Identifying the Risk of a Lateral Movement Attack in Your Cloud
Presented by
Orca Security
About this talk
To mitigate the risk of a lateral movement attack, monitor for private keys and passwords in shell history. Attackers can use these to move laterally across your environment.
Orca Security scans your entire cloud account in a holistic manner. It peers into each machine’s filesystem for private keys, such as on server A, taking a hash of each found. It then checks the authorized key configuration across all other assets for public keys. Watch and learn more.
Orca Security is the industry-leading Cloud Security Platform that identifies, prioritizes, and remediates security risks and compliance issues across your cloud estate spanning AWS, Azure, Google Cloud and Kubernetes.…