Skip to content

Node Details

When you select a node in the Attack Graph Explorer, the Node Details panel opens on the right side of the canvas. This panel provides a comprehensive view of the resource, its security posture, connections, and role in attack paths.

Opening Node Details

Click any node in the graph canvas to open its detail panel. You can also access node details from:

  • The Paths tab -- Click on an entry point or target node in the paths list
  • The Chokepoints tab -- Click on a chokepoint node
  • The Toxic Combinations tab -- Click on a component node
  • The API: GET /api/v1/attack-graph/nodes/{nodeId}

The panel header shows:

  • Node type icon: Color-coded icon matching the node category (Compute, Network, IAM, Data, etc.)
  • Label: The display name of the resource (e.g., hostname, cloud resource name, identity name)
  • Type badge: The specific node type (e.g., CloudVM, Database, ServicePrincipal)
  • Provider badge: AWS, Azure, GCP, or On-Premises

Properties

The Properties section displays key attributes and security-relevant metadata for the resource. Properties vary by node type.

Compute Node Properties

PropertyDescription
OSOperating system name and version
IP AddressPrivate and public IP addresses
Instance TypeCloud instance type (e.g., t3.large, Standard_D2s_v3)
RegionCloud region or data center location
Is Internet-FacingWhether the resource is reachable from the internet
Firewall EnabledWhether the host firewall is active
EOL OSWhether the operating system is end-of-life
Monitoring ScoreCombined score from EDR, SIEM, alerts, and audit log coverage (0.0 -- 1.0)

Identity / IAM Node Properties

PropertyDescription
Identity TypeUser, Service Principal, Managed Identity, Service Account
Has MFAWhether multi-factor authentication is enabled
Has Admin PolicyWhether the identity has administrative privileges
Has Wildcard ActionsWhether IAM policies contain wildcard (*) permissions
Has Dangerous ActionsWhether the identity can perform high-risk operations
Has Console AccessWhether the identity can log into the cloud console
Has Active Access KeysWhether API access keys exist and are active
Has Data Plane AccessWhether the identity can access data-plane resources (storage, databases)
Last ActivityWhen the identity was last used
Credential AgeHow old the credentials are (days)

Network Node Properties

PropertyDescription
CIDRIP address range for VPCs and subnets
Allowed PortsPorts permitted by security group rules
Source CIDRsAllowed source IP ranges
ProtocolTCP, UDP, or ICMP
Is PublicWhether the subnet or VPC has internet routing

Data Node Properties

PropertyDescription
EncryptedWhether data at rest is encrypted
Encryption KeyKey vault or KMS key used for encryption
Public AccessWhether the resource allows public/anonymous access
Backup EnabledWhether automated backups are configured
SensitivityData classification level if known

Credential Node Properties

PropertyDescription
Credential TypeSSH Key, API Key, Access Token, or generic Credential
AgeHow old the credential is (days)
Last RotatedWhen the credential was last rotated
Is PlaintextWhether the credential is stored in plaintext
Associated IdentityThe identity this credential belongs to

Connections

The Connections section shows all incoming and outgoing edges for the selected node.

Incoming Edges

Resources that connect to this node. Each entry shows:

  • Source node: The node on the other end of the edge (click to navigate)
  • Edge type: The relationship type (e.g., CanReach, HasCredential)
  • Weight: Exploit probability for this edge
  • Port/Protocol: For network edges, the specific port and protocol

Outgoing Edges

Resources that this node connects to. Same fields as incoming edges but in the other direction.

TIP

The connection count is shown as a badge next to the section header (e.g., "Incoming (7)"). High connection counts on IAM nodes or credential stores often indicate overprivileged resources.

Vulnerabilities

If the node has known vulnerabilities, they are listed in the Vulnerabilities section.

