* [Blog](https://www2.paloaltonetworks.com/blog) * [Cloud Security](https://www2.paloaltonetworks.com/blog/cloud-security/) * [Cloud Workload Protection](https://www2.paloaltonetworks.com/blog/category/cloud-workload-protection/) * Limitless Insights into Y... # Limitless Insights into Your Cloud Security Landscape with the Infinity Graph [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2Fcloud-security%2Finfinity-graph-search-investigate%2F) [](https://twitter.com/share?text=Limitless+Insights+into+Your+Cloud+Security+Landscape+with+the+Infinity+Graph&url=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2Fcloud-security%2Finfinity-graph-search-investigate%2F) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2Fcloud-security%2Finfinity-graph-search-investigate%2F&title=Limitless+Insights+into+Your+Cloud+Security+Landscape+with+the+Infinity+Graph&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://www2.paloaltonetworks.com/blog/cloud-security/infinity-graph-search-investigate/&ts=markdown) \[\](mailto:?subject=Limitless Insights into Your Cloud Security Landscape with the Infinity Graph) Link copied By [Alan Zhang](https://www.paloaltonetworks.com/blog/author/alan-zhang/?ts=markdown "Posts by Alan Zhang") Nov 02, 2023 6 minutes [Cloud Workload Protection](https://www.paloaltonetworks.com/blog/category/cloud-workload-protection/?ts=markdown) [CNAPP](https://www.paloaltonetworks.com/blog/cloud-security/category/cnapp/?ts=markdown) [Attack Path Analysis](https://www.paloaltonetworks.com/blog/tag/attack-path-analysis/?ts=markdown) [Darwin](https://www.paloaltonetworks.com/blog/tag/darwin/?ts=markdown) Cloud security is a data analysis problem. Security teams are inundated with signals and alerts. As an industry, we've traditionally relied on point tools that focus on specific types of data, each with their unique scanning capabilities. These tools often come with their own visualizations and languages, which result in a fragmented field of data lacking the correlations needed to prioritize security issues. Security problems in the real world involve multiple dimensions or multiple areas. Effective security requires an effective data processing layer that ensures meaningful data connections are built. Connecting the dots between data points and resources enables security teams to visualize complex, interconnected security incidents more efficiently. Teams can more readily understand the root causes of critical issues and potential attack paths, which allows for faster investigation and remediation. ## **Introducing the Infinity Graph from Prisma Cloud** The Infinity Graph, introduced in [Prisma Cloud's Darwin release](http://paloaltonetworks.com/blog/2023/10/announcing-innovations-cnapp-prisma-cloud), offers a unified visualization of users' cloud assets and security issues. It's designed not only to present data but to present data in a way that's flexible and intuitive. Users can customize views, search for assets based on specific attributes, blend in security issues, and delve into use cases, such as exploring IAM permissions or investigating network flow logs. At its core, the Infinity Graph represents assets, security issues, and connections. Users can navigate through the graph with ease, expanding groups of assets or security issues to reveal details and drill into specific security findings for greater context. With aspects like internet exposure, for instance, users can trace the full exposure path from the internet to the VPC, subnet and corresponding EC2. ### Efficient Correlation of Data Data is only as valuable as the insights they provide. In cloud security, this often means correlating vast amounts of data across different tools to identify potential threats. The Infinity Graph now does this for you, alleviating the time-consuming and error-prone process. [All data is interconnected and visualized in one place](https://www.paloaltonetworks.com/prisma/cloud/latest) in the Infinity Graph, allowing for immediate prioritization and action. With attack path analysis, for instance, users can surface assets based on a combination of multiple attack vectors or security signals. This comprehensive context ensures that users always focus on the most pressing issues, ensuring a more secure cloud environment. ![Easily ask questions about code or cloud in a natural language and model the attack path with the Infinity Graph.](https://www.paloaltonetworks.com/blog/wp-content/uploads/2023/10/word-image-307574-1.png) Figure 1: Easily ask questions about code or cloud in a natural language and model the attack path with the Infinity Graph. ### **Key Infinity Graph Features** * **Preview Cards**: Preview cards offer a quick glance at assets and security issues, providing essential metadata and severity details. To access the full details of a specific asset or security issue, users can click into the sidecar to explore different dimensions of additional metadata. * **Path Highlights**: This feature emphasizes a specific path, showing users how a security issue is related from its source to its potential impact. When navigating through a large graph with numerous assets and connections, path highlighting becomes a crucial feature to use. By highlighting a specific path, it helps maintain focus and shows users how a particular security issue relates from its source to the destination blast radius impact. * **Alert Sidecar**: Alert sidecars provide representations of alert context, ensuring users are always informed. ## **Attack Path Analysis** In a landscape where threats can emerge from multiple vectors, attack path analysis delivering an understanding of potential pathways of attack is key to getting out ahead of threats. With Prisma Cloud's Infinity Graph and unified environment, users can search for assets and attach attack path vectors to them. In a single query, you can identify an internet-exposed EC2 instance, having overly