Lateral Movement
highlateral-movement
Attacker moves between systems within the network after initial compromise
Elevation of Privilege
MITRE ATT&CK techniques
| ID | Name | Tactic |
|---|---|---|
| T1021 | Remote Services | Lateral Movement |
| T1550 | Use Alternate Authentication Material | Lateral Movement |
Common Weakness Enumeration
Mitigating controls
ctrl-lateral-1- Implement network segmentation and micro-segmentation
ctrl-lateral-2- Use zero-trust network architecture
ctrl-lateral-3- Monitor for unusual internal traffic patterns
ctrl-lateral-4- Implement jump servers for administrative access
ctrl-lateral-5- Disable unnecessary remote access protocols