TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Huntress

Identity: The Third Phase of Security Operations | Huntress

2023-08-10 · Read original ↗

ATT&CK techniques detected

5 predictions
T1078Valid Accounts
91%
"identity : the third phase of security operations | huntress information security has long been divided into two primary disciplines : host - based and network - focused endeavors. while some sub - disciplines emerged over time, such as application or cloud security, often these …"
T1078.004Cloud Accounts
88%
"email ) to third - party providers with varying degrees of security control and monitoring. as a result, defenders may wish to dispute the importance or uniqueness of identity as a security concern. but adversaries — from financially - motivated criminal entities to state - spons…"
T1078Valid Accounts
76%
"not within the realm of the network owner anymore — where network or host logs can identify its abuse or misuse — but rather in third - party environments that may be inaccessible or require new, emerging solutions to reasonably track and monitor. skeptical audiences might argue …"
T1078.004Cloud Accounts
35%
"assessed as china - based, subverted controls in microsoft ’ s cloud infrastructure to harvest information from multiple government agencies, including the us state and commerce departments. interestingly, researchers outside of microsoft identified ways in which the identified b…"
T1078.004Cloud Accounts
34%
"related account information used to authenticate to such systems. as providers move toward expanded cloud offerings of identity management and authentication, clients must move in step to either demand greater visibility around such actions or leverage resources to monitor and re…"

Summary

We’ve entered the era of identity security. Are you ready? Explore how to counter evolving threats and protect identities with confidence.