CCC.Core.TH01: Access is Granted to Unauthorized Users
Threat ID:CCC.Core.TH01
Title:Access is Granted to Unauthorized Users
Description:
Logic designed to give different permissions to different entities may be misconfigured or manipulated, allowing unauthorized entities to access restricted parts of the service, its data, or its child resources. This could result in a loss of data confidentiality or tolerance of unauthorized actions which impact the integrity and availability of resources and data.
Related Capabilities
ID | Title | Description |
---|---|---|
CCC.Core.F06 | Access Control | The service automatically enforces user configurations to restrict or allow access to a specific component or a child resource based on factors such as user identities, roles, groups, or attributes. |
External Mappings
Reference ID | Entry ID | Strength | Remarks |
---|---|---|---|
MITRE-ATT&CK | T1078 | 0 | Valid Accounts |
MITRE-ATT&CK | T1548 | 0 | Abuse Elevation Control Mechanism |
MITRE-ATT&CK | T1203 | 0 | Exploitation for Credential Access |
MITRE-ATT&CK | T1098 | 0 | Account Manipulation |
MITRE-ATT&CK | T1484 | 0 | Domain or Tenant Policy Modification |
MITRE-ATT&CK | T1546 | 0 | Event Triggered Execution |
MITRE-ATT&CK | T1537 | 0 | Transfer Data to Cloud Account |
MITRE-ATT&CK | T1567 | 0 | Exfiltration Over Web Services |
MITRE-ATT&CK | T1048 | 0 | Exfiltration Over Alternative Protocol |
MITRE-ATT&CK | T1485 | 0 | Data Destruction |
MITRE-ATT&CK | T1565 | 0 | Data Manipulation |
MITRE-ATT&CK | T1027 | 0 | Obfuscated Files or Information |
Controls
ID | Title | Objective | Control Family | Threat Mappings | Guideline Mappings | Assessment Requirements |
---|---|---|---|---|---|---|
CCC.Core.C02 | Encrypt Data for Storage | Ensure that all data stored is encrypted at rest using strong encryption algorithms. | Data | 1 | 7 | 1 |
CCC.Logging.C05 | Ensure Log Bucket is Not Publicly Accessible | Ensure that log storage buckets are not publicly accessible to prevent unauthorized access to sensitive log data. In addition, logs should be replicated to another cloud region to enhance availability, durability, and support disaster recovery requirements. | Identity and Access Management | 1 | 3 | 2 |
CCC.Core.C03 | Implement Multi-factor Authentication (MFA) for Access | Ensure that all sensitive activities require two or more identity factors during authentication to prevent unauthorized access. | Identity and Access Management | 1 | 6 | 4 |
CCC.Core.C05 | Prevent Access from Untrusted Entities | Ensure that secure access controls enforce the principle of least privilege to restrict access to authorized entities from explicitly trusted sources only. | Identity and Access Management | 1 | 8 | 6 |
CCC.Core.C04 | Log All Access and Changes | Ensure that all access attempts are logged to maintain a detailed audit trail for security and compliance purposes. | Logging & Monitoring | 1 | 5 | 3 |