Skip to main content

S-003 - Credential Compromise Leading to Administrative Access

Purpose

Model how compromised credentials could allow unauthorized administrative access to systems.


Target Asset / Capability


Threat Source

  • External attacker
  • Credential leakage or reuse

Scenario Description

An attacker obtains valid credentials and uses them to access administrative interfaces or systems.


Attack / Failure Path

  1. Credentials exposed (config leak, reuse, weak storage)
  2. Attacker attempts access on exposed services (SSH, web)
  3. Gains authenticated access
  4. Escalates privileges or pivots
  5. Establishes persistence

Exposure Conditions

  • Lack of centralized secrets management
  • Credential reuse
  • No MFA
  • Weak storage practices

Potential Impacts

  • Full system compromise
  • Lateral movement
  • Persistent unauthorized access

Existing Safeguards

  • SSH key-based authentication
  • Root login disabled
  • Limited exposure of services

Residual Concerns

  • No secrets vault
  • No MFA
  • No centralized monitoring

Related Risk Entry


Owner / Review Role

  • Security Role (Sec)