99%
of cloud breaches are caused by misconfigurations rather than zero-day vulnerabilities, per IBM X-Force Cloud Threat Landscape Report 2024, establishing CSPM as a foundational cloud security investment
5,000+
CSPM rules and checks available in Orca Security's platform across AWS, Azure, GCP, and Kubernetes as of 2025
35%
average reduction in time-to-remediate for cloud misconfigurations when organizations implement attack path analysis to prioritize remediation versus addressing findings by severity score alone, per ESG research 2024

Misconfiguration detection was the original promise of cloud security posture management, and it remains valuable: the majority of cloud breaches trace back to configuration errors rather than novel exploitation techniques. But misconfiguration inventories that list thousands of findings without context have produced a familiar outcome in security operations: teams triaging by severity score work through low-risk findings while the specific combination of three medium-severity issues that creates a direct path to production data remains unaddressed.

Attack path analysis addresses this by modeling cloud environments as graphs of resources, identities, and relationships, then identifying the specific chains that represent realistic exploitation paths. Orca Security built this capability on top of its SideScanning agentless platform and established market position as the accessible, comprehensive agentless CSPM with attack path context. Plerion emerged as a focused challenger, building a graph-based attack path model with particular depth in AWS IAM policy analysis and AWS-native resource relationships.

This comparison examines both platforms across the dimensions that determine fit for specific cloud environments and security programs.

What Attack Path Analysis Adds to Standard CSPM

Standard CSPM tools operate on individual resource configurations in isolation. An S3 bucket with public access enabled is flagged as a high-severity finding regardless of whether it contains sensitive data, regardless of whether it is accessible from the internet through a sequence of network controls, and regardless of whether any IAM identity with access to the bucket also has access to other sensitive resources. The finding is contextually disconnected from the actual risk it creates.

Attack path analysis reconnects findings to risk by modeling the relationships between resources. In a graph-based model, an EC2 instance has relationships to the IAM role attached to it, the security group rules governing its network connectivity, the VPC it sits in, and the subnets with routes to the internet. The IAM role has relationships to the permissions it grants and the resources those permissions cover. An S3 bucket has relationships to the bucket policy, the IAM roles with access, and the data classification of its contents (if data security posture management is integrated).

Graph traversal algorithms can then identify that an EC2 instance in a public subnet with a security group allowing inbound access on port 22, attached to an IAM role with broad S3 read access, and with S3 buckets in the same account containing sensitive data tagged by DSPM, creates an attack path from public internet access to sensitive data that no individual finding captures. The attack path finding is a single actionable item that, if remediated by restricting either the security group or the IAM role, eliminates the path.

This path-based prioritization changes the economics of CSPM: rather than triaging 2,000 individual findings by severity score, security teams triage 50 attack paths ordered by the sensitivity of the target resource and the number of steps required for exploitation. The remediation effort is the same, but the risk reduction per unit of work is dramatically higher.

Orca Security: SideScanning, Breadth, and Market Position

Orca Security was founded in 2019 and built its initial differentiation on SideScanning, a patented approach to agentless workload scanning that reads cloud instance state from storage snapshots without deploying agents or accessing running workloads through network connections. This approach eliminated the agent deployment and management overhead that made agent-based cloud security tools operationally challenging at scale, and established Orca as the accessible entry point for organizations wanting comprehensive cloud security visibility without infrastructure investment.

Orca's CSPM capability covers AWS, Azure, and GCP across a broad range of cloud services with checks mapped to CIS benchmarks, NIST 800-53, PCI DSS, SOC 2, HIPAA, and other compliance frameworks. The compliance dashboard provides continuous compliance posture monitoring across connected accounts, with drift detection that identifies when previously compliant resources become non-compliant due to configuration changes.

Orca's attack path analysis, delivered through its Security Graph, models cloud resource relationships and identifies attack vectors by combining CSPM findings with vulnerability assessment results from workload scanning, CIEM findings from IAM permission analysis, and data classification results from its integrated DSPM capability. The Security Graph can identify attack paths that combine a publicly exposed vulnerability on an EC2 instance with a misconfigured IAM role that grants access to a sensitive S3 bucket, producing a prioritized list of paths to sensitive data targets.

Orca's alert prioritization uses a context score that combines the criticality of the target resource (determined partly by data sensitivity discovered by DSPM), the accessibility of the attack path (how many steps and how accessible the entry point), and the exploitability of individual findings in the path. This contextualized scoring reduces false positive rates compared to raw severity scoring and has been cited by Orca customers as a primary operational benefit.

Orca expanded its platform breadth significantly between 2023 and 2025, adding cloud detection and response (CDR) through CloudTrail analysis, Kubernetes security posture management (KSPM), API security testing, and supply chain security capabilities. This platform expansion positions Orca as a CNAPP rather than a CSPM point product, which increases its value for organizations consolidating cloud security tooling but also increases platform complexity relative to more focused tools.

Free daily briefing

Briefings like this, every morning before 9am.

Threat intel, active CVEs, and campaign alerts, distilled for practitioners. 50,000+ subscribers. No noise.

