Detect lateral movement risk in the cloud

Orca detects risks and vulnerabilities that could enable lateral movement in your cloud estate and recommends remediation steps to strengthen your security posture.

Detect lateral movement risk in the cloud

MISPLACED YOUR KEYS?

Exposed keys enable lateral movement

Attackers often exploit multiple assets to reach their end goal. They use their initial foothold to scan connected assets for unencrypted keys and other information that might allow them to move to the next target.

  • 43.9% of organizations have internet-facing workloads that contain secrets and credentials that increase the risk of a data breach or lateral movement.
  • Many solutions detect lateral movement only after it has occurred or are blind to crucial contextual information, such as access to the public internet, that would otherwise trigger an alert.

Discover and remediate lateral movement risk

Detect insecure private keys

Orca scans each machine’s filesystem for private keys, creates hashes, and then scans all other assets for authorized public key configurations with matching hashes. In addition to keys, Orca provides key-related information such as:

  • Paths to insecurely stored keys
  • Identities of assets that can be accessed with exposed keys
  • Exposed secrets on serverless function compute resources
Screenshot of Orca Security's insecure private key summary and findings lateral movement dashboard
Screenshots of Orca Security's lateral movement alerts

Find exposed credentials before your adversaries

Attackers often search for credentials that have been exposed inadvertently during the software development process. Orca‌ ‌detects these risks by scanning the following:

  • Shell histories for inadvertently stored passwords
  • Git repositories for keys and access credentials
  • Development-related systems that might be storing public cloud keys

Complete coverage and visibility

location

Global

industry

Data and Artificial Intelligence

cloud environment

AWS, GCP, Azure

“Orca Security provides similar capabilities to what agents on boxes do and more, but with no impact on engineering. It’s beautiful. Exactly what I want.”

Caleb Sima VP of Information Security

Read the Case Study