Conditional Access Policies (T1556.009)

View on ATT&CK

In Playbook

Associated Tactics

  • Credential Access
  • Defense Evasion
  • Persistence

Credential Access (TA0006)

The adversary is trying to steal account names and passwords. Credential Access consists of techniques for stealing credentials like account names and passwords. Techniques used to get credentials include keylogging or credential dumping. Using legitimate credentials can give adversaries access to systems, make them harder to detect, and provide the opportunity to create more accounts to help achieve their goals.

View on ATT&CK

Procedure Examples

Description Source(s)
AWS. (n.d.). IAM JSON policy elements: Condition. Retrieved January 2, 2024. AWS IAM Conditions
Google Cloud. (n.d.). Overview of IAM Conditions. Retrieved January 2, 2024. GCP IAM Conditions
JumpCloud. (n.d.). Get Started: Conditional Access Policies. Retrieved January 2, 2024. JumpCloud Conditional Access Policies
Microsoft. (2023, November 15). What is Conditional Access?. Retrieved January 2, 2024. Microsoft Conditional Access
Okta. (2023, November 30). Conditional Access Based on Device Security Posture. Retrieved January 2, 2024. Okta Conditional Access Policies