Attack Path Analysis
Multi-step exploitation chains derived from real security findings
Prisma Cloud ModelLive Analysis
No attack paths match your filters
Attack Path Node Types
Entry Point— Initial compromise vector
Vulnerability— Exploitable weakness
Lateral Move— Privilege escalation / pivoting
Target— Final impact / objective
Asset— Infrastructure component