Threat H.M.HumCH.2.2

URI: H.M.HumCH.2.2

Package: Theft

< prev | next >

Description: Console access to weakly protected admin account on stolen device Host: an attacker with possession of device Host exploits exploits lax password security by user Human to access an admin account via the console.

Threat Type: Primary Threat

Matching Pattern:

H.M.HumCH.2.2
MP-HumCH

Finds a Human managing a Fixed Console Host.

        (empty)

        (empty)

CSG-AccountLockingAtHost

The number of login attempts at device Host is limited, and user accounts locked when there are too many unsuccessful login attempts, or too many login attempts within a short period.

CSG-BiometricAccessControlAtHost

Access to device Host is controlled, by authenticating authorised users using biometrics.

CSG-ChipAndPinAccessControlAtHost

Access to device Host is controlled, by authenticating authorised users using a 2-factor system involving possession of a physical key or dongle, such as a chip and PIN card.

CSG-UserSecurityTraining

Users in the role Human are trained to avoid most common cyber security errors by using only strong passwords, recognising malicious emails, and the importance of physical security including the use of screen locking for fixed devices that cannot be carried on the person.