{"id":32807,"date":"2023-11-13T21:29:48","date_gmt":"2023-11-13T21:29:48","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=32807"},"modified":"2023-11-13T21:29:51","modified_gmt":"2023-11-13T21:29:51","slug":"what-is-lateral-movement","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/networks\/what-is-lateral-movement\/","title":{"rendered":"What Is Lateral Movement? Detection &amp; Prevention Tips"},"content":{"rendered":"\n<p>Lateral movement is a series of techniques used by threat actors to gain progressively greater access to IT systems and data once they infiltrate a network.<\/p>\n\n\n\n<p>The goal of threat actors is to eventually gain access to sensitive data or endpoints. As attack paths can vary, that makes lateral movement a goal as much as it is a series of moves. Hackers have already entered the compromised network, so how can they continue to move throughout it? Stealing credentials, snooping for opportunities, and escalating privileges allow threat actors to steadily increase their presence in a compromised system. If they make it far enough, they can steal credentials for privileged accounts and valuable data.<\/p>\n\n\n\n<p>Lateral movement is challenging to detect if an attacker uses legitimate credentials and system tools. We&#8217;ll look at lateral movement techniques and ways to detect and prevent attacks to give your IT and security teams a starting point for locating subtle but malicious traffic within your computer systems.<\/p>\n\n\n<!-- ICP Plugin: Start --><div class=\"icp-list icp-list-main icp-list-body-horizontal row\">\n    \n        <!--\n            ICP Plugin - body horizontal\n            ----------\n            Category: \n            Count: 3\n            Country: HK\n        -->\n    <\/div><!-- ICP Plugin: End -->\n\n\n\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_68_1 ez-toc-wrap-left counter-flat ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<p class=\"ez-toc-title\">Table of Contents<\/p>\n<label for=\"ez-toc-cssicon-toggle-item-66d6db36dfd12\" class=\"ez-toc-cssicon-toggle-label\"><span class=\"ez-toc-cssicon\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #ffffff;color:#ffffff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #ffffff;color:#ffffff\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input type=\"checkbox\"  id=\"ez-toc-cssicon-toggle-item-66d6db36dfd12\"  aria-label=\"Toggle\" \/><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.esecurityplanet.com\/networks\/what-is-lateral-movement\/#How-Lateral-Movement-Works\" title=\"How Lateral Movement Works\">How Lateral Movement Works<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.esecurityplanet.com\/networks\/what-is-lateral-movement\/#4-Security-Attacks-That-Use-Lateral-Movement\" title=\"4 Security Attacks That Use Lateral Movement\">4 Security Attacks That Use Lateral Movement<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.esecurityplanet.com\/networks\/what-is-lateral-movement\/#Stages-of-Lateral-Movement-Attacks\" title=\"Stages of Lateral Movement Attacks\">Stages of Lateral Movement Attacks<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.esecurityplanet.com\/networks\/what-is-lateral-movement\/#Lateral-Movement-Benefits-for-Attackers\" title=\"Lateral Movement Benefits for Attackers\">Lateral Movement Benefits for Attackers<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.esecurityplanet.com\/networks\/what-is-lateral-movement\/#How-to-Detect-Lateral-Movement-Attacks\" title=\"How to Detect Lateral Movement Attacks\">How to Detect Lateral Movement Attacks<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.esecurityplanet.com\/networks\/what-is-lateral-movement\/#How-to-Prevent-Lateral-Movement-Attacks\" title=\"How to Prevent Lateral Movement Attacks\">How to Prevent Lateral Movement Attacks<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.esecurityplanet.com\/networks\/what-is-lateral-movement\/#Bottom-Line-Zero-Trust-is-Critical-for-Lateral-Attack-Prevention\" title=\"Bottom Line: Zero Trust is Critical for Lateral Attack Prevention\">Bottom Line: Zero Trust is Critical for Lateral Attack Prevention<\/a><\/li><\/ul><\/nav><\/div>\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"How-Lateral-Movement-Works\"><\/span>How Lateral Movement Works<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>One of the scariest things about lateral movement is that most organizations don&#8217;t know just how easily they could be breached.<\/p>\n\n\n\n<p>An <a href=\"https:\/\/www.esecurityplanet.com\/threats\/a-few-clicks-from-data-disaster-enterprise-security\/\">XM Cyber study<\/a> last year found that 63% of critical assets are just a single \u201chop\u201d away from initial breach to compromise; 81% of critical assets are no more than two attack techniques away from disaster; and 94% of critical assets can be compromised in four or fewer moves by a hacker after the initial attack vector. About 75% of an organization\u2019s critical assets can be compromised in their current security state, and 78% of businesses are open to compromise every time a new Remote Code Execution (RCE) technique is found.<\/p>\n\n\n\n<p>An attack might combine, say, credential gathering techniques followed by a file injection technique and then use a vulnerability to compromise an asset. Lateral movement techniques can be used across on-premises and cloud environments and even combine the two in a hybrid environment. In the example below, the attack started with a Windows machine breach, stole credentials, and then used a compromised Azure access token to execute commands on a critical on-premises asset.