{"id":3800,"date":"2026-04-12T23:58:38","date_gmt":"2026-04-12T21:58:38","guid":{"rendered":"https:\/\/www.steffiscloud.de\/?post_type=glossary&#038;p=3800"},"modified":"2026-04-12T23:58:40","modified_gmt":"2026-04-12T21:58:40","slug":"lateral-movement","status":"publish","type":"glossary","link":"https:\/\/www.steffiscloud.de\/en\/glossary-en\/lateral-movement\/","title":{"rendered":"Lateral Movement"},"content":{"rendered":"<p>Lateral Movement<br><br>After gaining initial access, attackers rarely stay on a single system. Through lateral movement, they explore the network, escalate privileges, and spread to other devices or servers. This allows them to reach critical systems, access sensitive data, and maintain persistence within the environment.<br><br>Stopping lateral movement is critical to preventing small incidents from becoming full-scale breaches.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Lateral Movement After gaining initial access, attackers rarely stay on a single system. Through lateral movement, they explore the network, [&#x2026;]<\/p>\n","protected":false},"author":1,"featured_media":0,"menu_order":174,"template":"","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"glossary-categories":[],"glossary-tags":[],"glossary-languages":[19],"glossary-cat":[],"class_list":["post-3800","glossary","type-glossary","status-publish","hentry","glossary-languages-en"],"post_title":"Lateral Movement","post_content":"<!-- wp:paragraph -->\n<p>Lateral Movement<br><br>After gaining initial access, attackers rarely stay on a single system. Through lateral movement, they explore the network, escalate privileges, and spread to other devices or servers. This allows them to reach critical systems, access sensitive data, and maintain persistence within the environment.<br><br>Stopping lateral movement is critical to preventing small incidents from becoming full-scale breaches.<\/p>\n<!-- \/wp:paragraph -->","related_terms":"","external_url":"","internal_reference_id":"","_links":{"self":[{"href":"https:\/\/www.steffiscloud.de\/en\/wp-json\/wp\/v2\/glossary\/3800","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.steffiscloud.de\/en\/wp-json\/wp\/v2\/glossary"}],"about":[{"href":"https:\/\/www.steffiscloud.de\/en\/wp-json\/wp\/v2\/types\/glossary"}],"author":[{"embeddable":true,"href":"https:\/\/www.steffiscloud.de\/en\/wp-json\/wp\/v2\/users\/1"}],"version-history":[{"count":0,"href":"https:\/\/www.steffiscloud.de\/en\/wp-json\/wp\/v2\/glossary\/3800\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.steffiscloud.de\/en\/wp-json\/wp\/v2\/media?parent=3800"}],"wp:term":[{"taxonomy":"glossary-categories","embeddable":true,"href":"https:\/\/www.steffiscloud.de\/en\/wp-json\/wp\/v2\/glossary-categories?post=3800"},{"taxonomy":"glossary-tags","embeddable":true,"href":"https:\/\/www.steffiscloud.de\/en\/wp-json\/wp\/v2\/glossary-tags?post=3800"},{"taxonomy":"glossary-languages","embeddable":true,"href":"https:\/\/www.steffiscloud.de\/en\/wp-json\/wp\/v2\/glossary-languages?post=3800"},{"taxonomy":"glossary-cat","embeddable":true,"href":"https:\/\/www.steffiscloud.de\/en\/wp-json\/wp\/v2\/glossary-cat?post=3800"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}