Skip to content

TIPS #33: Don’t Miss the Forest for the Trees

Shane Shook

November 17, 2025

  • Blog Post
  • TIPS

Issue: Most organizations defend against methods of compromise with horizontal defenses, but attackers target vertical business processes.

In TIPS #19, we introduced the concept of horizontal versus vertical security through the lens of the Finance business function:

“Just as a business needs both passive and active defenses, so does it require both horizontal security- foundational defenses such as company-wide identity, endpoint, data, and network security- and vertical security- defenses against threats targeting distinct business processes.”

Forgepoint TIPS #19

As one of the most impactful dynamics in security, the interplay between horizontal and vertical deserves a deeper dive.

Horizontal and vertical security: The trees and the forest

Horizontal defenses address method(s) of compromise such as malware delivery, lateral movement, privilege escalation, and exfiltration. Organizations worldwide have matured their horizontal security planes in recent years by investing in endpoint detection and response, SIEM correlation, firewalls, DLP, vulnerability management, and threat intelligence integration. These measures are foundational, but they are not sufficient on their own.

Vertical defenses address objective(s) of compromise, such as the manipulation of business workflows, the theft of sensitive processes, and the disruption of functions that create value and trust. Organizations tend to have fewer vertical defenses than horizontal ones. Vertical measures, like horizontal ones, are insufficient on their own.

Think of horizontal and vertical security as two ways of protecting a dense forest. Horizontal security focuses on protecting individual trees (against individual methods of compromise like phishing for domain credentials and access) while vertical security focuses on defending likely paths through the forest (against objectives of compromise like exploiting a financial controller’s credentials for access to payment systems to commit fraud).

Without both perspectives, security teams may stop intrusions at the surface while missing their deeper potential impact, or they may incorrectly secure vertical workflows because they lack a full understanding why attackers will likely enter in the first place.

In practice, security teams tend to prioritize horizontal defense, viewing attacks and breaches as eradication priorities without considering business impacts or the context of risk. Tickets are closed, but the potential compromise of business-critical workflows goes unexamined. This is problematic because the most impactful compromises occur in vertical processes: the workflows that move funds, control heavy machinery, adjudicate clearances, or finalize market disclosures.

Impact: When vertical processes are compromised, key business functions are damaged, causing significant losses.

The impact of vertical compromises is significant because it directly affects revenue and value-generating business. Unlike malware outbreaks that may just inconvenience IT, vertical breaches change key business outcomes: money is moved, contracts are altered, deals are lost, identities are stolen, and public trust is eroded.

The following two high-profile case studies demonstrate this trend. What distinguishes these incidents is not that attackers evaded initial detection (though they did in both cases), but that they understood unique business processes well enough to exploit them- and that defenders failed to connect the dots between horizontal and vertical defenses to stop the compromises:

$81M Bangladesh Bank Heist (2016)

In 2016, attackers successfully stole $81 million from Bangladesh Bank in a massive digital heist.

Attackers gained horizontal entry through malware after exploiting basic security gaps including unmonitored servers and a lack of firewalls. Over several months, they used keystroke loggers to observe the bank’s SWIFT payment processing workflow and acquire employee credentials, gaining critical vertical context.

The attackers then exploited weak cross-border vertical communication workflows by initiating nearly $1 billion in fraudulent transfers during a holiday weekend. They covered their tracks by manipulating or suppressing the SWIFT transaction logs and printouts.

Throughout the operation, a series of horizontal red flags appeared including fraudulent SWIFT transfer requests, a SWIFT system error, and a malfunctioning printer that stopped generating copies of transfers. However, because these technical signals were not tied to the financial process they governed, they were initially treated as isolated IT and financial issues, not as potential evidence of a broader operation.

From a security perspective, numerous anomalies should have been flagged and escalated with appropriate vertical context to prevent the fraudulent transfers:

  • The presence of malware in the bank’s SWIFT access system
  • Unauthorized access to and tampering with the SWIFT system
  • The sheer volume of unusual transaction requests, particularly during holiday/closure timing
  • Poor inter-bank/cross-border controls

For a detailed explanation of the heist, we recommend this writeup in New York Times Magazine.

 

OPM Breach (2015)

The 2015 Office of Personnel Management (OPM) breach exposed sensitive background-check records (including SF-86 forms) for approximately 21.5 million individuals, and earlier compromised personnel records for about 4.2 million federal employees and contractors.

Attackers stole SF-86 and similar forms that contained personal information, fingerprints, and background investigation data, offering a potential treasure-trove of strategic intelligence on relationships, vulnerabilities, and leverage points which could be used in targeted disinformation, recruitment, or influence operations.

The attackers, widely attributed to Chinese-government-linked state-sponsored groups, first breached OPM networks around late 2013 by exploiting horizontal weaknesses including insufficient multi-factor authentication and weak network segmentation. Though OPM became aware of malicious activity in 2014-15, full system ejection/remediation was delayed, and during that period the adversaries had time to harvest credentials, deploy malware, move laterally into privileged systems, and access the background-investigation databases.