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1724\" height=\"872\" src=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/Intune-Azure-AD-hack.jpg\" alt=\"Azure AD hack\" class=\"wp-image-21450\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/Intune-Azure-AD-hack.jpg 1724w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/Intune-Azure-AD-hack-300x152.jpg 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/Intune-Azure-AD-hack-1024x518.jpg 1024w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/Intune-Azure-AD-hack-768x388.jpg 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/Intune-Azure-AD-hack-1536x777.jpg 1536w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/Intune-Azure-AD-hack-150x76.jpg 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/Intune-Azure-AD-hack-696x352.jpg 696w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/Intune-Azure-AD-hack-1068x540.jpg 1068w\" sizes=\"(max-width: 1724px) 100vw, 1724px\" \/><figcaption class=\"wp-element-caption\">Source: XM Cyber<\/figcaption><\/figure>\n\n\n\n<p>Hackers often use legitimate tools like <a href=\"https:\/\/www.esecurityplanet.com\/threats\/powershell-security\/\">PowerShell<\/a> to carry out their attacks, called <a href=\"https:\/\/www.esecurityplanet.com\/networks\/living-off-the-land-attacks\/\">living off the land<\/a> (LOTL) attacks and difficult to detect because of the use of legitimate tools. Threat groups use their own tools and custom scripts to carry out attacks in addition to commonly used <a href=\"https:\/\/www.esecurityplanet.com\/applications\/open-source-penetration-testing-tools\/\">pentesting tools<\/a>. <a href=\"https:\/\/www.esecurityplanet.com\/products\/active-directory-security-tools\/\">Active Directory<\/a> is often a target of hackers because of the sensitive credentials it contains.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.esecurityplanet.com\/trends\/mitre-results-2023\/\">MITRE protection tests<\/a> are a very good example of lateral movement in action, as the tests emulate advanced threat actors working their way through a compromised environment.<\/p>\n\n\n\n<p><strong>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/networks\/active-directory-compromised\/\">How to Tell if Active Directory is Compromised<\/a><\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"4-Security-Attacks-That-Use-Lateral-Movement\"><\/span>4 Security Attacks That Use Lateral Movement<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Many attacks involve lateral movement, especially sophisticated ones that require time and patience on the part of hackers, often called <a href=\"https:\/\/www.esecurityplanet.com\/threats\/advanced-persistent-threat\/\">Advanced Persistent Threats<\/a> (APTs) when they infiltrate an organization with the intention of moving toward high-value targets. The following attacks and vulnerabilities are notable for using lateral movement to gain further access to applications.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Passing the Ticket Attacks<\/h3>\n\n\n\n<p>In a passing-the-ticket attack, an attacker steals Kerberos tickets and injects the ticket into another process. By using the stolen ticket, the attacker bypasses any password authentication required to access a file, application, or system. Once in the system, they&#8217;ll explore other avenues to access higher-privilege accounts.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Pass-the-Hash Attack<\/h3>\n\n\n\n<p>Similar to a pass-the-ticket attack, a threat actor steals a hash that they can use to authenticate themselves. Depending on the level of access the stolen credentials provide, this theft may give the threat actor access to other privileged accounts, too \u2014 like when they steal an admin&#8217;s hash. A threat actor will hunt for other credentials once they&#8217;ve gained access to an account, moving laterally through the system.<\/p>\n\n\n\n<p>For a look at &#8220;Kerberoasting&#8221; and pass-the-hash attacks in action, see <a href=\"https:\/\/www.esecurityplanet.com\/products\/rapid7-insightidr-review\/\">Testing &amp; Evaluating SIEM Systems: A Review of Rapid7 InsightIDR<\/a>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Phishing<\/h3>\n\n\n\n<p>When a threat actor sends an email with a malicious link and the target user clicks on that link, the compromised link can install <a href=\"https:\/\/www.esecurityplanet.com\/threats\/malware\/\">malware<\/a> onto the user&#8217;s machine or give the threat actor access to the user&#8217;s credentials, depending on the attack. Some may do both. Once the threat actor has access to credentials, they can enter the system and look for opportunities to escalate their privileges. Some threat actors may spend dedicated time researching their <a href=\"https:\/\/www.esecurityplanet.com\/threats\/phishing-attacks\/\">phishing<\/a> victims. As most cyber attacks begin with phishing, organizations can always do more here to protect themselves.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Backdoor or vulnerability exploitation<\/h3>\n\n\n\n<p>An attacker may find a backdoor in a computer system, and once they enter the system, they scavenge for opportunities to continue moving through it. Additionally, zero-day vulnerabilities and other unpatched weaknesses may allow a threat actor to enter a system before the issue can be patched.