Temporary Elevated Cloud Access (T1548.005)

View on ATT&CK

In Playbook

Associated Tactics

  • Privilege Escalation
  • Defense Evasion

Privilege Escalation (TA0004)

The adversary is trying to gain higher-level permissions. Privilege Escalation consists of techniques that adversaries use to gain higher-level permissions on a system or network. Adversaries can often enter and explore a network with unprivileged access but require elevated permissions to follow through on their objectives. Common approaches are to take advantage of system weaknesses, misconfigurations, and vulnerabilities. Examples of elevated access include: * SYSTEM/root level * local administrator * user account with admin-like access * user accounts with access to specific system or perform specific function These techniques often overlap with Persistence techniques, as OS features that let an adversary persist can execute in an elevated context.

View on ATT&CK

Procedure Examples

Description Source(s)
AWS. (n.d.). Granting a user permissions to pass a role to an AWS service. Retrieved July 10, 2023. AWS PassRole
CrowdStrike. (2022, January 27). Early Bird Catches the Wormhole: Observations from the StellarParticle Campaign. Retrieved February 7, 2022. CrowdStrike StellarParticle January 2022
Google Cloud. (n.d.). Manage just-in-time privileged access to projects. Retrieved September 21, 2023. Google Cloud Just in Time Access 2023
Google Cloud. (n.d.). Roles for service account authentication. Retrieved July 10, 2023. Google Cloud Service Account Authentication Roles
Microsoft. (2022, September 13). Impersonation and EWS in Exchange. Retrieved July 10, 2023. Microsoft Impersonation and EWS in Exchange
Microsoft. (2023, August 29). Configure and approve just-in-time access for Azure Managed Applications. Retrieved September 21, 2023. Azure Just in Time Access 2023
Spencer Gietzen. (n.d.). AWS IAM Privilege Escalation – Methods and Mitigation. Retrieved May 27, 2022. Rhino Security Labs AWS Privilege Escalation
Spencer Gietzen. (n.d.). Privilege Escalation in Google Cloud Platform – Part 1 (IAM). Retrieved September 21, 2023. Rhino Google Cloud Privilege Escalation
Yonatan Khanashvilli. (2023, November 28). DeleFriend: Severe design flaw in Domain Wide Delegation could leave Google Workspace vulnerable for takeover. Retrieved January 16, 2024. Hunters Domain Wide Delegation Google Workspace 2023
Zohar Zigdon. (2023, November 30). Exploring a Critical Risk in Google Workspace's Domain-Wide Delegation Feature. Retrieved January 16, 2024. Palo Alto Unit 42 Google Workspace Domain Wide Delegation 2023