Esc
Restore User Account Access
Artifact Relationships:
This defensive technique is related to specific artifacts. Click the artifact node for more information.
Technique Subclasses
There are 2 techniques in this category, Restore User Account Access.
| Name | ID | Definition | Synonyms |
|---|---|---|---|
| Restore User Account Access | D3-RUAA | Restoring a user account's access to resources. | |
| - Unlock Account | D3-ULA | Restoring a user account's access to resources by unlocking a locked User Account. |
Related ATT&CK Techniques:
These mappings are inferred, experimental, and will improve as the
knowledge graph grows.
These offensive techniques are determined related because of the way this defensive technique,, , and .
Privilege Escalation
Account Manipulation
Valid Accounts
Abuse Elevation Control Mechanism
Impact
Account Access Removal
Persistence
Account Manipulation
Create Account
Valid Accounts
Defense Evasion
Valid Accounts
Abuse Elevation Control Mechanism
References
All
Guideline
The following references were used to develop the Restore User Account Access knowledge-base article.
(Note: the consideration of references does not imply specific functionality exists in an offering.)
Cybersecurity Incident & Vulnerability Response Playbooks
Reference Type: Guideline Organization: Cybersecurity and Infrastructure Security Agency Author: Cybersecurity and Infrastructure Security Agency