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Stages-of-Lateral-Movement-Attacks\"><\/span>Stages of Lateral Movement Attacks<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>A typical completed cyberattack that uses lateral movement consists of the following general steps: initial theft, initial access, gathering information, escalation, and end theft. Some attacks may only use a few steps or not make it the whole way, but this overview shows the complete cycle.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Initial Theft or Research<\/h3>\n\n\n\n<p>A threat actor may steal user credentials through phishing, brute force a password, or locate an unpatched vulnerability in a networking device. Once they have the information they need, they&#8217;re free to breach a system.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Initial Breach<\/h3>\n\n\n\n<p>After stealing legitimate credentials or hashes, brute forcing, or exploiting an existing vulnerability, the threat actor is able to enter the network or computer system. They may not yet have access to any other account, but they have at least breached the overall system.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Gathering Information<\/h3>\n\n\n\n<p>Once inside the network or computer system, the threat actor gathers data, stealing additional credentials where possible and moving between programs to which they gain access. This process can take weeks or months; an undetected threat actor, including a strain of malware, is often free to roam throughout the network and observe.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Privilege Escalation<\/h3>\n\n\n\n<p>Often, privilege escalation goes hand in hand with the snooping process: the additional credentials or hashes stolen may belong to increasingly sensitive accounts. The attacker will be looking for privileged access accounts, like IT admin accounts or databases with sensitive company information.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">End Theft<\/h3>\n\n\n\n<p>For some lateral movement attacks, the end goal is a payload of sensitive information. For others, it&#8217;s endpoint takeover: if a threat actor can control multiple endpoints, they can use those devices to their advantage, whether that&#8217;s to compromise a particular company initiative or conduct a denial-of-service attack.&nbsp;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Lateral-Movement-Benefits-for-Attackers\"><\/span>Lateral Movement Benefits for Attackers<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Lateral movement can help threat actors access systems on a network less intrusively than other attack methods, depending on the methods they use to steal credentials. If they enter undetected, it also allows them to bide their time, exploiting multiple applications at their leisure.&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Easier Access to Credentials<\/h3>\n\n\n\n<p>Often, a threat actor is able to access multiple systems without having to guess or brute force all credentials. This depends on the credentials or hashes they&#8217;re able to steal, but some tickets or passwords provide access to multiple applications, not just one.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Easier to Escalate<\/h3>\n\n\n\n<p>Rather than having to guess the password to the chief information officer&#8217;s admin account, threat actors can move laterally and work their way up to privileged accounts. If they enter a system undetected, they may also have weeks or months to worm their way into a more sensitive account than the one from which they initiated the attack.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Multiple Weak Systems to Exploit<\/h3>\n\n\n\n<p>Unfortunately, many programs and networks have <a href=\"https:\/\/www.esecurityplanet.com\/threats\/common-it-security-vulnerabilities-how-to-prevent-them\/\">unpatched vulnerabilities<\/a> and backdoors that give threat actors an easy in. But once they&#8217;re inside the network, they also have opportunities to keep accessing programs because often the network hasn&#8217;t been properly segmented.<\/p>\n\n\n\n<p><strong>Learn more about <a href=\"https:\/\/www.esecurityplanet.com\/networks\/network-security-threats\/\">major network security threats<\/a>.<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"How-to-Detect-Lateral-Movement-Attacks\"><\/span>How to Detect Lateral Movement Attacks<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Because lateral movement often requires threat actors to find legitimate credentials, it can be more difficult to detect than other attacks. Also, attackers can hover in a system for weeks or months at a time, waiting for an opportunity to escalate privileges. Businesses often need sophisticated tools that identify the relationships between suspicious activity.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Advanced Endpoint Detection<\/h3>\n\n\n\n<p><a href=\"https:\/\/www.esecurityplanet.com\/products\/edr-solutions\/\">Endpoint detection and response tools<\/a> develop large-scale maps of the connections between endpoint devices. While a remote user accessing their IT admin account on their laptop at 4:30 PM might not be suspicious, an EDR platform could observe that the same user then accessed a remote server in another region&#8217;s data center. If that&#8217;s an unusual pattern for that user, the EDR tool should flag it. It&#8217;s critical to use broader context to determine when a set of actions are more suspicious together than separate.