Episode 64 — Detect lateral movement by monitoring network flows, service calls, and unusual access paths

This episode explains lateral movement in cloud environments as a combination of connectivity, identity, and service-to-service behavior, and it prepares you for GCLD questions that test how attackers pivot after initial footholds. You’ll learn how to spot movement through abnormal network flows, unexpected API calls, and access paths that bypass intended segmentation or normal deployment patterns. We’ll use scenario thinking, such as a compromised workload suddenly reaching management interfaces or calling sensitive services it never used before, to illustrate what “unusual” looks like when you have baseline context. You’ll also cover practical hurdles like microservices generating lots of internal traffic, ephemeral scaling changing normal patterns, and gaps created when monitoring is enabled in one account or region but not another. The outcome is an investigative approach that combines flow evidence with service logs and identity events to confirm whether activity represents benign operations or a true pivot attempt. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.
Episode 64 — Detect lateral movement by monitoring network flows, service calls, and unusual access paths
Broadcast by