Skip to main content

CCC.Core.TH01: Access is Granted to Unauthorized Users

Threat ID:CCC.Core.TH01
Title:Access is Granted to Unauthorized Users
Description:

Logic designed to give different permissions to different entities may be misconfigured or manipulated, allowing unauthorized entities to access restricted parts of the service, its data, or its child resources. This could result in a loss of data confidentiality or tolerance of unauthorized actions which impact the integrity and availability of resources and data.

Related Capabilities

IDTitleDescription
CCC.Core.F06Access ControlThe service automatically enforces user configurations to restrict or allow access to a specific component or a child resource based on factors such as user identities, roles, groups, or attributes.

External Mappings

Reference IDEntry IDStrengthRemarks
MITRE-ATT&CK
T1078
0
Valid Accounts
MITRE-ATT&CK
T1548
0
Abuse Elevation Control Mechanism
MITRE-ATT&CK
T1203
0
Exploitation for Credential Access
MITRE-ATT&CK
T1098
0
Account Manipulation
MITRE-ATT&CK
T1484
0
Domain or Tenant Policy Modification
MITRE-ATT&CK
T1546
0
Event Triggered Execution
MITRE-ATT&CK
T1537
0
Transfer Data to Cloud Account
MITRE-ATT&CK
T1567
0
Exfiltration Over Web Services
MITRE-ATT&CK
T1048
0
Exfiltration Over Alternative Protocol
MITRE-ATT&CK
T1485
0
Data Destruction
MITRE-ATT&CK
T1565
0
Data Manipulation
MITRE-ATT&CK
T1027
0
Obfuscated Files or Information

Controls

IDTitleObjectiveControl FamilyThreat MappingsGuideline MappingsAssessment Requirements
CCC.ObjStor.C01Prevent Requests to Buckets or Objects with Untrusted KMS KeysPrevent any requests to object storage buckets or objects using untrusted KMS keys to protect against unauthorized data encryption that can impact data availability and integrity. Data
2
5
4
CCC.Core.C02Encrypt Data for StorageEnsure that all data stored is encrypted at rest using strong encryption algorithms. Data
1
7
1
CCC.ObjStor.C02Enforce Uniform Bucket-level Access to Prevent Inconsistent PermissionsEnsure that uniform bucket-level access is enforced across all object storage buckets. This prevents the use of ad-hoc or inconsistent object-level permissions, ensuring centralized, consistent, and secure access management in accordance with the principle of least privilege. Identity and Access Management
1
5
2
CCC.Core.C03Implement Multi-factor Authentication (MFA) for AccessEnsure that all sensitive activities require two or more identity factors during authentication to prevent unauthorized access. Identity and Access Management
1
6
4
CCC.Core.C05Prevent Access from Untrusted EntitiesEnsure that secure access controls enforce the principle of least privilege to restrict access to authorized entities from explicitly trusted sources only. Identity and Access Management
1
8
6
CCC.Core.C04Log All Access and ChangesEnsure that all access attempts are logged to maintain a detailed audit trail for security and compliance purposes. Logging & Monitoring
1
5
3