risks / Data encryption
Description
Allows an attacker to encrypt data within a system. This can be used to either make data permanently inaccessible, or extort compensation for access to the encryption key, in the case of ransomware.
Risk: CRITICAL
Exploited in isolation, this risk has the potential to disrupt central organizational operations, destroy trust, or create significant liability. Alternatively, this risk gives attackers access to broadly provisioned identities that enable the above impacts (such as root privilege escalation risks).
Mitigations
- Backup data
Links
Affected Privileges
An attacker may be able to exploit this risk if they gain any of the following privileges:
© 2023–present P0 Security and contributors to the IAM Privilege Catalog