privileged Identity Management | protect | significant | T1556.006 | Multi-Factor Authentication |
Comments
The PIM control can enforce on-activation requirements for privileged roles, such as the Conditional Access Administrator, Global Administrator or Security Administrator, which include privileges necessary to modify certain MFA settings. Configuration can include an MFA requirement, which can provide additional protection against modifying Multi-Factor Authentication. MFA can be required both when assigning these administrative roles, and/or when a user activates the role. PIM can also be used to assigned privileged roles as "eligible" rather than "active" to further, requiring activation of the assigned role before use. This scores Significant for its limitation of the overall accounts with these privileges, and the conditions for use.
License Requirements:
Microsoft Entra ID P2 or Microsoft Entra ID Governance
References
|
EID-PIM-E5 | Privileged Identity Management | protect | significant | T1556.007 | Hybrid Identity |
Comments
The PIM control can enforce on-activation requirements for privileged roles, such as the Global Administrator, which may be used for modifying the hybrid identity authentication process from the cloud. Ideally, ensure these accounts are dedicated cloud-only rather than hybrid accounts. MFA can be required both when assigning Global Administrator, and/or when a user activates the role. PIM can also be used to assigned privileged roles as "eligible" rather than "active" to further, requiring activation of the assigned role before use. This scores Significant for its limitation of the overall accounts with these privileges, and the conditions for use.
License Requirements:
Microsoft Entra ID P2 or Microsoft Entra ID Governance
References
|
EID-PIM-E5 | Privileged Identity Management | protect | significant | T1651 | Cloud Administration Command |
Comments
The PIM control can enforce on-activation requirements for privileged roles, such as Global Administrators. Configuration can include an MFA requirement, which can help limit the overall privileged accounts available and their ability to execute administration commands. PIM can also be used to assigned privileged roles as "eligible" rather than "active" to further, requiring activation of the assigned role before use. Due to these features, a score of Significant is assigned.
License Requirements:
Microsoft Entra ID P2 or Microsoft Entra ID Governance
References
|