S-003 - Credential Compromise Leading to Administrative Access
Purpose
Model how compromised credentials could allow unauthorized administrative access to systems.
Target Asset / Capability
Threat Source
- External attacker
- Credential leakage or reuse
Scenario Description
An attacker obtains valid credentials and uses them to access administrative interfaces or systems.
Attack / Failure Path
- Credentials exposed (config leak, reuse, weak storage)
- Attacker attempts access on exposed services (SSH, web)
- Gains authenticated access
- Escalates privileges or pivots
- Establishes persistence
Exposure Conditions
- Lack of centralized secrets management
- Credential reuse
- No MFA
- Weak storage practices
Potential Impacts
- Full system compromise
- Lateral movement
- Persistent unauthorized access
Existing Safeguards
- SSH key-based authentication
- Root login disabled
- Limited exposure of services
Residual Concerns
- No secrets vault
- No MFA
- No centralized monitoring
Related Risk Entry
Owner / Review Role
- Security Role (Sec)