Trust is overrated

Don’t be fooled by threats on your internal network

Teri Radichel
Cloud Security
Published in
11 min readJul 14, 2019

--

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

🔒 Related Stories: Cybersecurity for Executives

💻 Free Content on Jobs in Cybersecurity | ✉️ Sign up for the Email List

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

My last few posts on Cybersecurity for Executives covered network traffic and data flows between your company and the Internet and other entities outside your organization. Often security professionals call these external sources untrusted. Now I’m going to shift to talk about your internal network or the systems that reside behind your firewall, inside your network. In the past, this part of your network and the devices you operate yourself are referred to as trusted.

In theory, communication between the systems that reside inside your network should be safe. After all, they are your systems managed by your IT team and used by your staff. Unfortunately, this is often not the case. In too many major breaches, malware was able to break into an Internet-connected device, and then jump from that system to another device in your environment. The ability to move from one infected machine to another in a network is called “pivoting.”

--

--

Teri Radichel
Cloud Security

CEO 2nd Sight Lab | Penetration Testing & Assessments | AWS Hero | Masters of Infosec & Software Engineering | GSE 240 etc | IANS | SANS Difference Makers Award