Reduce your attack surface by eliminating attack paths.
By leveraging machine learning to simulate a multitude of potential attack scenarios, Saporo can identify common choke points and suggest changes to organizations. These change suggestions are computed to present the most beneficial improvements with the least amount of business disruption.
This approach considers that any node, user, host or token in the environment could be compromised at any moment and identifies the most risky potential compromise. In some cases the optimal choice is to accept the risk. In others, change to groups or accounts rights might be sufficient to mitigate attack paths.
Eliminate the shortest and most dangerous attack paths first.
Prioritizing where to focus efforts first when attack scenarios are almost endless is a complex task. There are hundreds to thousands of potential attack paths, yet most security and networking teams do not know what those paths are much less which ones offer the shortest viable paths that allow an adversary to efficiently reach their target.
Saporo will query attack paths and quantify risk based on the number of paths and sensitivity of resources that may be exposed. Getting a complete picture of how many connections are possible and how to reduce those numbers reduces risk.
Evaluate risks coming from compromised assets.
When organizations have identified a number of hosts, accounts or tokens that might have been compromised, Saporo can help evaluate the potential impact of the breach in the context of current environment policies and configurations.
Full attack paths can be displayed to the user, including the type of resource that might end up being accessed given the current set of compromised assets. This helps prioritize response not only from a threat point of view but also by impact and risk.
Prescribe mitigation to eliminate attack paths during a breach.
Adversaries go for the shortest attack path. Don’t give them shortcuts to compromise your data.
Saporo prescribes recommendations on the best intersection between an adversary's current location and potential targeted high value assets. Increasing the complexity of an attack slows adversaries down and provides the security team more time to respond.
Quantify the security impact of access control configuration.
Saporo provides a side-by-side comparative analysis of current state user access configuration models to a baseline configuration. Changes to attack paths will be visualized with additional focus on impact of changes to the overall surface.
Configuration changes are compared including environmental impact and exploitability of assets due to new potential attack paths. While a configuration change might include more attack paths than a previous configuration, their length and complexity will also be taken into account to determine if the change is an improvement.
Track progress and changes with a timeline of events and impact
Not all risks can be mitigated, and often many risks need to be accepted. By exposing existing attack paths and offering them for review, organizations can track and report on accepted risks.
Also, in order to build configuration systems, organizations need to track changes between versions of configurations over time. This gives organizations an overall timeline not currently available to security personnel. Saporo helps report on the impact of changes over time.