risks / Data manipulation

Description

Allows an attacker to insert, delete, or manipulate organizational data. This may be done to evade detection or impact business/operational processes.

Risk: HIGH

Exploited in isolation, this risk has the potential to disrupt ancillary organization operations, cause reputational damage, or run afoul of compliance requirements.

Mitigations

  1. Data encryption
  2. Network segmentation
  3. Data backup
  4. Least privilege permissions

Links

  1. https:/​/​attack.mitre.org/​techniques/​T1565/​

Affected Privileges

An attacker may be able to exploit this risk if they gain any of the following privileges:

Google Cloud Platform

© 2023–present P0 Security and contributors to the IAM Privilege Catalog