Skip to main content

CCC.Core.TH01: Access is Granted to Unauthorized Users

Threat ID:CCC.Core.TH01
Title:Access is Granted to Unauthorized Users
Description:

Logic designed to give different permissions to different entities may be misconfigured or manipulated, allowing unauthorized entities to access restricted parts of the service, its data, or its child resources. This could result in a loss of data confidentiality or tolerance of unauthorized actions which impact the integrity and availability of resources and data.

Related Capabilities

IDTitleDescription
CCC.Core.F06Access ControlThe service automatically enforces user configurations to restrict or allow access to a specific component or a child resource based on factors such as user identities, roles, groups, or attributes.

External Mappings

Reference IDEntry IDStrengthRemarks
MITRE-ATT&CK
T1078
0
Valid Accounts
MITRE-ATT&CK
T1548
0
Abuse Elevation Control Mechanism
MITRE-ATT&CK
T1203
0
Exploitation for Credential Access
MITRE-ATT&CK
T1098
0
Account Manipulation
MITRE-ATT&CK
T1484
0
Domain or Tenant Policy Modification
MITRE-ATT&CK
T1546
0
Event Triggered Execution
MITRE-ATT&CK
T1537
0
Transfer Data to Cloud Account
MITRE-ATT&CK
T1567
0
Exfiltration Over Web Services
MITRE-ATT&CK
T1048
0
Exfiltration Over Alternative Protocol
MITRE-ATT&CK
T1485
0
Data Destruction
MITRE-ATT&CK
T1565
0
Data Manipulation
MITRE-ATT&CK
T1027
0
Obfuscated Files or Information

Controls

IDTitleObjectiveControl FamilyThreat MappingsGuideline MappingsAssessment Requirements
CCC.Build.C01Restrict Allowed Build AgentsEnsure that builds are executed only on authorized build agents to maintain control over the build environment and prevent unauthorized code execution. Access Control
1
3
1
CCC.Build.C02Restrict Allowed External Services for Build TriggersEnsure that builds can only be triggered by authorized external services or repositories to prevent unauthorized code execution or tampering. Access Control
1
3
1
CCC.Core.C02Encrypt Data for StorageEnsure that all data stored is encrypted at rest using strong encryption algorithms. Data
1
7
1
CCC.Core.C04Log All Access and ChangesEnsure that all access attempts are logged to maintain a detailed audit trail for security and compliance purposes. Logging & Monitoring
1
5
3
CCC.Core.C05Prevent Access from Untrusted EntitiesEnsure that secure access controls enforce the principle of least privilege to restrict access to authorized entities from explicitly trusted sources only. Identity and Access Management
1
8
6