Unauthorized Access
highunauthorized-access
Attacker gains access to resources without proper authentication or authorization
SpoofingElevation of Privilege
MITRE ATT&CK techniques
| ID | Name | Tactic |
|---|---|---|
| T1078 | Valid Accounts | Defense Evasion |
| T1110 | Brute Force | Credential Access |
Common Weakness Enumeration
Mitigating controls
ctrl-unauth-1- Implement strong authentication mechanisms (MFA)
ctrl-unauth-2- Enforce least-privilege access controls
ctrl-unauth-3- Implement network segmentation and firewalls
ctrl-unauth-4- Enable comprehensive access logging and monitoring
ctrl-unauth-5- Regularly review and audit access permissions