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Network Traffic Monitoring&nbsp;<\/h3>\n\n\n\n<p>Similarly, consistent <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-network-monitoring-tools\/\">network monitoring<\/a> gives your IT and security teams better context for strange behavior on the network. While one event by a threat actor might not be an apparent cause for concern, a set of activities may be anomalous when executed in order.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Behavioral Analytics<\/h3>\n\n\n\n<p><a href=\"https:\/\/www.esecurityplanet.com\/products\/best-user-and-entity-behavior-analytics-ueba-tools\/\">User entity and behavioral analytics (UEBA)<\/a> specifically focuses on the actions of users, including strange ones. UEBA tools compile user data over time to determine what is standard, what is anomalous, and what is suspicious. Long-term data, examined and analyzed by machine learning, offers better information overall than one-time alerts. Behavioral analytics is increasingly becoming part of other tools such as EDR.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">SIEM Tools<\/h3>\n\n\n\n<p>As a central security management tool with visibility across networks, devices, and even <a href=\"https:\/\/www.esecurityplanet.com\/cloud\/cloud-security-best-practices\/\">cloud environments<\/a>, <a href=\"https:\/\/www.esecurityplanet.com\/products\/siem-tools\/\">SIEM systems<\/a> are another good tool for detecting indicators of compromise.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"How-to-Prevent-Lateral-Movement-Attacks\"><\/span>How to Prevent Lateral Movement Attacks<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Your IT and security teams should consider the following prevention methods to halt and mitigate the effects of lateral movement in your IT infrastructure. Threat actors often use very advanced attack techniques and tools, and you&#8217;ll need to implement equally strong protection to defend your endpoints and <a href=\"https:\/\/www.esecurityplanet.com\/networks\/network-security\/\">secure your network<\/a>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Network Segmentation<\/h3>\n\n\n\n<p>Gone are the days when presenting a single set of credentials (or even <a href=\"https:\/\/www.esecurityplanet.com\/applications\/mfa-advantages-and-weaknesses\/\">MFA<\/a>) should grant users access to all systems on a network. All applications and programs on the network should require their own credentials.<\/p>\n\n\n\n<p>While this may not be enough to stop an attacker who has multiple sets of credentials (and some do in lateral movement scenarios), it&#8217;ll delay and halt many threat actors. If they can&#8217;t escalate their privileges, the effects of the breach are minimized. <a href=\"https:\/\/www.esecurityplanet.com\/trends\/zero-trust-hype-vs-reality\/\">Zero trust<\/a> plays a key role in segmentation \u2014 traffic is considered untrusted until the user proves they are authorized and authenticated, the opposite of legacy security approaches.<\/p>\n\n\n\n<p>You may also want to consider <a href=\"https:\/\/www.esecurityplanet.com\/networks\/microsegmentation-is-catching-on-as-key-to-zero-trust\/\">microsegmentation<\/a>, more specifically for sensitive applications. These types of segmentation are similar, but microsegmentation is focused on all accounts, not just network traffic. If you have many sensitive accounts, microsegmentation might be the way to go.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Just-in-Time Access<\/h3>\n\n\n\n<p>Intended to mitigate the problem of exploited admin privileges, just-in-time <a href=\"https:\/\/www.esecurityplanet.com\/products\/privileged-access-management-pam-software\/\">access<\/a> only permits authorized users to access their accounts at designated times. The privileges are granted and withdrawn dynamically. Legacy IT infrastructure doesn&#8217;t do a good job of zero trust access, but just-in-time access would reduce the attack surface because a threat actor wouldn&#8217;t be able to use legitimate credentials unless they&#8217;re dynamically granted access. And the window in which they could receive access would be small.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Endpoint Detection and Response<\/h3>\n\n\n\n<p>We listed this earlier and we&#8217;ll list it again. EDR is both a detection and a prevention tool. It&#8217;s a cornerstone method of identifying breaches across many devices. If you&#8217;re a large enterprise looking for a full network solution, we recommend <a href=\"https:\/\/www.esecurityplanet.com\/products\/xdr-security-solutions\/\">extended detection and response (XDR)<\/a>, which goes beyond endpoints to the entire network.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Bottom-Line-Zero-Trust-is-Critical-for-Lateral-Attack-Prevention\"><\/span>Bottom Line: Zero Trust is Critical for Lateral Attack Prevention<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>We&#8217;ll plug <a href=\"https:\/\/www.esecurityplanet.com\/products\/zero-trust-security-solutions\/\">zero trust frameworks<\/a> once again because they are one of the best possible answers to sophisticated lateral movement attacks. Zero trust isn&#8217;t everything, but it&#8217;s one of the only ways to stymie threat actors who enter a network undetected. Make sure that every subnetwork and application is isolated and requires different sets of credentials. While this may seem time-consuming to set up, it&#8217;ll pay off for your enterprise in the end. Same for small businesses \u2014 they need to implement segmentation for networks and applications, too. Lateral movement is a significant threat and difficult to prevent, but implementing zero trust can reduce its impact on business systems.