SlideShare a Scribd company logo
Can’t Touch This: Detecting
Lateral Movement in Zero-Touch
Environments
Phillip Marlow
DEF CON Cloud Village 2020
Approved for Public Release; Distribution Unlimited. Case Number 20-2069
Disclaimers & Acknowledgements
Approved for Public Release; Distribution Unlimited. Case Number 20-2069
©2020 The MITRE Corporation. ALL RIGHTS RESERVED. The author's affiliation
with The MITRE Corporation is provided for identification purposes only, and
is not intended to convey or imply MITRE's concurrence with, or support for,
the positions, opinions, or viewpoints expressed by the author.
Research conducted to fulfill degree requirements for the
SANS Technology Institute’s Master of Science degree.
Thank you to Tanya Baccam, Faculty Research Advisor
Thank you to my wife Madeline,
whom I also don’t speak for in
this presentation.
> whoami
• Security + DevOps =
• Wrote my first vulnerable code in
elementary school
• Began learning to write exploit code in
middle school
• First time DEF CON speaker
• Learning through hacking
Why Should I Care About DevOps?
• Running any applications? That’s
just the way it is now.
• Cloud native
• It’s also better for security
@redteamwrangler
https://teespring.com/shop/my-c2-has-five-nines-front
Attacker’s Options
Internet
Workstation
Bastion
App Server
Source Repo
Test
Servers
Configuration
Server
1 2
3
Traditional Application Deployment
• Developer gives Ops a deployment package and install instructions
• Ops logs in to app server, manually installs software
• Time to patch? Another manual login and install
Traditional Lateral Movement
• To log in and do configuration, Ops has highly privileged credentials
• Often the credentials are stored in plaintext on Ops workstations:
• SSH Keys, e.g. ~/.ssh/id_rsa
• API Tokens/Keys, e.g. ~/.aws/credentials
• Attackers use these to move deeper into the environment to steal
data, install malware, steal compute resources, etc
What Is Zero-Touch?
• Google defined Zero-Touch Networking/Production
• Used by mature DevOps organizations
https://www.usenix.org/sites/default/files/conference/
protected-files/srecon19emea_slides_wolafka.pdf
https://storage.googleapis.com/pub-tools-public-
publication-data/pdf/45687.pdf
Zero-Touch Deployment
https://www.usenix.org/sites/default/files/conference/protected-files/srecon19emea_slides_wolafka.pdf
No Humans
Zero-Touch Deployment
Internet
Workstation
Bastion
App Server
Source Repo
Test
Servers
Configuration
Server
3
Traditional Lateral Movement
Internet
Workstation
Bastion
App Server
Lateral Movement in a Zero-Touch Network
Internet
Workstation
Bastion
App Server
Source Repo
Test
Servers
Configuration
Server
Detecting Lateral Movement
• Define protected servers
• Define human access points
• Watch for ANY connections from the manual access points to
protected servers
• Alert, investigate, etc…
• Profit!
Demo Time
But What About Cloud?!
• Traffic Mirroring/Virtual Network Tap/Packet Mirroring
• Flow Logs
• Tagging/Asset Inventory is important
• But… there are visibility challenges
Next Steps
• If you’re not zero-touch yet – do it!
• Implement this detection on your platform of choice
• Tailor it to your specific environment
• Correlate these events with other suspicious traffic
Lessons Learned
• Know your network
• Don’t be afraid to look for stupid simple things
Thank You!
Phillip Marlow
@wolramp

More Related Content

PPTX
Can't Touch This: Detecting Lateral Movement In Zero Touch Environments
PPTX
Can't Touch This: Detecting Lateral Movement In Zero Touch Environments
PDF
Dave Lewis | Zero Trust & The Flaming Sword of Justice | Codemotion Madrid 2018
PDF
ZTNA(7.2 CONFIG AND LAB TEST FORTINET 2022
PDF
BATbern48_How Zero Trust can help your organisation keep safe.pdf
PDF
Zero Trust Best Practices for Kubernetes
PDF
Fortinet ZTNA - Um contexto de sua Implementação
PPTX
zerotrustmodelpresentation-200107094517.pptx
Can't Touch This: Detecting Lateral Movement In Zero Touch Environments
Can't Touch This: Detecting Lateral Movement In Zero Touch Environments
Dave Lewis | Zero Trust & The Flaming Sword of Justice | Codemotion Madrid 2018
ZTNA(7.2 CONFIG AND LAB TEST FORTINET 2022
BATbern48_How Zero Trust can help your organisation keep safe.pdf
Zero Trust Best Practices for Kubernetes
Fortinet ZTNA - Um contexto de sua Implementação
zerotrustmodelpresentation-200107094517.pptx

Similar to Can't Touch This: Detecting Lateral Movement In Zero Touch Environments (20)

