Statements (26)
Predicate | Object |
---|---|
gptkbp:instanceOf |
MITRE ATT&CK technique
|
gptkbp:canBe |
malware
threat actors advanced persistent threats |
gptkbp:canBeBypassedBy |
security controls
authentication mechanisms trust relationships |
gptkbp:category |
gptkb:Defense_Evasion
|
gptkbp:citation |
https://attack.mitre.org/techniques/T1553/
|
gptkbp:describes |
Adversaries may subvert mechanisms that are designed to control trust relationships and authentication.
|
gptkbp:example |
altering authentication tokens
manipulating trust policies modifying certificate stores |
https://www.w3.org/2000/01/rdf-schema#label |
Subvert Trust Controls
|
gptkbp:mitigatedBy |
audit authentication mechanisms
implement strong access controls monitor trust relationships |
gptkbp:partOf |
gptkb:MITRE_ATT&CK_framework
|
gptkbp:target |
operating systems
network devices applications cloud environments |
gptkbp:technique |
T1553
|
gptkbp:usedIn |
cybersecurity
|
gptkbp:bfsParent |
gptkb:Defense_Evasion
|
gptkbp:bfsLayer |
7
|