Attack Path Analysis

Multi-step exploitation chains derived from real security findings

Prisma Cloud Model
Live Analysis

No attack paths match your filters

Attack Path Node Types

Entry PointInitial compromise vector
VulnerabilityExploitable weakness
Lateral MovePrivilege escalation / pivoting
TargetFinal impact / objective
AssetInfrastructure component