TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

F5 Labs

A Model for Leveraging the Complexity of Identities

2023-08-09 · Read original ↗

ATT&CK techniques detected

1 predictions
T1078Valid Accounts
42%
"##ttended and unlocked. while examples of malicious use of unlocked devices by other employees or device theft are reasonable, the less nefarious example of the employee ’ s child or roommate using the device and unintentionally introducing malware is much more likely. mitigation…"

Summary

The term identity is everywhere in security, but we rarely discuss or deal with all of the depth and complexity it entails. Sam Bisbee explores the layers inherent in identity and what they mean for managing risk.