Lateral movement is a tactic used by adversaries to expand their access by moving through an environment to reach their goals or targets (e.g. exfiltrate sensitive data, commandeer workloads). For years, lateral movement has been used to target on-premises networks based on network protocols and services such as Active Directory, SMB and NTLM, but as more and more organizations move to the cloud — attackers have followed.
Post compromise, attackers pursue numerous avenues for lateral movement in the cloud. For example, stealing credentials from a compromised virtual machine to pivot to other services — or leveraging elevated permissions to deploy resources in unused and unmonitored geographic regions. There are many instances of these methods manifesting in real world attacks.
The prevalence of connected hybrid environments makes this challenge worse. Adversaries in the hybrid cloud leverage novel techniques such as account misuse, compromised credentials and vulnerabilities to exploit trusted relationships — and move laterally between connected surfaces. Vectra Cloud Detection and Response (CDR) for AWS is powered by patented Attack Signal IntelligenceTM that takes an entity-focused approach to detecting lateral movement in hybrid cloud deployments, surfacing the most urgent threats for SOC teams to address.
Gaps in hybrid cloud visibility: SOC teams need to have visibility into their entire hybrid cloud deployment encompassing data center networks, identity, SaaS and public clouds such as AWS; not solely depending on a singular source such as firewalls to detect threats in inbound and outbound traffic.
Technical depth in threat detection: SOC teams need advanced behavioral analytic capabilities across various connected surfaces without investing in disjointed tooling from multiple vendors that either do not integrate or simply leave gaps that sophisticated attackers can exploit to move laterally between surfaces.
Heightened operational challenges: With more tools comes increased overhead in tooling, time and manpower for SecOps. SOC teams need to protect their hybrid cloud deployments without overspending on resources and time to manually corelate data from various sources. This adversely impacts key SOC metrics such as the mean time to investigate (MTTI) and mean time to respond (MTTR).
Why choose a purpose-built modern cloud detection, investigation and response (CDR) solution?
Overcoming cloud challenges doesn’t have to be overly complicated or create more work for SOC teams. Consider the following:
Today, deployments are hybrid consisting of connected surfaces such as on-premises data centers, identity providers, SaaS offerings and public clouds. Sophisticated attackers aim to compromise one exposed surface and then move laterally to connected surfaces in service of their goals. These attacks manifest in various forms such credential theft, compromise of hosts in on-prem networks or identitybased threats that eventually pivot to key resources in public cloud environments. Modern SOC teams are on a mission to eliminate data breaches, disruption of services, and damage to an organization’s reputation from attacks targeting these hybrid cloud deployments.
Once in the cloud, identification of these behaviors can be challenging and the longer an attacker can move undetected across the connected hybrid footprint, the greater the potential damage. With Vectra CDR for AWS, SOC teams have broad visibility into threats across connected surfaces in a single pane of glass with a deep focus on identifying advanced lateral movement techniques in cloud environments. Vectra AI monitors behaviors across users and services in the cloud leveraging its Attack Signal Intelligence™ to prioritize threats and mitigate the risk of impact on an organization’s footprint.