Incident Command Platform
← Glossary

Lateral Movement

Lateral movement refers to the techniques adversaries use to navigate through a compromised network after gaining initial access. Rather than remaining on the first system they compromise, attackers progressively access additional systems, escalate privileges, and expand their foothold until they reach their ultimate objective -- whether that is sensitive data, domain controller access, or a position from which to deploy ransomware across the entire environment.

Common Lateral Movement Techniques

Why Lateral Movement Is Hard to Detect

Lateral movement is challenging to detect because attackers deliberately use legitimate tools and protocols that are indistinguishable from normal system administration activity. An RDP connection from one server to another is routine in most environments. PowerShell execution is ubiquitous. The distinction between legitimate and malicious use requires behavioral baselines -- knowing which accounts normally access which systems, at what times, and using which tools. This is why identity-based detection and user behavior analytics are increasingly important for catching lateral movement.

Lateral Movement and Incident Scope

The extent of lateral movement directly determines the scope of an incident. An attacker who gained access to a single workstation and was detected before moving laterally represents a contained incident. An attacker who moved from a workstation to a file server, then to Active Directory, then to backup systems represents an environment-wide compromise that requires a fundamentally different response. During forensic investigation, mapping the adversary's lateral movement path is essential for understanding which systems and data were accessed and for determining notification obligations.

Containing Lateral Movement

Containment actions must be coordinated and simultaneous. If the response team isolates one compromised system while the attacker has already moved to others, the containment is incomplete. Network segmentation limits the blast radius by restricting which systems can communicate with each other. Identity-based controls such as tiered administration, privileged access workstations, and just-in-time privilege elevation reduce the credentials available for lateral movement. EDR endpoint isolation capabilities enable rapid quarantine of affected systems.

Coordinate containment across your environment

IR-OS provides the incident command structure to coordinate simultaneous containment actions across multiple teams and systems.

Start free