Cybersecurity / sankey

Attack Path Sankey

Show likely attacker movement from phishing or exposed services into lateral movement and data access.

standalone html

Attack path from entry vector to business impact

paths from phishing and exposed services into privilege escalation, lateral movement, and data access
cybersecurity/attack-path-sankey
High Medium Identity Endpoint Network Critical

Use When

Show likely attacker movement from phishing or exposed services into lateral movement and data access.

Signals

  • entry vector
  • control gap
  • blast radius