Skip to main content

Scenario S-005 - Privilege escalation through identity platform

ElementDescription
Scenario IDS-005
Target assetIdentity Management Platform responsible for authentication and authorization services
Threat sourceExternal attacker or malicious insider
Attack vectorWeak role-based access control configuration or compromise of privileged service accounts
Potential impactPrivilege escalation allowing administrative control over identity services and associated platforms
Likelihood🟨 Medium - identity systems are high-value targets and RBAC misconfigurations are a common weakness
Impact rating🟥 High - administrative access to identity services can lead to compromise of multiple platforms and accounts
Risk rating🟥 High

Mitigation:

  • Implement strict role-based access control with clearly defined privilege boundaries.
  • Enforce multi-factor authentication for administrative and service accounts.
  • Limit permissions assigned to service accounts following least privilege principles.
  • Regularly review identity roles, permissions, and account activity.
  • Monitor authentication and authorization events through centralized logging and SIEM.

Owners:

  • Ops - identity infrastructure maintenance and configuration.
  • Sec - access control policies, monitoring, and auditing.

References:

  • ISO 27001 - Control 8.2 Privileged access rights.
  • ISO 27001 - Control 8.3 Information access restriction.
  • NIST CSF - PR.AC Access Control.
  • NIST CSF - PR.PT Protective Technology.
  • EBIOS RM - Threat scenarios involving privilege escalation via identity or access management systems.

Response actions:

  • Containment - Immediately disable compromised accounts and restrict administrative access.
  • Eradication - Reset affected credentials, review RBAC configurations, and remove unauthorized privileges.
  • Recovery - Restore correct identity policies and verify integrity of authentication services.
  • Post-incident - Conduct access review, strengthen RBAC controls, and update monitoring rules.