Esc
Access Policy Administration
Definition
Access policy administration is the systematic process of defining, implementing, and managing access control policies that dictate user permissions to resources.
Synonyms: Access Control Administration.Artifact Relationships:
This defensive technique is related to specific artifacts. Click the artifact node for more information.
Technique Subclasses
There are 5 techniques in this category, Access Policy Administration.
| Name | ID | Definition | Synonyms |
|---|---|---|---|
| Access Policy Administration | D3-APA | Access policy administration is the systematic process of defining, implementing, and managing access control policies that dictate user permissions to resources. | Access Control Administration |
| - Local File Permissions | D3-LFP | Local file permissions is the systematic process of defining, implementing, and managing access control policies that dictate user permissions for accessing files on a local system through the configuration of operating system functionality. | |
| - User Account Permissions | D3-UAP | Restricting a user account's access to resources. | |
| - User Group Permissions | D3F-UGPH | Access control where access is determined based on attributes associated with users and the objects being accessed. | Role Based Access Controls |
| - Domain Trust Policy | D3-DTP | Restricting inter-domain trust by modifying domain configuration. |
Related ATT&CK Techniques:
These mappings are inferred, experimental, and will improve as the
knowledge graph grows.
These offensive techniques are determined related because of the way this defensive technique,, , , and .
Lateral Movement
Software Deployment Tools
Internal Spearphishing
Privilege Escalation
Abuse Elevation Control Mechanism
Account Manipulation
Process Injection
Valid Accounts
Boot or Logon Initialization Scripts
Boot or Logon Autostart Execution
Event Triggered Execution
Hijack Execution Flow
Create or Modify System Process
Scheduled Task/Job
Command And Control
Encrypted Channel
Application Layer Protocol
Impact
Account Access Removal
Data Encrypted for Impact
Data Manipulation
Collection
Automated Collection
Data Staged
Archive Collected Data
Data from Local System
Email Collection
Discovery
Account Discovery
System Network Configuration Discovery
Remote System Discovery
System Owner/User Discovery
File and Directory Discovery
Persistence
Account Manipulation
Create Account
Valid Accounts
Boot or Logon Initialization Scripts
Office Application Startup
Boot or Logon Autostart Execution
Event Triggered Execution
Hijack Execution Flow
Modify Authentication Process
Create or Modify System Process
Scheduled Task/Job
Server Software Component
Initial Access
Phishing
Valid Accounts
Execution
Software Deployment Tools
User Execution
Command and Scripting Interpreter
Scheduled Task/Job
Credential Access
Unsecured Credentials
Modify Authentication Process
OS Credential Dumping
Forced Authentication
Credentials from Password Stores
Steal or Forge Authentication Certificates
Defense Evasion
Abuse Elevation Control Mechanism
Indicator Removal
Masquerading
Process Injection
Valid Accounts
System Binary Proxy Execution
Obfuscated Files or Information
Hide Artifacts
Trusted Developer Utilities Proxy Execution
Hijack Execution Flow
Deobfuscate/Decode Files or Information
Modify Authentication Process
Rootkit
Impair Defenses
XSL Script Processing
Exfiltration
Exfiltration Over C2 Channel
Exfiltration Over Alternative Protocol