c
April 7, 2023, 5:07 p.m. |

Cloud Security Alliance cloudsecurityalliance.org

Originally published by TrueFort. Written by Matt Hathaway. The devastating part of a cyber attack is when it reaches application environments with sensitive data to steal or encrypt. While microsegmentation is recognized as the best way to minimize the spread of the initial compromise, it cannot truly isolate via network blocking alone. Controlling lateral movement requires that you also prevent service accounts from running commands on workloads where they aren’t required for application op...

abuse account accounts application attack blocking compromise cyber data encrypt environments lateral movement matt microsegmentation network sensitive data service service accounts steal truefort workloads

More from cloudsecurityalliance.org / Cloud Security Alliance

Sr. Product Manager

@ MixMode | Remote, US

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

PNT/NAVWAR Space Electronic Warfare Instructor II – Officer Training Course

@ Aleut Federal | Colorado Springs, Colorado, United States

Sr Director, Cybersecurity SIRT

@ Workday | USA, VA, McLean