Each vulnerability shows:

FieldDescription
CVE IDThe CVE identifier (e.g., CVE-2024-38063)
CVSS ScoreCommon Vulnerability Scoring System severity (0.0 -- 10.0)
EPSS ScoreExploit Prediction Scoring System probability (0.0 -- 1.0) -- the likelihood of exploitation in the next 30 days
CISA KEVWhether this CVE appears in the CISA Known Exploited Vulnerabilities catalog
Has RCEWhether the vulnerability enables remote code execution
Affected PackageThe software package that contains the vulnerability
Installed VersionThe version currently installed on the asset
Fixed VersionThe version that fixes the vulnerability (if known)

CISA KEV

CVEs in the CISA Known Exploited Vulnerabilities (KEV) catalog have been confirmed as actively exploited in the wild. These should be treated as high priority regardless of CVSS score.

EPSS Scoring

The EPSS score is a probability (0.0 to 1.0) representing the likelihood that a vulnerability will be exploited in the wild in the next 30 days. AttackLens uses EPSS to adjust edge weights in the attack graph:

  • EPSS > 0.5: High exploitation likelihood; edge weights are multiplied by 1.2x
  • EPSS > 0.1: Moderate exploitation likelihood; standard weight applied
  • EPSS < 0.1: Low exploitation likelihood; may still be relevant in context

Capabilities

The Capabilities section lists which attack capabilities from the AttackLens catalog matched this node. Each capability represents a known attack technique.

FieldDescription
Capability NameDescriptive name (e.g., SSH_PasswordBruteForce, AzureOwnerRoleAbuse)
MITRE TechniqueATT&CK technique ID and tactic (e.g., T1021.004 -- Lateral Movement)
ExploitabilityHow easy this technique is to execute (0.0 -- 1.0)
ConfidenceConfirmed, Plausible, or Theoretical
EvidenceHuman-readable explanation of why the capability matched

INFO

Capabilities are evaluated from a catalog of 93 YAML-defined attack techniques. Each capability specifies prerequisite conditions (open ports, missing MFA, specific IAM permissions, etc.) that must all be true for the capability to match. This means every matched capability is backed by concrete evidence from your environment.

Graph Tags

Tags provide additional context about the node's security posture. Tags come from two sources:

Finding Tags (Rule-Based)

Tags derived from policy rule evaluations. Examples:

  • SSH_PASSWORD_AUTH_ENABLED -- SSH allows password authentication
  • RDP_ENABLED -- Remote Desktop Protocol is active
  • FIREWALL_DISABLED -- Host firewall is not running
  • NO_MFA -- Multi-factor authentication is not configured

IAM Context Tags (Derived)

Tags computed from the node's IAM properties:

  • HAS_WILDCARD_ACTIONS -- IAM policy contains Action: "*" permissions
  • HAS_ADMIN_POLICY -- Identity has administrative policy attached
  • HAS_DANGEROUS_ACTIONS -- Identity can perform high-risk operations (iam:CreateUser, sts:AssumeRole, etc.)
  • HAS_ACTIVE_ACCESS_KEYS -- API access keys are active
  • HAS_CONSOLE_ACCESS -- Identity can access the cloud management console
  • HAS_DATA_PLANE_ACCESS -- Identity can access data in storage or databases

Blast Radius

Click Blast Radius in the node detail panel to see the potential impact if this node is compromised. The blast radius uses a breadth-first search from the selected node to calculate:

  • Affected nodes by depth: How many resources are reachable at each hop distance (1 hop, 2 hops, etc.)
  • Critical assets reached: How many crown jewel or high-sensitivity assets are within reach
  • Data stores reached: How many databases, storage accounts, or key vaults are accessible

What-If Simulation

Click What-If to simulate what would happen if this node were remediated (e.g., patched, hardened, or decommissioned). The simulation re-runs the attack analysis without this node and shows:

  • Risk reduction %: How much the overall risk score drops
  • Eliminated paths: Number of attack paths that no longer exist
  • Toxic combination change: How many toxic combinations are resolved

TIP

What-If simulation is a powerful tool for justifying remediation effort to stakeholders. Run it on a proposed fix before committing resources to show the quantified security improvement.

Next Steps

AttackLens - Continuous Exposure Management