SlideShare a Scribd company logo
Can’t Touch This: Detecting
Lateral Movement in Zero-Touch
Environments
Phillip Marlow
DEFCON AppSec Village 2020
Approved for Public Release; Distribution Unlimited. Case Number 20-2014
Disclaimers & Acknowledgements
Approved for Public Release; Distribution Unlimited. Case Number 20-2014
©2020 The MITRE Corporation. ALL RIGHTS RESERVED. The author's affiliation
with The MITRE Corporation is provided for identification purposes only, and
is not intended to convey or imply MITRE's concurrence with, or support for,
the positions, opinions, or viewpoints expressed by the author.
Research conducted to fulfill degree requirements for the
SANS Technology Institute’s Master of Science degree.
Thank you to Tanya Baccam, Faculty Research Advisor
Thank you to my wife Madeline,
whom I also don’t speak for in
this presentation.
> whoami
• Security + DevOps =
• Wrote my first vulnerable code in
elementary school
• Began learning to write exploit code in
middle school
• First time DEF CON speaker
• Learning through hacking
Why should I care about DevOps?
• Running any applications? That’s
just the way it is now.
• It’s also better for security
@redteamwrangler
https://teespring.com/shop/my-c2-has-five-nines-front
Attacker’s Options
Internet
Workstation
Bastion
App Server
Source Repo
Test
Servers
Configuration
Server
1 2
3
Traditional Application Deployment
• Developer gives Ops a deployment package and install instructions
• Ops logs in to app server, manually installs software
• Time to patch? Another manual login and install
Traditional Lateral Movement
• To login and do configuration, Ops has highly privileged credentials
• Often the credentials are stored in plaintext on Ops workstations:
• SSH Keys, e.g. ~/.ssh/id_rsa
• API Tokens/Keys, e.g. ~/.aws/credentials
• Attackers use these to move deeper into the environment to steal
data, install malware, steal compute resources, etc
What is Zero-Touch?
• Google defined Zero-Touch Networking/Production
• Used by mature DevOps organizations
https://www.usenix.org/sites/default/files/conference/
protected-files/srecon19emea_slides_wolafka.pdf
https://storage.googleapis.com/pub-tools-public-
publication-data/pdf/45687.pdf
Zero-Touch Deployment
https://www.usenix.org/sites/default/files/conference/protected-files/srecon19emea_slides_wolafka.pdf
No Humans
Zero-Touch Deployment
Internet
Workstation
Bastion
App Server
Source Repo
Test
Servers
Configuration
Server
3
Traditional Lateral Movement
Internet
Workstation
Bastion
App Server
Lateral Movement in a Zero-Touch Network
Internet
Workstation
Bastion
App Server
Source Repo
Test
Servers
Configuration
Server
Detecting Lateral Movement
• Define protected servers
• Define human access points
• Watch for ANY connections from the manual access points to
protected servers
• Alert, investigate, etc…
• Profit!
Demo Time
Next Steps
• If you’re not zero-touch yet – do it!
• Implement this detection on your platform of choice
• Tailor it to your specific environment
• Correlate these events with other suspicious traffic
Lessons Learned
• Know your network
• Don’t be afraid to look for stupid simple things
Thank You!
Phillip Marlow
@wolramp

More Related Content

PPTX
Can't Touch This: Detecting Lateral Movement In Zero Touch Environments
PPTX
Can't Touch This: Detecting Lateral Movement In Zero Touch Environments
PDF
Dave Lewis | Zero Trust & The Flaming Sword of Justice | Codemotion Madrid 2018
PPTX
zerotrustmodelpresentation-200107094517.pptx
PDF
Zero Trust Best Practices for Kubernetes
PDF
ZTNA(7.2 CONFIG AND LAB TEST FORTINET 2022
PDF
Zero Trust Model Presentation
PDF
zero trust - how to build zero trust.pdf
Can't Touch This: Detecting Lateral Movement In Zero Touch Environments
Can't Touch This: Detecting Lateral Movement In Zero Touch Environments
Dave Lewis | Zero Trust & The Flaming Sword of Justice | Codemotion Madrid 2018
zerotrustmodelpresentation-200107094517.pptx
Zero Trust Best Practices for Kubernetes
ZTNA(7.2 CONFIG AND LAB TEST FORTINET 2022
Zero Trust Model Presentation
zero trust - how to build zero trust.pdf

Similar to Can't Touch This: Detecting Lateral Movement In Zero Touch Environments (20)

PDF
BATbern48_How Zero Trust can help your organisation keep safe.pdf
PDF
How Zero-Touch Deployment Reduces Onboarding Time.pdf
PDF
Fortinet ZTNA - Um contexto de sua Implementação
PPTX
Adopting A Zero-Trust Model. Google Did It, Can You?
PPTX
Zero Trust
PPTX
Finding Security a Home in a DevOps World
PDF
Deepfence.pdf
PDF
Zero trust in a hybrid architecture
PDF
5 things you didn't know you could do with security policy management
PDF
Zero Trust Networks Evan Gilman Doug Barth
PDF
Zero Trust Networks Evan Gilman Doug Barth
PDF
How Zero Trust Makes the Mission Simple & Secure
PPTX
Shift Left for More Secure Apps with F5 NGINX
PPTX
Securing Systems - Still Crazy After All These Years
PPTX
microsoft-cybersecurity-reference-architectures (1).pptx
PPTX
Zero Trust Model
PDF
Mfg workshop security
PPTX
Zero Trust: Redefining Security in the Digital Age
PPTX
Devops - Accelerating the Pace and Securing Along the Way - Thaddeus Walsh
PDF
Zero trust server management - lightning
BATbern48_How Zero Trust can help your organisation keep safe.pdf
How Zero-Touch Deployment Reduces Onboarding Time.pdf
Fortinet ZTNA - Um contexto de sua Implementação
Adopting A Zero-Trust Model. Google Did It, Can You?
Zero Trust
Finding Security a Home in a DevOps World
Deepfence.pdf
Zero trust in a hybrid architecture
5 things you didn't know you could do with security policy management
Zero Trust Networks Evan Gilman Doug Barth
Zero Trust Networks Evan Gilman Doug Barth
How Zero Trust Makes the Mission Simple & Secure
Shift Left for More Secure Apps with F5 NGINX
Securing Systems - Still Crazy After All These Years
microsoft-cybersecurity-reference-architectures (1).pptx
Zero Trust Model
Mfg workshop security
Zero Trust: Redefining Security in the Digital Age
Devops - Accelerating the Pace and Securing Along the Way - Thaddeus Walsh
Zero trust server management - lightning
Ad

Recently uploaded (20)

PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
Cloud computing and distributed systems.
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
KodekX | Application Modernization Development
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Encapsulation theory and applications.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Machine learning based COVID-19 study performance prediction
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PPTX
A Presentation on Artificial Intelligence
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Electronic commerce courselecture one. Pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Review of recent advances in non-invasive hemoglobin estimation
MYSQL Presentation for SQL database connectivity
Cloud computing and distributed systems.
Encapsulation_ Review paper, used for researhc scholars
KodekX | Application Modernization Development
Chapter 3 Spatial Domain Image Processing.pdf
Encapsulation theory and applications.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Machine learning based COVID-19 study performance prediction
CIFDAQ's Market Insight: SEC Turns Pro Crypto
A Presentation on Artificial Intelligence
Network Security Unit 5.pdf for BCA BBA.
Reach Out and Touch Someone: Haptics and Empathic Computing
Understanding_Digital_Forensics_Presentation.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
Electronic commerce courselecture one. Pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Ad

Can't Touch This: Detecting Lateral Movement In Zero Touch Environments