Privileged Process Integrity focuses on defending highly privileged processes (e.g., system services, antivirus, or authentication processes) from tampering, injection, or compromise by adversaries. These processes often interact with critical components, making them prime targets for techniques like code injection, privilege escalation, and process manipulation. This mitigation can be implemented through the following measures:
Protected Process Mechanisms:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\RunAsPPL
Anti-Injection and Memory Protection:
Code Signing Validation:
Access Controls:
Kernel-Level Protections:
Tools for Implementation
Protected Process Light (PPL):
Code Integrity and Signing:
Memory Protection:
Process Isolation/Sandboxing:
Kernel Protection:
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1547 | .002 | Boot or Logon Autostart Execution: Authentication Package |
Windows 8.1, Windows Server 2012 R2, and later versions, may make LSA run as a Protected Process Light (PPL) by setting the Registry key |
.005 | Boot or Logon Autostart Execution: Security Support Provider |
Windows 8.1, Windows Server 2012 R2, and later versions may make LSA run as a Protected Process Light (PPL) by setting the Registry key |
||
.008 | Boot or Logon Autostart Execution: LSASS Driver |
On Windows 8.1 and Server 2012 R2, enable LSA Protection by setting the Registry key |
||
Enterprise | T1556 | Modify Authentication Process |
Enabled features, such as Protected Process Light (PPL), for LSA.[4] |
|
.001 | Domain Controller Authentication |
Enabled features, such as Protected Process Light (PPL), for LSA.[4] |
||
Enterprise | T1003 | OS Credential Dumping |
On Windows 8.1 and Windows Server 2012 R2, enable Protected Process Light for LSA.[4] |
|
.001 | LSASS Memory |
On Windows 8.1 and Windows Server 2012 R2, enable Protected Process Light for LSA.[4] |