Zero-trust: how to defend against lateral movement?

Zero-trust: how to defend against lateral movement?

Zero-trust: how to defend against lateral movement?

When attackers compromise an asset in a network, that device usually is not their ultimate destination. To accomplish their goal, bad actors are likely to break into a low-level web server, email account, employee endpoint device, or some other starting location. They’ll then move laterally from this initial compromise through the network to reach their intended target. The initial compromise seldom causes severe damage. Thinking about this another way: if security teams can detect the lateral movement before the attackers reach their intended targets, they can prevent the attacker from successfully completing the mission.

But what exactly is lateral movement, and how does it work? In this blog, we’ll look at some of the most common types of lateral movement and identify ways by which we can detect and defend against this step in an attack.

Achieve Zero Trust Security

Zero trust is one approach to improving data center defenses. This approach calls for the inspection of every traffic flow within the data center. Zero trust divides the data center infrastructure into smaller security zones. Traffic between the zones is inspected to ensure it adheres to the security policies defined by the organization.

Lateral Movement Inside a Network

Overall, there are common ways by which a threat actor moves laterally. In one approach, the attacker uses tools designed to internally scan the network to gain information on other machines they may want to move to. Many of these enumeration tools do things like scanning for open ports that are listening and identifying machines that are suffering from unpatched vulnerabilities. Once the attacker has found a suitable target, they can take advantage of these weaknesses to move laterally to another asset.

Defending against lateral movement

It’s worth saying that lateral movement often manifests as anomalous network activity. It’s suspicious, for example, when a machine that talks regularly with only a select few computers begins scanning the entire network. The same is true if that machine attempts to connect to open ports, interact with credential services with which it doesn’t ordinarily maintain contact, or employ a username it’s never used before. The list goes on and on. What matters is that the computer is doing something out of the ordinary. Maybe there’s a legitimate reason for the activity, but maybe there’s not.

Examples like the ones above can give organizations a chance to detect lateral movement. They can turn to Active Directory, for example, to analyze log files for suspicious connections. Alternatively, they can use an endpoint detection and response (EDR) tool to detect if someone launches malicious code on a protected IT asset.

Prevent Lateral Movement with Granular Segmentation

Micro-segmentation is an approach to dividing the data center infrastructure into small zones (see Figure 1). Effectively, micro-segmentation allows fine-grain control of traffic flows between every workload, allowing the administrator to protect all east-west communication. In other words, micro-segmentation helps achieve zero trust.

Secure critical workloads and environments with granular micro-segmentation protection, stateful Layer 7 controls, and dramatically simplified management.

Share this article:

Related Articles

Blog 5 DORA: Het beheren van data voor digitale weerbaarheid

3/10/2024

NIS2 - Versterk de digitale weerbaarheid van uw bedrijf

4/09/2024

Blog 4 DORA: Versterk de digitale weerbaarheid van uw bedrijf

29/08/2024

NIS2 Compliance: Een strategische aanpak voor IT security en continuïteit

5/08/2024

Dora Compliance: optimaliseer jouw information security plan

29/07/2024

BPSOLUTIONS bereidt zich voor op NIS2: een stap vooruit in Cybersecurity

24/07/2024

BPSOLUTIONS is Klaar voor de DORA Richtlijnen

15/07/2024