ETL Pipeline Manipulation
highetl-pipeline-manipulation
Attacker modifies data transformation logic or job definitions to corrupt data, exfiltrate information, or inject malicious content
TamperingInformation DisclosureElevation of Privilege
MITRE ATT&CK techniques
| ID | Name | Tactic |
|---|---|---|
| T1565 | Data Manipulation | Impact |
| T1078 | Valid Accounts | Persistence |
Common Weakness Enumeration
Mitigating controls
ctrl-etl-1- Implement strict access controls on pipeline definitions
ctrl-etl-2- Use version control and code review for transformation logic
ctrl-etl-3- Monitor pipeline modifications and execution patterns
ctrl-etl-4- Implement data validation at pipeline stages
ctrl-etl-5- Use separate credentials for pipeline execution with least privilege