
What does privilege escalation and pivoting look like in a zero-trust environment? It's just stealing new identities. That's all it is. And so, they get in, they keep hunting, they find these secrets, they get more access, they rerun all the stuff they did with the low-level access with the high-level access, they find even more access, and they keep repeating. And that's that's all it is. It's just stealing more identities. And maybe you have maybe they get in with a low-permission session token that expires in 6 hours. But then they find a secret that doesn't expire or expires in a week. And then with that, they have more access, and they just keep going from there. And I'll get into that with
the real-world examples.