permissive access, and possessing critical vulnerabilities. The Infinity Graph allows users to pivot their queries, adding layers of security context. If a common issue emerges, users can set it as a policy, ensuring they receive alerts and can conduct regular scans. This approach ensures that security teams can identify and mitigate threats before they escalate. > Real security problems involve multiple dimensions or multiple areas. ## **Trace Security Issues** The intricate web of cloud infrastructure makes tracing security issues from their origins to their potential impacts an arduous task. The Infinity Graph, however, simplifies this complexity with its capacity to trace issues from code to cloud. Consider [vulnerability tracing](https://www.paloaltonetworks.com/blog/prisma-cloud/vulnerability-management-innovation) as an example. With the Infinity Graph, a vulnerability can be tracked from its inception in code packages, through its journey in deployed images and onto runtime assets like serverless functions or virtual machines. This end-to-end visibility ensures that security professionals can pinpoint the source of vulnerabilities and initiate remediation processes directly from the platform. ## **Network Traffic Flow Logs Investigation** Network traffic is the lifeblood of any digital infrastructure. It's also a potential source of vulnerabilities. In the Infinity Graph, Prisma Cloud introduces the Swimlane view --- a tool designed for investigating network flow logs. The Swimlane view offers a hierarchical representation of network traffic. Users can see, at a glance, the relationships between specific workloads, subnets, and VPCs. This rich context proves invaluable when identifying potential threats. For instance, users can quickly discern between internal workloads and external IPs, even identifying potentially suspicious IPs communicating with their environment. By offering both a granular and holistic view of network traffic, the Swimlane view equips users to respond to threats with precision and speed. ## **The Power of a Unified Platform** The Infinity Graph opens up a new world for security teams. Standing out for its unified approach, it optimizes data intel as it brings everything together under one roof. The Infinity Graph emphasizes infinite possibilities, catering to a variety of use cases and ensuring that security professionals can tackle the most pressing issues with clarity and efficiency. More than just a tool, it's a platform --- a unified, infinite platform. See how [Prisma Cloud's Darwin release](https://www.paloaltonetworks.com/prisma/cloud/latest?ts=markdown) makes it easier than ever to secure your cloud infrastructure. **Video** : [Prisma Cloud's](https://www.paloaltonetworks.com/prisma/cloud) Darwin release makes it easier than ever to secure your cloud infrastructure. ### Learn More Tune in to our on-demand virtual event, [CNAPP Supercharged: A Radically New Approach to Cloud Security](https://start.paloaltonetworks.com/prisma-cloud-new-innovations-for-the-future-of-cloud-security-webinar-on-demand.html), and learn about [Prisma Cloud's latest innovations](https://paloaltonetworks.com/prisma/cloud/CNAPP-updates). In the webinar, we show you how to streamline app lifecycle protection, so be sure to watch on demand today. And don't miss an opportunity to test drive best-in-class security with a [free 30-day Prisma Cloud trial](https://www.paloaltonetworks.com/prisma/request-a-prisma-cloud-trial). *** ** * ** *** ## Related Blogs ### [Cloud Computing](https://www.paloaltonetworks.com/blog/category/cloud-computing-2/?ts=markdown), [CNAPP](https://www.paloaltonetworks.com/blog/cloud-security/category/cnapp/?ts=markdown), [Code to Cloud](https://www.paloaltonetworks.com/blog/cloud-security/category/code-to-cloud/?ts=markdown) [#### Elevate Cloud Security with the Flexibility and Simplicity of Custom Dashboards](https://www2.paloaltonetworks.com/blog/cloud-security/custom-security-dashboards-data-assessment/) ### [Cloud Workload Protection](https://www.paloaltonetworks.com/blog/category/cloud-workload-protection/?ts=markdown), [Web Application \& API Security](https://www.paloaltonetworks.com/blog/cloud-security/category/web-application-api-security/?ts=markdown) [#### API Discovery Made Simple](https://www2.paloaltonetworks.com/blog/cloud-security/api-discovery-security/) ### [Cloud Computing](https://www.paloaltonetworks.com/blog/category/cloud-computing-2/?ts=markdown), [CNAPP](https://www.paloaltonetworks.com/blog/cloud-security/category/cnapp/?ts=markdown) [#### Designing Prisma Cloud to See Beyond](https://www2.paloaltonetworks.com/blog/cloud-security/user-designed-interface/) ### [CNAPP](https://www.paloaltonetworks.com/blog/cloud-security/category/cnapp/?ts=markdown), [Secure the Cloud](https://www.paloaltonetworks.com/blog/category/secure-the-cloud/?ts=markdown) [#### Streamline Risk Management with Context-Based Risk Prioritization](https://www2.paloaltonetworks.com/blog/cloud-security/risk-prioritization-remediation/) ### [Cloud Computing](https://www.paloaltonetworks.com/blog/category/cloud-computing-2/?ts=markdown), [CNAPP](https://www.paloaltonetworks.com/blog/cloud-security/category/cnapp/?ts=markdown) [#### Show Risk Burndown with the Code to Cloud Dashboard](https://www2.paloaltonetworks.com/blog/cloud-security/security-kpis-metric-reporting-dashboard/) ### [Cloud Native Application Protection Platform](https://www.paloaltonetworks.com/blog/category/cloud-native-application-protection-platforms/?ts=markdown), [CNAPP](https://www.paloaltonetworks.com/blog/cloud-security/category/cnapp/?ts=markdown) [#### Code to Cloud Vulnerability Management](https://www2.paloaltonetworks.com/blog/cloud-security/vulnerability-management-innovation/) ### Subscribe to Cloud Security Blogs! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www2.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language