Restrict Registry Permissions

Restrict the ability to modify certain hives or keys in the Windows Registry.

ID: M1024
Version: 1.0
Created: 06 June 2019
Last Modified: 06 June 2019

Techniques Addressed by Mitigation

Domain ID Name Use
Enterprise T1547 .003 Boot or Logon Autostart Execution: Time Providers

Consider using Group Policy to configure and block modifications to W32Time parameters in the Registry. [1]

Enterprise T1037 Boot or Logon Initialization Scripts

Ensure proper permissions are set for Registry hives to prevent users from modifying keys for logon scripts that may lead to persistence.

.001 Logon Script (Windows)

Ensure proper permissions are set for Registry hives to prevent users from modifying keys for logon scripts that may lead to persistence.

Enterprise T1574 Hijack Execution Flow

Ensure proper permissions are set for Registry hives to prevent users from modifying keys for system components that may lead to privilege escalation.

.011 Services Registry Permissions Weakness

Ensure proper permissions are set for Registry hives to prevent users from modifying keys for system components that may lead to privilege escalation.

.012 COR_PROFILER

Ensure proper permissions are set for Registry hives to prevent users from modifying keys associated with COR_PROFILER.

Enterprise T1562 Impair Defenses

Ensure proper Registry permissions are in place to prevent adversaries from disabling or interfering with security/logging services.

.001 Disable or Modify Tools

Ensure proper Registry permissions are in place to prevent adversaries from disabling or interfering with security services.

.002 Disable Windows Event Logging

Ensure proper Registry permissions are in place to prevent adversaries from disabling or interfering logging.

.004 Disable or Modify System Firewall

Ensure proper Registry permissions are in place to prevent adversaries from disabling or modifying firewall settings.

Enterprise T1112 Modify Registry

Ensure proper permissions are set for Registry hives to prevent users from modifying keys for system components that may lead to privilege escalation.

Enterprise T1489 Service Stop

Ensure proper registry permissions are in place to inhibit adversaries from disabling or interfering with critical services.

Enterprise T1553 Subvert Trust Controls

Ensure proper permissions are set for Registry hives to prevent users from modifying keys related to SIP and trust provider components. Components may still be able to be hijacked to suitable functions already present on disk if malicious modifications to Registry keys are not prevented.

.003 SIP and Trust Provider Hijacking

Ensure proper permissions are set for Registry hives to prevent users from modifying keys related to SIP and trust provider components. Components may still be able to be hijacked to suitable functions already present on disk if malicious modifications to Registry keys are not prevented.

References