Multiple horizontal indicators (e.g., anomalous logins, unencrypted databases, old assets without oversight) surfaced, but because these signals were not aligned with the clearance-workflow mission and lacked financial-fraud style triggers, they were not escalated as a strategic national-security incident. OPM’s response was fragmented and the lack of forward‐looking context regarding how such data could be exploited (rather than just stolen) impaired the escalation and containment process.

From a security/forensics perspective, the following anomalies should have been detected with appropriate vertical security controls:

  • Presence of weak or missing authentication controls and insufficient segmentation of high-value assets.
  • Unauthorized privileged access and exfiltration of background-investigation systems (rather than mere data theft).
  • The volume and sensitivity of unusual access requests (i.e., access to SF-86 and fingerprint data) should have triggered a mission-context alert beyond standard IT incident response.

Action: Align horizontal and vertical security to enable context-informed detection, response, and resolution.

1) Map assets and identities based on vertical business functions

Horizontal security tools like SIEMs provide raw alerts. Vertical context turns those alerts into actionable intelligence- as I recently spoke about in an article for the National Security Institute.

Classify assets and identities based on their associated business function(s) to add vertical context. Every endpoint, server, and identity should be tagged by the function it serves, not just its hostname, to enrich horizontal security data. Examples of tags might include: RTGS operator console, FX desk workstation, filing disclosure server, SCADA HMI, or clearance adjudication system.

SPHERE helps organizations maintain clean identity and permissions environments, ensuring that user roles are mapped directly to sensitive vertical functions.

“Security teams often think about the identity attack surface horizontally, and for good reason: for every one employee, there are 85 additional identity-related entry points that an attacker can target. But the true impact of an identity compromise is vertical. Compromised credentials can prevent doctors from accessing patient records, delaying procedures and putting lives at risk; they can be used to disrupt national operations in the energy and utilities sectors. Companies need to maintain clean, accurate, and secure identity data across horizontal and vertical security planes to protect their future operations.”

Rita Gurevich Founder and CEO, SPHERE

2) Context-aware monitoring and triage

The question security teams ask when triaging alerts needs to shift from “Did we eradicate the malware?” to “What process was at risk and what could have been manipulated?” Infections on critical hosts should trigger automatic severity escalation and forensic imaging, reconciliation checks, and executive escalation.

Lumu Technologies provides continuous compromise assessment that maps risk posture to functional domains, giving horizontal compromise signals crucial vertical relevance.

Symmetry Systems provides visibility into how sensitive data is accessed and used throughout key business processes, detecting workflow anomalies that could indicate a vertical compromise.

“Data Security Posture Management is not just about data, identities, and permissions at rest. It’s about operations -- to see how data flows due to identities moving your data around -- and finding anomalous data flows that may point to a compromised business process.”

Mohit Tiwari Co-founder and CEO, Symmetry Systems

3) Heat map correlation

Build dashboards that visualize malware by function to visualize attacks on vertical functions. For instance, a clustering of commodity malware on SWIFT terminals, supervisory control and data acquisition (SCADA) operators, or clearance adjudication servers is likely a sign of vertical targeting.

4) Tamper-evident controls

Critical workflows require tamper-evident validation including hashing, dual-control approvals, and independent reconciliations. This includes HR benefits and payroll systems, Real-Time Gross Settlement (RTGS) reconciliation, turbine operation logs, personnel clearance files, and any other high-value workflow.

VERITUITY enables fast, safe, and verified payouts in financial contexts by validating integrity and trust in payment workflows, detecting anomalies in origination and reconciliation that may signal a vertical compromise.

5) Continuously Test Your Workflows.Attackers exploit flawed business logic, not just flawed systems and technological configurations. It’s critical to validate, test, and secure exposed workflows against vertical risks.

Bishop Fox’s continuous attack surface testing validates workflows and business logic, surfacing and securing the vertical gaps that attackers target.

“At its core, proactive security is about resolving impactful vulnerabilities before they can be exploited. That process has to start with a deep analysis of your external attack surface to understand what attackers see. Then, that intelligence needs to be operationalized through expert-driven testing to find and fix the exploitable weaknesses, misconfigurations, and vertical processes that attackers will target.”

Vinnie Liu Co-founder and CEO, Bishop Fox

6) Pair ISAC advisories with vertical guidance

Sector threat intelligence should not stop at IOCs. Each Information Sharing and Analysis Center (ISAC) advisory should include or be paired with intelligence on which vertical functions are most at risk when a given threat is present. Example: “If this particular Remote Access Trojan (RAT) is observed in FX or decision management systems, investigate for eavesdropping, data exfiltration and targeted influence potential.”

Appendix: Horizontal vs. Vertical Security Planes

Use this quick reference guide on horizontal and vertical security when considering strategic security posture shifts.