Lateral Movement

high

lateral-movement

Attacker moves between systems within the network after initial compromise

Elevation of Privilege

MITRE ATT&CK techniques

IDNameTactic
T1021 Remote Services Lateral Movement
T1550 Use Alternate Authentication Material Lateral Movement

Common Weakness Enumeration

Mitigating controls

ctrl-lateral-1
Implement network segmentation and micro-segmentation
ctrl-lateral-2
Use zero-trust network architecture
ctrl-lateral-3
Monitor for unusual internal traffic patterns
ctrl-lateral-4
Implement jump servers for administrative access
ctrl-lateral-5
Disable unnecessary remote access protocols

References