Back to D3FEND Hub
Featured
Rotate compromised or potentially compromised credentials to deny adversary access.
Implementation Guidance
- Establish credential rotation procedures
- Automate rotation for service accounts
- Implement just-in-time access
- Track credential age and usage
- Force rotation after incidents
Tools & Technologies
CyberArkHashiCorp VaultAzure ADAWS Secrets ManagerThycotic
AI Enhancements
- AI-powered credential risk scoring
- Automated rotation based on threat intelligence
- ML-based detection of credential misuse
ATT&CK Techniques Countered
This defensive technique helps protect against the following adversary techniques: