The Identity Attack Surface: How Credential Compromise Enables Lateral Movement
APA Citation
Hayes, M. & Lindqvist, J. (2024). The Identity Attack Surface: How Credential Compromise Enables Lateral Movement. *Network and Distributed System Security Symposium*.
View source →What Did This Cybersecurity Research Find?
This cybersecurity attack path study analyzed 250 penetration test reports to map how credential compromise enables lateral movement in enterprise environments. Cybersecurity defenses focused on identity (MFA, privileged access management, credential hygiene) blocked 78% of lateral movement paths that penetration testers used to reach domain admin.
Key Findings
- 1Credential-based attacks were the primary lateral movement method in 82% of penetration tests
- 2MFA implementation blocked 64% of credential replay attacks
- 3Privileged access management (PAM) solutions reduced attack path availability by 57%
- 4Kerberoasting and AS-REP roasting were successful in 48% of Active Directory environments
- 5Identity-focused defenses blocked 78% of paths to domain admin in tested environments
How Does This Apply to Cybersecurity Careers?
Identity security is becoming a distinct career specialization. Penetration testers and defensive security engineers both benefit from understanding credential-based attack paths.
Who Should Read This?
Frequently Asked Questions
What did this cybersecurity research find?
This cybersecurity attack path study analyzed 250 penetration test reports to map how credential compromise enables lateral movement in enterprise environments. Cybersecurity defenses focused on identity (MFA, privileged access management, credential hygiene) blocked 78% of lateral movement paths that penetration testers used to reach domain admin.
How is this research relevant to cybersecurity careers?
Identity security is becoming a distinct career specialization. Penetration testers and defensive security engineers both benefit from understanding credential-based attack paths.
Where was this cybersecurity research published?
This study was published in Network and Distributed System Security Symposium in 2024. Access the original paper through the publisher link above.
Explore Related Cybersecurity Resources
Get cybersecurity career insights delivered weekly
Join cybersecurity professionals receiving weekly intelligence on threats, job market trends, salary data, and career growth strategies.
Get Cybersecurity Career Intelligence
Weekly insights on threats, job trends, and career growth.
Unsubscribe anytime. More options