Statements (26)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:MITRE_ATT&CK_technique
|
| gptkbp:canBe |
gptkb:malware
threat actors advanced persistent threats |
| gptkbp:canBeBypassedBy |
security controls
authentication mechanisms trust relationships |
| gptkbp:category |
gptkb:Defense_Evasion
|
| gptkbp:citation |
https://attack.mitre.org/techniques/T1553/
|
| gptkbp:describes |
Adversaries may subvert mechanisms that are designed to control trust relationships and authentication.
|
| gptkbp:example |
altering authentication tokens
manipulating trust policies modifying certificate stores |
| gptkbp:mitigatedBy |
audit authentication mechanisms
implement strong access controls monitor trust relationships |
| gptkbp:partOf |
gptkb:MITRE_ATT&CK_framework
|
| gptkbp:target |
operating systems
network devices applications cloud environments |
| gptkbp:technique |
T1553
|
| gptkbp:usedIn |
cybersecurity
|
| gptkbp:bfsParent |
gptkb:Defense_Evasion
|
| gptkbp:bfsLayer |
7
|
| https://www.w3.org/2000/01/rdf-schema#label |
Subvert Trust Controls
|