Attack Path Cloud Feature Comparison
preview feature
Attack paths for Azure are currently in preview.
The following table provides a comparison of supported features for each cloud provider.
| Feature/Functionality | AWS | Google Cloud | Azure |
|---|---|---|---|
| Identity attack paths | ✅ | ❌ | ❌ |
| Directly exposed instances (hosts) | ✅ EC2 | ✅ Compute instance | ✅ VM |
| Exposed instances via an instance (multi-hop) | ✅ | ❌ | ❌ |
| Directly exposed container images | ✅ | ✅ | ✅ |
| Directly exposed database assets via an instance | ✅ RDS | ✅ Cloud SQL | ✅ SQL/PostgreSQL |
| Directly exposed storage bucket assets via an instance | ✅ S3 | ❌ | ✅ Azure Blob Storage |
| Exposed data assets via an instance (multi-hop) | ✅ | ❌ | ❌ |
| Exposed data assets via a container image (multi-hop) | ✅ | ❌ | ❌ |
| Directly exposed K8s Loadbalancer services | ✅ | ✅ | ❌ |
| Directly exposed K8s Nodeport services | ✅ | ✅ | ❌ |
| Directly exposed K8s Ingress services | ✅ | ✅ | ❌ |
| Exposed data assets via a K8s service (multi-hop) | ✅ | ❌ | ❌ |
| Exposure Polygraphs in alerts | ✅ | ✅ | ✅ |
| Exposure Polygraphs in single machine dossiers | ✅ | ✅ | ✅ |
| Internet exposure filter on Alerts and Vulnerabilities pages | ✅ | ✅ | ✅ |
| Secrets detection | ✅ | ✅ | ❌ |