Esc
Access Modeling
Definition
Access modeling captures and records the access permissions granted to identities (e.g., administrators, users, groups, systems) and optionally includes details on how these identities are stored, managed, and shared across systems.
Artifact Relationships:
This defensive technique is related to specific artifacts. Click the artifact node for more information.
Related ATT&CK Techniques:
These mappings are inferred, experimental, and will improve as the
knowledge graph grows.
These offensive techniques are determined related because of the way this defensive technique,, , , and .
Privilege Escalation
Account Manipulation
Valid Accounts
Abuse Elevation Control Mechanism
Access Token Manipulation
Domain or Tenant Policy Modification
Impact
Account Access Removal
Persistence
Account Manipulation
Create Account
Valid Accounts
Modify Authentication Process
Credential Access
Modify Authentication Process
Unsecured Credentials
Defense Evasion
Valid Accounts
Abuse Elevation Control Mechanism
Access Token Manipulation
Modify Authentication Process
File and Directory Permissions Modification
Domain or Tenant Policy Modification
References
All
Specification
The following references were used to develop the Access Modeling knowledge-base article.
(Note: the consideration of references does not imply specific functionality exists in an offering.)
RFC7642: System for Cross-domain Identity Management: Definitions, Overview, Concepts, and Requirements
Reference Type: Specification Organization: IETF Author: K. LI, B. Khasnabish, A. Nadalin, Z. Zeltsan