What is Application Lateral Movement?

What is Application Lateral Movement?

Application Security Posture Management Author
Omer Yaron, Head of Research, Enso Security
April 14, 2022

Application lateral movement defines the attacker’s ability to leverage a breach of a single resource to then successfully move across resources from different organizational applications.

All applications are not created equal within modern organizational architecture - they carry different levels of risk, and their access to internal resources and assets should be considered with that in mind. Much like company employees are only granted access to sets of data as they relate to their specific position, and should not be able to access others, so should organizational applications be segregated from one another in order to significantly reduce an attacker's ability to exploit one application’s vulnerability to target others. 

How does application lateral movement occur?

There are various ways in which access to one application can be used to breach others, by leveraging one or more of the following in order to allow for application lateral movement:

  1. Flat organization credentials
  2. No validation for new application code
  3. CI/CD pipelines
  4. Relying on infrastructure segmentation (SSRF)
  5. Developers self-service tools

Why is application lateral movement popular with attackers? 

In most cases, developers are the organizational owners of all development processes and, along with the core R&D teams, are in charge of the overall R&D velocity - creating developers' self-serving tools, libraries, and frameworks while being measured by their ability to deliver features and increase this velocity.  In a sense, this may be the equivalent of the fox guarding the henhouse, as their goals and responsibilities - with little security oversight - are prime positions for attackers to find a way into the organization and maximize their attack efforts. This risk grows exponentially without proper mitigation and governance - as a single vulnerability caused by a single commit of code in any application may be chained by lateral movement to compromise critical organizational assets. We are witnessing a growing volume of high-impact attacks originating from a low-risk asset or from the compromise of a single developer workstation or credentials.

What can I do in my organization?

  1. Know your assets. Make sure you have a trusted inventory of all applications repositories and processes.
  1. Have committed code controls in place - peer review for PRs, limited access to repositories for relevant developers.
  1. Speak to your developers. Ask them if their tasks and actions possibly affect other, unused applications within the organizational portfolio, and how. If you turn the inquiry into an internal bug-hunt you most likely will be surprised with the results.

Once you map out the gaps, you should consider mitigation strategies in full collaboration with R&D teams so as to find the optimal middle ground between security and efficiency, without impacting their velocity.  


For example, if developers are used to working with self-service provisioning of new applications, you might want to change that flow and require the approval of an additional developer for any provisioning of new applications, rather than have a security review for every new application request. In such a case, a malicious request for provisioning a new application is much less likely to be successful for the attacker, and in fact, acts as another control where an ongoing attack could be detected and mitigated.

Once all known gaps are mapped out, we encourage you to challenge yourself with a dedicated PT scoped for application lateral movement. Such a scope could begin with granting access to a low-risk application, with the goal of reaching critical assets via application lateral movement. This kind of drill will provide you with important information that should be used to both reassess existing AppSec methodologies, and also accurately reflect your organizational security posture internally, to ensure that the risks of application lateral movement are known and dealt with. 

About the author

Omer Yaron is the Head of Research at Enso Security, the first Application Security Posture Management (ASPM) tool used daily by AppSec teams to enforce, manage and scale a robust AppSec program, all without interfering with development.

Get started today with Application Security Posture Management.

Privacy Policy

Subscribe for updates

Don’t miss out
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Share on

There’s more to see

Application Security Management
Enso Security joins Snyk: Enabling security leaders to scale their AppSec program with ASPM
A message from Enso’s CEO Roy Erlich on this momentous occasion
Read now
Application Security Management
An effective AppSec program starts with the right Shift-Left
Case Study: Enso Security + GitHub Advanced Security. How ASPM provides the business context for the best of developer-led security solutions.
Read now
Application Security Management
Code Review - The Good, the Bad, and the Hard to Swallow.
With a little constructive criticism, prioritization and automation, we can make code reviews a painless process for all involved!
Read now