Esc
Restore Access
Artifact Relationships:
This defensive technique is related to specific artifacts. Click the artifact node for more information.
Technique Subclasses
There are 5 techniques in this category, Restore Access.
| Name | ID | Definition | Synonyms |
|---|---|---|---|
| Restore Access | D3-RA | Restoring an entity's access to resources. | |
| - Restore Network Access | D3-RNA | Restoring a entity's access to a computer network. | |
| - Unlock Account | D3-ULA | Restoring a user account's access to resources by unlocking a locked User Account. | |
| - Reissue Credential | D3-RIC | Issue a new credential to a user which supercedes their old credential. | |
| - Restore User Account Access | D3-RUAA | Restoring a user account's access to resources. |
Related ATT&CK Techniques:
These mappings are inferred, experimental, and will improve as the
knowledge graph grows.
These offensive techniques are determined related because of the way this defensive technique,, , , and .
Privilege Escalation
Account Manipulation
Access Token Manipulation
Valid Accounts
Abuse Elevation Control Mechanism
Impact
Account Access Removal
Persistence
Account Manipulation
Create Account
Valid Accounts
Server Software Component
Credential Access
Brute Force
OS Credential Dumping
Steal or Forge Kerberos Tickets
Steal Application Access Token
Steal Web Session Cookie
Keychain
Unsecured Credentials
Forge Web Credentials
Defense Evasion
Access Token Manipulation
Valid Accounts
Use Alternate Authentication Material
Abuse Elevation Control Mechanism
Modify Cloud Compute Infrastructure
References
All
Guideline
The following references were used to develop the Restore Access knowledge-base article.
(Note: the consideration of references does not imply specific functionality exists in an offering.)
Cybersecurity Incident & Vulnerability Response Playbooks
Reference Type: Guideline Organization: Cybersecurity and Infrastructure Security Agency Author: Cybersecurity and Infrastructure Security Agency