Cloud Account (T1136.003)

View on ATT&CK

In Playbook

Technique & Subtechniques

Associated Tactics

  • Persistence

Persistence (TA0003)

The adversary is trying to maintain their foothold. Persistence consists of techniques that adversaries use to keep access to systems across restarts, changed credentials, and other interruptions that could cut off their access. Techniques used for persistence include any access, action, or configuration changes that let them maintain their foothold on systems, such as replacing or hijacking legitimate code or adding startup code.

View on ATT&CK

Procedure Examples

Description Source(s)
Ako-Adjei, K., Dickhaus, M., Baumgartner, P., Faigel, D., et. al.. (2019, October 8). About admin roles. Retrieved October 18, 2019. Microsoft O365 Admin Roles
AWS. (n.d.). Creating an IAM User in Your AWS Account. Retrieved January 29, 2020. AWS Create IAM User
AWS. (n.d.). Lambda execution role. Retrieved February 28, 2024. AWS Lambda Execution Role
AWS. (n.d.). Using instance profiles. Retrieved February 28, 2024. AWS Instance Profiles
Google. (n.d.). Create Cloud Identity user accounts. Retrieved January 29, 2020. GCP Create Cloud Identity Users
Google. (n.d.). Service Accounts Overview. Retrieved February 28, 2024. GCP Service Accounts
Microsoft. (2019, November 11). Add or delete users using Azure Active Directory. Retrieved January 30, 2020. Microsoft Azure AD Users
Microsoft. (2023, December 15). Application and service principal objects in Microsoft Entra ID. Retrieved February 28, 2024. Microsoft Entra ID Service Principals
Microsoft. (n.d.). Add Another Admin. Retrieved October 18, 2019. Microsoft Support O365 Add Another Admin, October 2019