Lateral movement moved up the stack
The primary pivot points are now SSO, app permissions, identity policies, and admin surfaces; not file shares and RDP.
In legacy environments, “blast radius” meant a subnet, a server group, or a domain. In modern environments, identity is the connective tissue across SaaS, cloud, vendors, and internal apps; so one compromised identity plane can cascade into many incidents at once.
Network segmentation matters. Identity segmentation decides outcomes.
Identity centralization improves usability and control, until it becomes the single point of failure. When attackers gain durable identity access (privileged roles, OAuth grants, token theft, federation abuse), they don’t need to “move laterally” across the network. They move laterally across trust relationships.
The primary pivot points are now SSO, app permissions, identity policies, and admin surfaces; not file shares and RDP.
One identity incident can become a SaaS incident, a data incident, a vendor incident, and a governance incident; simultaneously.
Organizations enforce least privilege internally while leaving third-party integrations and standing vendor access largely ungoverned.
These are the common paths that turn a single foothold into enterprise-wide impact.
Privileged identity doesn’t just grant access; it changes policies, disables controls, and alters visibility. Attackers aim for control, not files.
App consents and delegated permissions persist through password resets. If you don’t govern OAuth, “resetting passwords” won’t reset access.
Session tokens and refresh tokens can preserve access without new authentication events; minimizing signals defenders rely on.
When identity is federated across business units, subsidiaries, or partners, compromise in one environment becomes an access path into another.
Most security programs were built around endpoint and network boundaries. Identity breaches ignore those boundaries.
Identity logs, SaaS audit logs, and vendor logs are often in different places with different owners. Attackers exploit those seams.
“We have MFA” is treated as a conclusion. In reality, tokens, legacy auth paths, consent, and admin changes can bypass “MFA compliance.”
Teams isolate endpoints before stabilizing identity. If attackers retain identity control, they re-enter and continue shaping the incident.
Vendor standing access, service principals, and integrations often have outsized privileges and weak monitoring; yet remain business-critical.
The goal is not “perfect identity.” The goal is preventing one compromise from becoming many.
Separate admin identities from daily identities, constrain where they can authenticate, and reduce standing privilege through role hygiene.
Treat app consents as privileged access. Enforce approval, periodic review, and monitoring for permission changes and anomalous grants.
Measure what matters: role changes, policy edits, new service principals, consent grants, session anomalies; not just failed logins.
Inventory vendor access, enforce least privilege, require MFA and conditional access alignment, and ensure you can revoke access rapidly.