← Back to ATLAS MatrixTactic 8 of 15
Persistence
The adversary is trying to maintain their foothold in your AI system.
4 Techniques
MITRE ATLAS Framework
Attack Techniques
Explore the specific techniques adversaries use during the persistence phase of AI attacks.
1
AML.T0020
Valid Accounts
Adversaries may obtain and abuse credentials of existing accounts in AI systems.
Examples:
- •Compromising AI system admin accounts
- •Abusing service accounts
- •Maintaining access through stolen credentials
Mitigations:
- ✓Multi-factor authentication
- ✓Regular credential rotation
- ✓Privileged access management
References:
2
AML.T0021
Valid Accounts
Adversaries may obtain and abuse credentials of existing accounts in AI systems.
Examples:
- •Compromising AI system admin accounts
- •Abusing service accounts
- •Maintaining access through stolen credentials
Mitigations:
- ✓Multi-factor authentication
- ✓Regular credential rotation
- ✓Privileged access management
References:
3
AML.T0061
Valid Accounts
Adversaries may obtain and abuse credentials of existing accounts in AI systems.
Examples:
- •Compromising AI system admin accounts
- •Abusing service accounts
- •Maintaining access through stolen credentials
Mitigations:
- ✓Multi-factor authentication
- ✓Regular credential rotation
- ✓Privileged access management
References:
4
AML.T0070
Valid Accounts
Adversaries may obtain and abuse credentials of existing accounts in AI systems.
Examples:
- •Compromising AI system admin accounts
- •Abusing service accounts
- •Maintaining access through stolen credentials
Mitigations:
- ✓Multi-factor authentication
- ✓Regular credential rotation
- ✓Privileged access management