Adversaries may add new domain trusts or modify the properties of existing domain trusts to evade defenses and/or elevate privileges. Domain trust details, such as whether or not a domain is federated, allow authentication and authorization properties to apply between domains for the purpose of accessing shared resources. These trust objects may include accounts, credentials, and other authentication material applied to servers, tokens, and domains.
Manipulating the domain trusts may allow an adversary to escalate privileges and/or evade defenses by modifying settings to add objects which they control. For example, this may be used to forge SAML Tokens, without the need to compromise the signing certificate to forge new credentials. Instead, an adversary can manipulate domain trusts to add their own signing certificate.
|M1026||Privileged Account Management||
Use the principal of least privilege and protect administrative access to domain trusts.
|ID||Data Source||Data Component||Detects|
|DS0026||Active Directory||Active Directory Object Creation||
Monitor for newly constructed active directory objects, such as Windows EID 5137.
|Active Directory Object Modification||
Monitor for changes made to AD settings for unexpected modifications to domain trust settings, such as when a user or application modifies the federation settings on the domain.
Monitor executed commands and arguments that updates domain authentication from Managed to Federated via ActionTypes