Skip to main content
Cyber Defense TacticsCyber Defense Tactics
HomeLearnResourcesBlogCommunityPricing
Cyber Defense TacticsCyber Defense Tactics

Learn defensive security, leverage AI for cyber defense, and join a community of security professionals.

Learning

  • Blog
  • Resources
  • Newsletter

Community

  • Discord
  • YouTube
  • About

Legal

  • Privacy Policy
  • Terms of Service

© 2026 Cyber Defense Tactics. All rights reserved.

A Carbene.AI Project

Back to D3FEND Hub
D3-CR

Credential Rotation

Evict Tactic
Featured

Rotate compromised or potentially compromised credentials to deny adversary access.

View on MITRE D3FEND

Implementation Guidance

  • Establish credential rotation procedures
  • Automate rotation for service accounts
  • Implement just-in-time access
  • Track credential age and usage
  • Force rotation after incidents

Tools & Technologies

CyberArkHashiCorp VaultAzure ADAWS Secrets ManagerThycotic

AI Enhancements

  • AI-powered credential risk scoring
  • Automated rotation based on threat intelligence
  • ML-based detection of credential misuse

ATT&CK Techniques Countered

This defensive technique helps protect against the following adversary techniques:

T1003

OS Credential Dumping

Explore Purple Team Matrix for full mappings

Related Techniques in Evict

D3-PT

Process Termination

D3-AL

Account Locking

D3-NTF

Network Traffic Filtering

Ready to build a comprehensive defense strategy?