Password Policies
Techniques Addressed by Mitigation |
||||
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1110 | Brute Force |
Refer to NIST guidelines when creating password policies.(Citation: NIST 800-63-3) |
|
T1110.001 | Password Guessing |
Refer to NIST guidelines when creating password policies. (Citation: NIST 800-63-3) |
||
T1110.002 | Password Cracking |
Refer to NIST guidelines when creating password policies. (Citation: NIST 800-63-3) |
||
T1110.003 | Password Spraying |
Refer to NIST guidelines when creating password policies. (Citation: NIST 800-63-3) |
||
T1110.004 | Credential Stuffing |
Refer to NIST guidelines when creating password policies. (Citation: NIST 800-63-3) |
||
Enterprise | T1555 | Credentials from Password Stores |
The password for the user's login keychain can be changed from the user's login password. This increases the complexity for an adversary because they need to know an additional password. Organizations may consider weighing the risk of storing credentials in password stores and web browsers. If system, software, or web browser credential disclosure is a significant concern, technical controls, policy, and user training may be used to prevent storage of credentials in improper locations. |
|
T1555.001 | Keychain |
The password for the user's login keychain can be changed from the user's login password. This increases the complexity for an adversary because they need to know an additional password. |
||
T1555.003 | Credentials from Web Browsers |
Organizations may consider weighing the risk of storing credentials in web browsers. If web browser credential disclosure is a significant concern, technical controls, policy, and user training may be used to prevent storage of credentials in web browsers. |
||
T1555.005 | Password Managers |
Refer to NIST guidelines when creating password policies for master passwords.(Citation: NIST 800-63-3) |
||
Enterprise | T1187 | Forced Authentication |
Use strong passwords to increase the difficulty of credential hashes from being cracked if they are obtained. |
|
Enterprise | T1556 | Modify Authentication Process |
Ensure that |
|
T1556.005 | Reversible Encryption |
Ensure that |
||
Enterprise | T1601 | Modify System Image |
Refer to NIST guidelines when creating password policies. (Citation: NIST 800-63-3) |
|
T1601.001 | Patch System Image |
Refer to NIST guidelines when creating password policies. (Citation: NIST 800-63-3) |
||
T1601.002 | Downgrade System Image |
Refer to NIST guidelines when creating password policies. (Citation: NIST 800-63-3) |
||
Enterprise | T1599 | Network Boundary Bridging |
Refer to NIST guidelines when creating password policies. (Citation: NIST 800-63-3) |
|
T1599.001 | Network Address Translation Traversal |
Refer to NIST guidelines when creating password policies. (Citation: NIST 800-63-3) |
||
Enterprise | T1003 | OS Credential Dumping |
Ensure that local administrator accounts have complex, unique passwords across all systems on the network. |
|
T1003.001 | LSASS Memory |
Ensure that local administrator accounts have complex, unique passwords across all systems on the network. |
||
T1003.002 | Security Account Manager |
Ensure that local administrator accounts have complex, unique passwords across all systems on the network. |
||
T1003.003 | NTDS |
Ensure that local administrator accounts have complex, unique passwords across all systems on the network. |
||
T1003.004 | LSA Secrets |
Ensure that local administrator accounts have complex, unique passwords across all systems on the network. |
||
T1003.005 | Cached Domain Credentials |
Ensure that local administrator accounts have complex, unique passwords across all systems on the network. |
||
T1003.006 | DCSync |
Ensure that local administrator accounts have complex, unique passwords across all systems on the network. |
||
T1003.007 | Proc Filesystem |
Ensure that root accounts have complex, unique passwords across all systems on the network. |
||
T1003.008 | /etc/passwd and /etc/shadow |
Ensure that root accounts have complex, unique passwords across all systems on the network. |
||
Enterprise | T1201 | Password Policy Discovery |
Ensure only valid password filters are registered. Filter DLLs must be present in Windows installation directory ( |
|
Enterprise | T1563 | T1563.001 | Remote Service Session Hijacking: SSH Hijacking |
Ensure SSH key pairs have strong passwords and refrain from using key-store technologies such as ssh-agent unless they are properly protected. |
Enterprise | T1021 | T1021.002 | Remote Services: SMB/Windows Admin Shares |
Do not reuse local administrator account passwords across systems. Ensure password complexity and uniqueness such that the passwords cannot be cracked or guessed. |
Enterprise | T1072 | Software Deployment Tools |
Verify that account credentials that may be used to access deployment systems are unique and not used throughout the enterprise network. |
|
Enterprise | T1558 | Steal or Forge Kerberos Tickets |
Ensure strong password length (ideally 25+ characters) and complexity for service accounts and that these passwords periodically expire.(Citation: AdSecurity Cracking Kerberos Dec 2015) Also consider using Group Managed Service Accounts or another third party product such as password vaulting.(Citation: AdSecurity Cracking Kerberos Dec 2015) |
|
T1558.002 | Silver Ticket |
Ensure strong password length (ideally 25+ characters) and complexity for service accounts and that these passwords periodically expire.(Citation: AdSecurity Cracking Kerberos Dec 2015) Also consider using Group Managed Service Accounts or another third party product such as password vaulting.(Citation: AdSecurity Cracking Kerberos Dec 2015) |
||
T1558.003 | Kerberoasting |
Ensure strong password length (ideally 25+ characters) and complexity for service accounts and that these passwords periodically expire.(Citation: AdSecurity Cracking Kerberos Dec 2015) Also consider using Group Managed Service Accounts or another third party product such as password vaulting.(Citation: AdSecurity Cracking Kerberos Dec 2015) |
||
T1558.004 | AS-REP Roasting |
Ensure strong password length (ideally 25+ characters) and complexity for service accounts and that these passwords periodically expire. Also consider using Group Managed Service Accounts or another third party product such as password vaulting. (Citation: AdSecurity Cracking Kerberos Dec 2015) |
||
Enterprise | T1537 | Transfer Data to Cloud Account |
Consider rotating access keys within a certain number of days to reduce the effectiveness of stolen credentials. |
|
Enterprise | T1552 | Unsecured Credentials |
Use strong passphrases for private keys to make cracking difficult. Do not store credentials within the Registry. Establish an organizational policy that prohibits password storage in files. |
|
T1552.001 | Credentials In Files |
Establish an organizational policy that prohibits password storage in files. |
||
T1552.002 | Credentials in Registry |
Do not store credentials within the Registry. |
||
T1552.004 | Private Keys |
Use strong passphrases for private keys to make cracking difficult. |
||
Enterprise | T1550 | T1550.003 | Use Alternate Authentication Material: Pass the Ticket |
Ensure that local administrator accounts have complex, unique passwords. |
Enterprise | T1078 | Valid Accounts |
Applications and appliances that utilize default username and password should be changed immediately after the installation, and before deployment to a production environment. (Citation: US-CERT Alert TA13-175A Risks of Default Passwords on the Internet) When possible, applications that use SSH keys should be updated periodically and properly secured. |
|
T1078.001 | Default Accounts |
Applications and appliances that utilize default username and password should be changed immediately after the installation, and before deployment to a production environment. (Citation: US-CERT Alert TA13-175A Risks of Default Passwords on the Internet) |
||
T1078.003 | Local Accounts |
Ensure that local administrator accounts have complex, unique passwords across all systems on the network. |
||
T1078.004 | Cloud Accounts |
Ensure that cloud accounts, particularly privileged accounts, have complex, unique passwords across all systems on the network. Passwords and access keys should be rotated regularly. This limits the amount of time credentials can be used to access resources if a credential is compromised without your knowledge. Cloud service providers may track access key age to help audit and identify keys that may need to be rotated.(Citation: AWS - IAM Console Best Practices) |
References
- Grassi, P., et al. (2017, December 1). SP 800-63-3, Digital Identity Guidelines. Retrieved January 16, 2019.
- Microsoft. (2021, October 28). Store passwords using reversible encryption. Retrieved January 3, 2022.
- Microsoft. (n.d.). Installing and Registering a Password Filter DLL. Retrieved November 21, 2017.
- Metcalf, S. (2015, December 31). Cracking Kerberos TGS Tickets Using Kerberoast – Exploiting Kerberos to Compromise the Active Directory Domain. Retrieved March 22, 2018.
- Moncur, Rob. (2020, July 5). New Information in the AWS IAM Console Helps You Follow IAM Best Practices. Retrieved August 4, 2020.
- US-CERT. (n.d.). Risks of Default Passwords on the Internet. Retrieved April 12, 2019.
Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.