Additional Cloud Roles (T1098.003)

View on ATT&CK

In Playbook

Associated Tactics

  • Persistence
  • Privilege Escalation

Persistence (TA0003)

The adversary is trying to maintain their foothold. Persistence consists of techniques that adversaries use to keep access to systems across restarts, changed credentials, and other interruptions that could cut off their access. Techniques used for persistence include any access, action, or configuration changes that let them maintain their foothold on systems, such as replacing or hijacking legitimate code or adding startup code.

View on ATT&CK

Procedure Examples

Description Source(s)
Brian Bahtiarian, David Blanton, Britton Manahan and Kyle Pellett. (2022, April 5). Incident report: From CLI to console, chasing an attacker in AWS. Retrieved April 7, 2022. Expel AWS Attacker
Ako-Adjei, K., Dickhaus, M., Baumgartner, P., Faigel, D., et. al.. (2019, October 8). About admin roles. Retrieved October 18, 2019. Microsoft O365 Admin Roles
AWS. (n.d.). Policies and permissions in IAM. Retrieved April 1, 2022. AWS IAM Policies and Permissions
Google Cloud. (2022, March 31). Understanding policies. Retrieved April 1, 2022. Google Cloud IAM Policies
Invictus Incident Response. (2024, January 31). The curious case of DangerDev@protonmail.me. Retrieved March 19, 2024. Invictus IR DangerDev 2024
Microsoft. (n.d.). Add Another Admin. Retrieved October 18, 2019. Microsoft Support O365 Add Another Admin, October 2019
Spencer Gietzen. (n.d.). AWS IAM Privilege Escalation – Methods and Mitigation. Retrieved May 27, 2022. Rhino Security Labs AWS Privilege Escalation