Adversaries may interrupt availability of system and network resources by inhibiting access to accounts utilized by legitimate users. Accounts may be deleted, locked, or manipulated (ex: credentials changed) to remove access to accounts.
ID | Mitigation | Description |
---|---|---|
M1011 | User Guidance |
Users should be taught that Device Administrator permissions are very dangerous, and very few applications need it. |
ID | Data Source | Data Component | Detects |
---|---|---|---|
DS0041 | Application Vetting | Permissions Requests |
Application vetting services could closely scrutinize applications that request Device Administrator permissions. |