Use Cases for Dashboard

Panoptica Dashboard makes cloud security management more effortless by supporting a wide range of use cases. The table below describes some of the prominent use cases, detailed instructions, and why we love them.

Use CaseHow-to-useWhy we built it
Review the new attack paths in the Trend widget1. Go to "Dashboard"
2. Review "Trends" widget
3. Sort by "Attack Path"
4. Review all new attack paths in the past 30 days
Review critical data about your cloud environment in an intuitive way. DevSecOps teams can use trends to track progress and changes occurring in the cloud.
Identify a runtime event1. Go to "Dashboard"
2. Review "Runtime" widget by Malware and AWS GuardDuty.
3. If an event occurs, an alert will appear.
In addition, you can Create an Alert to be notified in real time.
Responding in a timely manner is crucial to prevent the attacker from causing further damage, stealing sensitive information, or using the compromised system for other malicious activities. The longer an attack goes undetected, the more difficult and costly it becomes to remediate.
Review the number of critical attack paths and what risks they pose1. Go to "Dashboard" > "Prioritization funnel"
2. Click on "Critical", the number next to it says how many attack paths pose critical risk (see Fig. 1)
Prioritize your security efforts based on the potential impact of each attack path. Critical attack paths pose the highest level of risk to the organization's systems, data, and reputation, and therefore require immediate attention. By understanding the risks posed by critical attack paths, you can take proactive measures to mitigate those risks and improve the overall security posture.
Focus on exposed secrets and review the detected attack paths severity1. Go to "Dashboard" > "Prioritization funnel" > "Attack Path Flow" > "Exposed Secrets"
2. Review the risk engine and severity of the attack paths (See Fig. 2)
Prioritize your efforts to mitigate potential threats based on the severity of the attack paths. By understanding the potential impact of each attack path, your team can focus their resources on the most critical areas and take appropriate measures to prevent or mitigate the risks.
Remediate multiple attack paths caused by the AWS Managed Policy AmazonS3FullAccess via Panoptica Guardrails Policy1. Go to "Dashboard" > "Prioritization funnel" > "Recommendations"
2. Search "Root Cause Name" for "AmazonS3FullAccess"
3. Go "Remediate" > "Download Policy" > "Terraform"
4. Remediate with terraform
Utilize Prioritization funnel to easily remediate most critical attack paths effortlessly. In this case, deny guardrails are dynamic policies generated by the platform to reduce the risks discovered. The guardrails do not change existing policies. The guardrails eliminate the attack vectors found, such as privilege escalation, by denying the risky actions only for specific resources.
Analyze compliance with major frameworks1. Go to "Dashboard"
2. Review "Compliance" widget with percentage scoring against major frameworks
Meet the necessary regulatory and legal obligation by reviewing the compliance with major frameworks and implement the necessary controls to protect your data in the cloud.
Dissect Privilege Escalation attack path by risk engine and severity1. Go to "Dashboard" > "Prioritization funnel" > "Attack Path Flow" > "Privilege Escalation"
2. Review the risk engine and severity of the attack paths
3. Click on "Privilege Escalation" to address the attack path (See Fig. 3)
Review the attack paths in the context of root causes, risk severity and number of attack paths. This features provides further visibility into the cloud environment and reduces the number of alerts needed to be reviewed.
2828

Fig 1. The use case for the prioritization funnel to review the number of critical attack paths and what risks they pose

2802

Fig. 2 The use case for the prioritization funnel to focus on exposed secrets

2862

Fig. 3 The use case for the prioritization funnel to dissect your attack path by the risk engines and the risk severity