Means
Ability to Modify Cloud Resources
Access
Aiding and Abetting
Bluetooth
Bring Your Own Device (BYOD)
Clipboard
Corporate-Issued Device
Credential Access and Exposure
Delegated Access via Managed Service Providers
Enterprise-Integrated AI Platforms
FTP Servers
Installed Software
Media Capture
Network Attached Storage
Physical Disk Access
Placement
Printing
Privileged Access
Removable Media
Screenshots and Screen Recording
Sensitivity Label Leakage
SMB File Sharing
SSH Servers
System Startup Firmware Access
Unauthorized Access to Unassigned Hardware
Unmanaged Device Presence
Unrestricted Software Installation
Unrevoked Access
Web Access
- ID: ME027.002
- Created: 04th April 2026
- Updated: 04th April 2026
- Contributor: The ITM Team
Secrets and Credential Vault Access
The subject has access to centralized secrets repositories, such as cloud secrets managers, key vaults, or credential vault platforms, which store high-value authentication material including API tokens, encryption keys, certificates, and service account credentials.
This access enables the subject to retrieve credentials programmatically or on demand, often through API calls or automated workflows, without requiring interactive authentication. These systems act as credential aggregation layers, concentrating access to multiple systems, environments, or trust domains within a single control plane. Misuse may involve bulk retrieval, targeted access to high-value secrets, or staged extraction for later use outside the managed environment.
From an investigative perspective, this represents a high-leverage access condition. A single permission or role may allow the subject to enumerate, retrieve, and reuse numerous secrets, enabling lateral movement, privilege escalation, or persistent access across infrastructure. Unlike credentials exposed in static locations, vault access often appears legitimate at the control plane level, requiring detailed analysis of access patterns, request behavior, and contextual alignment with the subject’s role.