Lateral Movement Risk Detection

Orca detects risks and vulnerabilities that could enable lateral movement in your cloud estate and recommends remediation steps to strengthen your security posture.

A screenshot of lateral movement exposure detected in the Orca platform

The Challenge

Exposed keys enable lateral movement

Attackers often exploit multiple assets to reach their end goal. They use their initial foothold to scan connected assets for unencrypted keys and other information that might allow them to move to the next target.

  • 90% of organizations have at least one asset that enables lateral movement.
  • 72% of organizations have public-facing assets at risk for lateral movement.
  • Many solutions detect lateral movement only after it has occurred or are blind to crucial contextual information, such as access to the public internet, that would otherwise trigger an alert.

Our Approach

Discover and remediate lateral movement risk

Detect insecure private keys

Orca scans each machine’s filesystem for private keys, creates hashes, and then scans all other assets for authorized public key configurations with matching hashes. In addition to keys, Orca provides key-related information such as:

  • Paths to insecurely stored keys
  • Identities of assets that can be accessed with exposed keys
  • Exposed secrets on serverless function compute resources
A screenshot of a lateral movement alert within the Orca platform

Find exposed credentials before your adversaries

Attackers often search for credentials that have been exposed inadvertently during the software development process. Orca‌ ‌detects these risks by scanning the following:

  • Shell histories for inadvertently stored passwords
  • Git repositories for keys and access credentials
  • Development-related systems that might be storing public cloud keys

Complete coverage and visibility