Skip to main content

Hero Card: Threat Vectors

One-Click Least Privilege. Zero Disruption.



© 2026 Sonrai Security. All rights reserved.

Overview

The Threat Vector Dashboard provides a permissions-based visualization that maps cloud identities to high-impact threat categories. It helps CISOs and security teams understand who could do what if compromised, before a breach occurs.

Built on Sonrai's permission graph and integrated with Cloud Permission Firewall (CPF), the dashboard makes it easy to identify and remediate privileged access paths that could enable critical attack techniques.

Why It Matters

Modern cloud environments contain thousands of identities and permissions. While individual permissions may appear harmless, certain combinations can enable high-impact attack paths such as:

  • Disabling audit logging
  • Exfiltrating secrets
  • Launching unauthorized compute infrastructure
  • Encrypting or deleting critical data

The Threat Vector Dashboard groups these risks into clearly defined threat categories so teams can quickly assess exposure and reduce blast radius.

How It Works

The dashboard uses Sonrai's permission graph and pre-breach threat modeling to:

  1. Map identities to privileged permissions
  2. Associate those permissions with defined threat categories
  3. Display which identities across which accounts could execute specific attack techniques
  4. Enable rapid remediation through Cloud Permission Firewall

This is a pre-breach exposure view - focused on identifying possible access paths, not runtime behavior.

tip

The Threat Vector Dashboard intentionally focused on exposure visibility. It does not provide:

  • Risk scoring or prioritization
  • Behavioral detection or runtime alerts
  • Automatic remediation
  • Time-series or historical trend analysis

Who Is This Feature For?

  • Cloud Security Engineers – Rapid visibility into exposure across accounts
  • SOC Analysts – Faster triage and investigation of potential attack paths
  • Security Architects – Validate safer defaults and reduce blast radius
  • CISOs & Security Leaders – Assurance that high-impact access paths are controlled

Dashboard Overview

Information about potential threat vectors is provided in two locations:

1: Threat Vectors Hero Card

The Threat Vectors Hero Card provides immediate visibility into overall threat posture across the current scope.

This Hero Card includes:

  • The total number of threat categories (out of 10) with outstanding exposure.
  • A button to open the threat vectors table, where you can take remediation steps.

2: Threat Vectors Table

This table groups threat vectors into four types of risk, and ten total threat categories.

  • See accounts and identities with unused privileged permissions that could put your cloud at risk.
  • Get a short description of what type of threat is posed.
  • Use the convenient button to add controls that protect unneeded permissions.

Understanding Threat Categories

Threat TypeThreat CategoryDescription
Evasion & Visibility GapsCompliance & Audit BypassMissed violations, failed audits, regulatory fines (e.g., disabling config, deleting CloudTrail)
DNS & Traffic ManipulationCredential theft, data leakage, service impersonation (e.g., modifying Route53 or VPC routing)
Logging & Monitoring EvasionIncreased dwell time, delayed response, weakened forensics (e.g., disabling metrics, deleting logs)
Impact & DisruptionCompute Infrastructure HijackingUnapproved compute usage, cloud cost spikes, abuse of trusted IP space (e.g., launching EC2 instances for cryptomining)
Data Destruction & RansomwareOperational downtime, extortion, irreversible data loss (e.g., encrypting or deleting storage access)
Initial Access & Entry PointsIdentity Takeover & Privilege EscalationExpanded attacker access and lateral movement (e.g., AssumeRole abuse, modifying groups)
Secrets & Credentials TheftImpersonation of trusted services and persistent access (e.g., reading Secrets Manager or SSM secrets)
Persistence & MovementCross-Account Resource SharingUnauthorized access to production or financial systems
Execution & Command ControlAutomated lateral movement or sabotage (e.g., Lambda injection, SSM RunCommand)
Network Security BypassExposure of internal systems (e.g., modifying NACLs or security groups)

Investigating Exposure

Click a Threat Category in the table (for example, Compliance & Audit Bypass) to review all accounts where identities have access to privileged permissions related to this threat vector.

You can then expand accounts to see:

  • Identities inside each account that have access to privileged permissions
  • The number of privileged permissions they have access to (click to view a detailed list of permissions)

This view allows your teams to quickly understand blast radius and prioritize remediation.


Remediation Workflow

Now that you've got insight into potential threat vectors that should be secured, what are the next steps? How can you protect your organiation before a problem occurs?

In addition to adding other service controls in CPF, you can use the Threat Vectors Dashboard to immediately protect services across accounts and remove access to unused privileged permissions.

All you need to do is click in a row from the Threat Vector Table, or while viewing a detailed summary of an individual Threat Category.

CPF will proceed to:

  • Identify unused privileged permissions
  • Stage protections for affected services
  • Remove unused privileged permission access

The first time you perform this action, a confirmation window will show details of what changes are going to be staged. Select the Do not show me this again box if you prefer to immediately stage changes in the future.

All proposed changes are then staged as Pending Changes that can be reviewed and applied through standard CPF workflows.