PDF
Zero Trust Model Presentation
PDF
How Zero-Touch Deployment Reduces Onboarding Time.pdf
PDF
zero trust - how to build zero trust.pdf
PPTX
Finding Security a Home in a DevOps World
PDF
Deepfence.pdf
PPTX
Adopting A Zero-Trust Model. Google Did It, Can You?
PDF
Zero Trust Networks Evan Gilman Doug Barth
PDF
Zero Trust Networks Evan Gilman Doug Barth
PPTX
Zero Trust
PDF
How Zero Trust Makes the Mission Simple & Secure
PDF
Mfg workshop security
PPTX
Cloud Native Summit 2019 Summary
PDF
Design Implications, Challenges and Principles of Zero-Touch Management Envir...
PPTX
Zero trust model for cloud computing.pptx
PDF
Zero trust server management - lightning
PPTX
Zero Trust Networks
PPSX
Zero-Trust SASE DevSecOps
PPTX
microsoft-cybersecurity-reference-architectures (1).pptx
PPTX
Overview of Google’s BeyondCorp Approach to Security
PDF
Zero trust in a hybrid architecture
Zero Trust Model Presentation
How Zero-Touch Deployment Reduces Onboarding Time.pdf
zero trust - how to build zero trust.pdf
Finding Security a Home in a DevOps World
Deepfence.pdf
Adopting A Zero-Trust Model. Google Did It, Can You?
Zero Trust Networks Evan Gilman Doug Barth
Zero Trust Networks Evan Gilman Doug Barth
Zero Trust
How Zero Trust Makes the Mission Simple & Secure
Mfg workshop security
Cloud Native Summit 2019 Summary
Design Implications, Challenges and Principles of Zero-Touch Management Envir...
Zero trust model for cloud computing.pptx
Zero trust server management - lightning
Zero Trust Networks
Zero-Trust SASE DevSecOps
microsoft-cybersecurity-reference-architectures (1).pptx
Overview of Google’s BeyondCorp Approach to Security
Zero trust in a hybrid architecture
Ad

Recently uploaded (20)

PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
Cloud computing and distributed systems.
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Machine learning based COVID-19 study performance prediction
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Electronic commerce courselecture one. Pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Approach and Philosophy of On baking technology
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
20250228 LYD VKU AI Blended-Learning.pptx
Cloud computing and distributed systems.
Unlocking AI with Model Context Protocol (MCP)
Spectral efficient network and resource selection model in 5G networks
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Machine learning based COVID-19 study performance prediction
Network Security Unit 5.pdf for BCA BBA.
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
MYSQL Presentation for SQL database connectivity
Dropbox Q2 2025 Financial Results & Investor Presentation
sap open course for s4hana steps from ECC to s4
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Chapter 3 Spatial Domain Image Processing.pdf
Electronic commerce courselecture one. Pdf
Encapsulation_ Review paper, used for researhc scholars
Per capita expenditure prediction using model stacking based on satellite ima...
Programs and apps: productivity, graphics, security and other tools
Approach and Philosophy of On baking technology
Ad

Can't Touch This: Detecting Lateral Movement In Zero Touch Environments

  • 1. Can’t Touch This: Detecting Lateral Movement in Zero-Touch Environments Phillip Marlow DEF CON Cloud Village 2020 Approved for Public Release; Distribution Unlimited. Case Number 20-2069
  • 2. Disclaimers & Acknowledgements Approved for Public Release; Distribution Unlimited. Case Number 20-2069 ©2020 The MITRE Corporation. ALL RIGHTS RESERVED. The author's affiliation with The MITRE Corporation is provided for identification purposes only, and is not intended to convey or imply MITRE's concurrence with, or support for, the positions, opinions, or viewpoints expressed by the author. Research conducted to fulfill degree requirements for the SANS Technology Institute’s Master of Science degree. Thank you to Tanya Baccam, Faculty Research Advisor Thank you to my wife Madeline, whom I also don’t speak for in this presentation.
  • 3. > whoami • Security + DevOps = • Wrote my first vulnerable code in elementary school • Began learning to write exploit code in middle school • First time DEF CON speaker • Learning through hacking
  • 4. Why Should I Care About DevOps? • Running any applications? That’s just the way it is now. • Cloud native • It’s also better for security @redteamwrangler https://teespring.com/shop/my-c2-has-five-nines-front
  • 5. Attacker’s Options Internet Workstation Bastion App Server Source Repo Test Servers Configuration Server 1 2 3
  • 6. Traditional Application Deployment • Developer gives Ops a deployment package and install instructions • Ops logs in to app server, manually installs software • Time to patch? Another manual login and install
  • 7. Traditional Lateral Movement • To log in and do configuration, Ops has highly privileged credentials • Often the credentials are stored in plaintext on Ops workstations: • SSH Keys, e.g. ~/.ssh/id_rsa • API Tokens/Keys, e.g. ~/.aws/credentials • Attackers use these to move deeper into the environment to steal data, install malware, steal compute resources, etc
  • 8. What Is Zero-Touch? • Google defined Zero-Touch Networking/Production • Used by mature DevOps organizations https://www.usenix.org/sites/default/files/conference/ protected-files/srecon19emea_slides_wolafka.pdf https://storage.googleapis.com/pub-tools-public- publication-data/pdf/45687.pdf
  • 12. Lateral Movement in a Zero-Touch Network Internet Workstation Bastion App Server Source Repo Test Servers Configuration Server
  • 13. Detecting Lateral Movement • Define protected servers • Define human access points • Watch for ANY connections from the manual access points to protected servers • Alert, investigate, etc… • Profit!
  • 15. But What About Cloud?! • Traffic Mirroring/Virtual Network Tap/Packet Mirroring • Flow Logs • Tagging/Asset Inventory is important • But… there are visibility challenges
  • 16. Next Steps • If you’re not zero-touch yet – do it! • Implement this detection on your platform of choice • Tailor it to your specific environment • Correlate these events with other suspicious traffic
  • 17. Lessons Learned • Know your network • Don’t be afraid to look for stupid simple things