Identifying the Risk of a Lateral Movement Attack in Your Cloud
About this talk
To mitigate the risk of a lateral movement attack, monitor for private keys and passwords in shell history. Attackers can use these to move laterally across your environment.
Orca Security scans your entire cloud account in a holistic manner. It peers into each machine’s filesystem for private keys, such as on server A, taking a hash of each found. It then checks the authorized key configuration across all other assets for public keys. Watch and learn more.