<\/p>\n\n\n\n<p><strong>Read our <a href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-secure-a-network\/\">guide to securing your network<\/a> next.<\/strong><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6db36ba690-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6db36ba690\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6db36ba690\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6db36ba690\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6db36ba690\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6db36ba690\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6db36ba690\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Lateral movement is used by attackers once a network is accessed to expand into other apps or networks within an organization. Learn more now.<\/p>\n","protected":false},"author":238,"featured_media":32808,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[14],"tags":[],"b2b_audience":[],"b2b_industry":[],"b2b_product":[],"class_list":["post-32807","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networks"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What Is Lateral Movement in Security? Prevention Tips<\/title>\n<meta name=\"description\" content=\"Lateral movement is used by attackers once a network is accessed to expand into other apps or networks within an organization. Learn more now.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/networks\/what-is-lateral-movement\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Is Lateral Movement in Security? Prevention Tips\" \/>\n<meta property=\"og:description\" content=\"Lateral movement is used by attackers once a network is accessed to expand into other apps or networks within an organization. Learn more now.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/networks\/what-is-lateral-movement\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-13T21:29:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-13T21:29:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/11\/esp_20231113-what-is-lateral-movement.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jenna Phipps\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jenna Phipps\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/what-is-lateral-movement\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/what-is-lateral-movement\/\"},\"author\":{\"name\":\"Jenna Phipps\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/243ac4ed3a5e9bf35bd7b98a40c326fb\"},\"headline\":\"What Is Lateral Movement? Detection &amp; Prevention Tips\",\"datePublished\":\"2023-11-13T21:29:48+00:00\",\"dateModified\":\"2023-11-13T21:29:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/what-is-lateral-movement\/\"},\"wordCount\":2118,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/what-is-lateral-movement\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/11\/esp_20231113-what-is-lateral-movement.png\",\"articleSection\":[\"Networks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/what-is-lateral-movement\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/networks\/what-is-lateral-movement\/\",\"name\":\"What Is Lateral Movement in Security? Prevention Tips\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/what-is-lateral-movement\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/what-is-lateral-movement\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/11\/esp_20231113-what-is-lateral-movement.png\",\"datePublished\":\"2023-11-13T21:29:48+00:00\",\"dateModified\":\"2023-11-13T21:29:51+00:00\",\"description\":\"Lateral movement is used by attackers once a network is accessed to expand into other apps or networks within an organization. Learn more now.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/what-is-lateral-movement\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/networks\/what-is-lateral-movement\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/what-is-lateral-movement\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/11\/esp_20231113-what-is-lateral-movement.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/11\/esp_20231113-what-is-lateral-movement.png\",\"width\":1400,\"height\":900,\"caption\":\"Image: ZETHA_WORK\/Adobe Stock\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/what-is-lateral-movement\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What Is Lateral Movement? Detection &amp; Prevention Tips\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/243ac4ed3a5e9bf35bd7b98a40c326fb\",\"name\":\"Jenna Phipps\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/EDITED-HH-88484840_Jenna_Phipps_Jenna_headshot_2_editor_faharia-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/EDITED-HH-88484840_Jenna_Phipps_Jenna_headshot_2_editor_faharia-150x150.jpg\",\"caption\":\"Jenna Phipps\"},\"description\":\"Jenna Phipps is a staff writer for eSecurity Planet and has years of experience in B2B technical content writing. She covers security practices, vulnerabilities, data protection, and the top products in the cybersecurity industry. She also writes about the importance of cybersecurity technologies and training in business environments, as well as the role that security plays in data storage and management. When Jenna's not writing about security, you can find her reading, shopping, eating smoothie bowls, or spending time with friends.