Defensive Strategies
Overview:
The following provides a list of strategies for defending against the techniques and sub techniques identified within TA0001.
Exploit Public-Facing Application (T1190)
Defense Strategies:
Secure Application Development:
Implement secure coding practices (e.g., input validation, parameterized queries).
Conduct regular code reviews and static/dynamic application testing.
Web Application Firewall (WAF):
Use WAFs like Azure WAF to detect and block exploitation attempts.
Patching and Updates:
Regularly patch operating systems, frameworks, and third-party dependencies.
Access Control:
Restrict access to public-facing applications using Azure NSGs and Azure AD App Proxy.
Monitoring and Alerts:
Monitor application logs for suspicious activity with Azure Monitor and Application Insights.
Trusted Relationship (T1199)
Defense Strategies:
Third-Party Risk Management:
Perform security audits and risk assessments of vendors and partners.
Limit access for third-party providers to only what is necessary.
Conditional Access:
Enforce Azure AD Conditional Access policies for external accounts and federated users.
Logging and Monitoring:
Enable logging for all delegated administrator actions in Office 365 or Azure AD.
Use Azure Sentinel to monitor and detect anomalies in trusted relationships.
Privilege Management:
Regularly review and reduce delegated permissions for third-party entities.
Rotate credentials and enforce MFA for all external accounts.
Incident Response:
Create playbooks to handle compromised third-party accounts or abused trust relationships.
Robust Monitoring
Ensure that third party accounts are monitored for any unauthorized activity.
Valid Accounts (T1078)
Default Accounts (T1078.001)
Defense Strategies:
Disable Default Accounts:
Immediately disable or rename default accounts after provisioning new resources.
Strong Authentication:
Enforce complex passwords and MFA for accounts that cannot be disabled.
Configuration Management:
Use Azure Policy to ensure resources are deployed with hardened settings.
Access Auditing:
Regularly audit login attempts and access patterns for default accounts.
Cloud Accounts (T1078.004)
Defense Strategies:
Credential Management:
Store secrets, tokens, and API keys in Azure Key Vault with strict access policies.
Role-Based Access Control (RBAC):
Enforce least privilege by assigning minimal roles to cloud accounts.
Logging and Monitoring:
Use Azure Activity Logs and Azure Monitor to track access patterns.
Automated Key Rotation:
Implement automated key rotation policies for service accounts and applications.
Zero Trust Architecture:
Use conditional access policies to validate the context of logins.
Invest in Identity Protection or Microsoft Defender
Utilize Azure Entra Identity Protection and Defender to detect anomalous behaviors.
Last updated