Security News > 2022 > April > How many steps does it take for attackers to compromise critical assets?
The XM Cyber research team analyzed the methods, attack paths and impacts of attack techniques that imperil critical assets across on-prem, multi-cloud and hybrid environments.
They fail to show how these seemingly unrelated issues form hidden attack paths that hackers can use to pivot through a hybrid cloud environment and compromise critical assets.
The report takes the attackers' perspective to show how, once they get a foothold in the network, they can easily move towards critical business assets.
Key insights 94% of critical assets can be compromised within four steps of the initial breach point.
Hybrid cloud computing architecture is especially vulnerable, as attackers can exploit security gaps to obtain a foothold in the network and then move laterally between on-premises and cloud applications.
"When siloed teams are responsible for different components of security within the network, nobody sees the full picture. One team may ignore a seemingly small risk, not realizing that in the big picture, it's a stepping stone in a hidden attack path to a critical asset. To keep pace with today's technology and business demands, attack path remediation must be prioritized."
News URL
https://www.helpnetsecurity.com/2022/04/07/attack-critical-assets/