About this program
Threat context: Initial Access Broker Sale
This program audits the controls that mitigate the above threat. Each procedure references one mapped control. Run the program to score your exposure.
Risks addressed
Controls (4)
-
MFA for all user accounts
Multi-factor authentication (MFA) for all user accounts requires users to present at least two independent authentication factors—something they know (password), something they have (hardware token, mobile device), or something they are (biometric)—before gaining access to systems or applications. This control…
How to test + evidence
-
Privileged access management (PAM)
Privileged Access Management (PAM) controls the lifecycle of accounts with elevated system, application, or data permissions through dedicated tooling and processes. PAM solutions typically vault privileged credentials, enforce session recording, require just-in-time access requests with approval workflows, and rotate passwords…
How to test + evidence
-
Account lockout policy on failed logins
Account lockout policies automatically disable user accounts after a specified number of consecutive failed authentication attempts within a defined time window. This control prevents attackers from conducting unlimited password guessing or brute-force attacks against user accounts by enforcing a temporary…
How to test + evidence
-
Credential rotation
Credential rotation involves the periodic, scheduled replacement of authentication credentials including passwords, API keys, certificates, and service account secrets to minimize the window of opportunity for compromised credentials to be exploited. Rotation policies define intervals based on credential type, sensitivity,…
How to test + evidence