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jphipps\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What Is Lateral Movement in Security? Prevention Tips","description":"Lateral movement is used by attackers once a network is accessed to expand into other apps or networks within an organization. Learn more now.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/networks\/what-is-lateral-movement\/","og_locale":"en_US","og_type":"article","og_title":"What Is Lateral Movement in Security? Prevention Tips","og_description":"Lateral movement is used by attackers once a network is accessed to expand into other apps or networks within an organization. Learn more now.","og_url":"https:\/\/www.esecurityplanet.com\/networks\/what-is-lateral-movement\/","og_site_name":"eSecurity Planet","article_published_time":"2023-11-13T21:29:48+00:00","article_modified_time":"2023-11-13T21:29:51+00:00","og_image":[{"width":1400,"height":900,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/11\/esp_20231113-what-is-lateral-movement.png","type":"image\/png"}],"author":"Jenna Phipps","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Jenna Phipps","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/networks\/what-is-lateral-movement\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/what-is-lateral-movement\/"},"author":{"name":"Jenna Phipps","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/243ac4ed3a5e9bf35bd7b98a40c326fb"},"headline":"What Is Lateral Movement? Detection &amp; Prevention Tips","datePublished":"2023-11-13T21:29:48+00:00","dateModified":"2023-11-13T21:29:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/what-is-lateral-movement\/"},"wordCount":2118,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/what-is-lateral-movement\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/11\/esp_20231113-what-is-lateral-movement.png","articleSection":["Networks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/networks\/what-is-lateral-movement\/","url":"https:\/\/www.esecurityplanet.com\/networks\/what-is-lateral-movement\/","name":"What Is Lateral Movement in Security? Prevention Tips","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/what-is-lateral-movement\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/what-is-lateral-movement\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/11\/esp_20231113-what-is-lateral-movement.png","datePublished":"2023-11-13T21:29:48+00:00","dateModified":"2023-11-13T21:29:51+00:00","description":"Lateral movement is used by attackers once a network is accessed to expand into other apps or networks within an organization. Learn more now.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/what-is-lateral-movement\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/networks\/what-is-lateral-movement\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/networks\/what-is-lateral-movement\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/11\/esp_20231113-what-is-lateral-movement.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/11\/esp_20231113-what-is-lateral-movement.png","width":1400,"height":900,"caption":"Image: ZETHA_WORK\/Adobe Stock"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/networks\/what-is-lateral-movement\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"What Is Lateral Movement? Detection &amp; Prevention Tips"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/243ac4ed3a5e9bf35bd7b98a40c326fb","name":"Jenna Phipps","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/EDITED-HH-88484840_Jenna_Phipps_Jenna_headshot_2_editor_faharia-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/EDITED-HH-88484840_Jenna_Phipps_Jenna_headshot_2_editor_faharia-150x150.jpg","caption":"Jenna Phipps"},"description":"Jenna Phipps is a staff writer for eSecurity Planet and has years of experience in B2B technical content writing. She covers security practices, vulnerabilities, data protection, and the top products in the cybersecurity industry. She also writes about the importance of cybersecurity technologies and training in business environments, as well as the role that security plays in data storage and management. When Jenna's not writing about security, you can find her reading, shopping, eating smoothie bowls, or spending time with friends.","url":"https:\/\/www.esecurityplanet.com\/author\/jphipps\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/32807"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/238"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=32807"}],"version-history":[{"count":2,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/32807\/revisions"}],"predecessor-version":[{"id":32811,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/32807\/revisions\/32811"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/32808"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=32807"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=32807"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=32807"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=32807"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=32807"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=32807"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}