Unauthorized Access

high

unauthorized-access

Attacker gains access to resources without proper authentication or authorization

SpoofingElevation of Privilege

MITRE ATT&CK techniques

IDNameTactic
T1078 Valid Accounts Defense Evasion
T1110 Brute Force Credential Access

Common Weakness Enumeration

Mitigating controls

ctrl-unauth-1
Implement strong authentication mechanisms (MFA)
ctrl-unauth-2
Enforce least-privilege access controls
ctrl-unauth-3
Implement network segmentation and firewalls
ctrl-unauth-4
Enable comprehensive access logging and monitoring
ctrl-unauth-5
Regularly review and audit access permissions

References