A security graph is a graph representing assets that you want to protect and the relationships between these assets and roles within your IT infrastructure.Security posture management use-cases based on security graphs provide context to security control findings that would otherwise be viewed in isolation.They help identify where a security issue occurs, and what its impact is to associated resources.
 
 
Double-click on a resource to explore what impact control findings associated to it or its neighbours may have.

View Foundational Security Best Practices

Click a control in the list to view its impact.

To view resource properties, please click on an object shown in the graph.