Skip to main content

CCC.IAM.F03: Long-Term Credentials

Capability ID:CCC.IAM.F03
Title:Long-Term Credentials
Description:Ability to create, manage, list and delete long-term credentials such as access keys and service account keys.

Mapped Threats

IDTitleDescriptionExternal MappingsCapability MappingsControl Mappings
CCC.IAM.TH01Valid Cloud Credentials AbuseValid identity credentials such as access keys, tokens or passwords are misused or compromised. Examples include public exposure, token theft, unprotected metadata service of a compromised compute instance or brute-force attacks. The use of these credentials can provide unauthorized access to the cloud environment, potentially bypassing other security controls and enabling lateral movement across cloud resources.
1
1
0
CCC.IAM.TH04Additional Cloud Credentials CreationAn adversary with access to a sufficiently privileged cloud account may create additional credentials such as access keys, service accounts and temporary credentials to establish persistance or elevate their privileges.
1
1
0
CCC.IAM.TH09Long-Lived Static CredentialsLong-lived static credentials such as access keys for an identity are used and not rotated periodically according to security best practices, extending exposure in the event of credentials compromise.
1
1
0
CCC.IAM.TH11Unused CredentialsUnused IAM identity that is no longer needed or monitored remains active. Its compromise is less likely to be detected, and it represents a persistent, unnecessary attack surface.
1
1
0