Back to the MIT repository
4. Malicious Actors & Misuse3 - Other

Malicious and Direct

Directly harmful objective

Source: MIT AI Risk Repositorymit1441

ENTITY

1 - Human

INTENT

1 - Intentional

TIMING

3 - Other

Risk ID

mit1441

Domain lineage

4. Malicious Actors & Misuse

223 mapped risks

4.0 > Malicious use

Mitigation strategy

1. Prioritize the Defense of Elevated Privileges and Accounts. Implement mandatory Multi-Factor Authentication (MFA) for all users, particularly those with remote access or elevated system privileges, to mitigate credential theft and reuse. Furthermore, utilize Privileged Access Management (PAM) solutions to enforce the principle of least privilege and automate fine-grained access controls. 2. Mandate the Timely Application of Patches and Updates. Establish and enforce an aggressive patch management policy requiring the immediate application of security updates for all operating systems, applications, and network boundary devices to remediate exploitable software vulnerabilities before malicious actors can utilize them. 3. Implement an Encrypted, Exercised System Recovery Plan. Develop a comprehensive disaster recovery strategy that includes multiple, segregated backups of critical data and configurations. These backups must be encrypted, stored offsite or offline when not in use, and regularly tested through recovery exercises to ensure the complete and timely reconstitution of systems following a destructive incident.