Skip to main content

Mitigation Graph

Explore how to build, interpret, and use the Mitigation Graph in Cye Platform — from attack routes to risk quantification and remediation planning.

25 articles
Org. Attack Graph OverviewLearn how the Cye platform's Org. Attack Graph maps attack routes and helps prioritize security remediation.
Org. Attack Graph ComponentsUnderstand each component of the Org. Attack Graph and how it represents threats, assets, and vulnerabilities.
Attack Routes in the Org. Attack GraphUnderstand how attack routes illustrate threats to your business assets and help prioritize remediation.
Findings and Positions in the Org. Attack GraphLearn how to view and explore findings and positions directly from the Org. Attack Graph.
Searching in the Org. Attack GraphFind specific findings, positions, or assets quickly using the search feature in the Org. Attack Graph.
Working with Positions in the Org. Attack GraphLearn how to move, edit, and manage positions in the Org. Attack Graph to organize and analyze attack routes.
Org. Attack Graph ToolsExplore the key tools available in the Org. Attack Graph toolbar to search, edit, and plan effectively.
Quantification of Cyber RiskUnderstand how Cye Exposure Management Platform calculates cyber risk and prioritizes mitigation based on real-world attack routes and business impact.
Graph AuditTrack changes to the Org. Attack Graph using the History tab, visible to users with edit permissions.
Tips for Building Attack RoutesFollow these best practices to build clear, accurate, and high-impact attack routes in the Org. Attack Graph.