Skip to main content

Privilege Escalation Theory: Formal Models of Least Privilege Violations

"The principle of least privilege states that every program and every user of the system should operate using the least set of privileges necessary to complete the job." — Jerome H. Saltzer and Michael D. Schroeder, "The Protection of Information in Computer Systems," Proceedings of the IEEE, 1975

The Adversary's Taxonomy: Mapping Threat Actor Capabilities

"Multiple groups within ATT&CK use the same techniques, and for this reason, it is not recommended to attribute activity solely based on the ATT&CK techniques used. Attribution to a group is a complex process involving all parts of the Diamond Model, not solely on techniques."

Blake E. Strom et al., MITRE ATT&CK: Design and Philosophy, March 2020