Plerion: Graph-Based Attack Path Analysis with AWS Depth

Plerion is a newer entrant in the CSPM and attack path analysis space, founded with a specific focus on building a more granular graph model of cloud resource relationships than existing CSPM platforms provide, with particular depth in AWS IAM policy analysis. Plerion's graph model ingests AWS resource configurations, IAM policy documents (including policy conditions, permission boundaries, and service control policies), network topology, and data classification to build a comprehensive model of what an attacker who compromises any given resource could reach from that position.

Plerion's AWS IAM analysis goes beyond identifying overly permissive IAM roles (a standard CSPM check) to model the specific effective permissions that each IAM identity has to each resource, accounting for the complex interaction of IAM policies, service control policies, resource-based policies, and permission boundaries that together determine whether an assumed IAM role can actually perform a given action on a given resource. This level of IAM policy analysis is more computationally intensive and more difficult to implement than standard IAM misconfiguration checks, and it produces more accurate attack path modeling for AWS environments where IAM complexity is high.

Plerion's attack path visualization presents paths as interactive graphs that allow security analysts to follow the specific steps from an entry point (a public-facing EC2 instance, an exposed lambda function URL, a permissive S3 bucket policy) through each intermediate step to the target resource. The visualization is designed for analyst workflow: each step in the path can be expanded to show the specific finding and the specific API calls or actions an attacker would need to take to traverse that step, supporting both remediation prioritization and tabletop exercise preparation.

Plerion's platform scope is more focused than Orca's: it covers CSPM, CIEM, and attack path analysis with vulnerability context, but does not yet match Orca's breadth in areas like DSPM (data security posture management), Kubernetes-native security, or cloud detection and response based on real-time CloudTrail analysis. This narrower scope means Plerion is better suited as a targeted attack path analysis and cloud posture tool than as an all-in-one CNAPP platform replacement.

Head-to-Head Comparison

The following comparison covers the dimensions most relevant to organizations evaluating CSPM and attack path analysis platforms for AWS, Azure, and GCP environments.

Agentless scanning approach

Both Orca and Plerion are agentless. Orca's SideScanning reads from cloud storage snapshots and does not require network access to running workloads. Plerion connects to cloud accounts through read-only IAM roles and APIs to inventory resource configurations and IAM policies without accessing workload data directly. The approaches differ: Orca's SideScanning provides deeper workload-level vulnerability and configuration data from inside the OS file system. Plerion's API-based scanning provides deeper IAM policy analysis but does not read inside workload file systems for vulnerability data without integration with a separate vulnerability scanner.

Attack path visualization

Both platforms provide interactive graph visualization of attack paths. Orca's Security Graph integrates CSPM, vulnerability, DSPM, and CDR data into a unified graph for comprehensive path modeling. Plerion's graph visualization is designed specifically for attack path analysis workflow with step-by-step path expansion and analyst-oriented remediation context. For AWS-heavy environments, Plerion's IAM-accurate path modeling produces fewer false positive attack paths than Orca's, because Plerion's IAM analysis accounts for policy conditions and permission boundaries that simpler models treat as fully permissive.

Alert fidelity

Both platforms aim to reduce alert fatigue through context-based prioritization. Orca's context scoring uses data sensitivity and path accessibility to rank findings. Plerion's effective permission analysis reduces false positives from IAM findings that appear permissive in policy documents but are restricted by conditions or permission boundaries in practice. Organizations evaluating both platforms should request a proof of concept against their own AWS environment and compare the false positive rate in IAM and attack path findings specifically.

Multi-cloud coverage (AWS, Azure, GCP)

Orca provides balanced multi-cloud coverage across AWS, Azure, and GCP with comparable check breadth across all three providers. Plerion's deepest coverage is AWS; Azure and GCP support is present but less mature as of 2025. Organizations with significant Azure or GCP workloads should validate Plerion's coverage specifically for their Azure and GCP service usage before selecting Plerion over Orca.

Integration with ticketing and SIEM

Both platforms integrate with Jira, ServiceNow, and PagerDuty for remediation ticket creation, and with Splunk, Microsoft Sentinel, and other SIEM platforms for security event forwarding. Orca's integration breadth is broader due to its longer market presence. Both platforms support Slack notifications for alert routing. Organizations with specific SIEM or SOAR platform requirements should verify specific connector support with both vendors.

Pricing model

Orca Security prices based on the number of cloud assets (workloads, cloud services, databases) protected across connected accounts, typically on an annual subscription basis. Plerion is priced competitively below Orca for comparable asset counts, which is a meaningful consideration for organizations where Orca's enterprise pricing exceeds budget. Both vendors require custom quotes based on environment size, and both offer proof-of-concept periods during evaluation.

CSPM vs CNAPP Context

Both Orca and Plerion are positioned in the CNAPP category rather than as pure CSPM tools, but they occupy different positions on the CNAPP breadth spectrum. Orca's platform expansion into CDR, DSPM, Kubernetes security, and API security makes it closer to a full CNAPP platform. Plerion's more focused scope makes it more accurately described as a CSPM plus CIEM plus attack path analysis platform, which is a subset of the full CNAPP category.

The CNAPP versus focused tool decision has organizational implications. Broader CNAPP platforms reduce the number of vendors and agents in the environment but require more extensive evaluation and onboarding, and may include capabilities that are not needed in the near term. Focused tools are faster to deploy and evaluate but may require supplemental tools to cover capabilities outside their scope.

For organizations building a cloud security program from scratch, evaluating a full CNAPP platform (Orca, Wiz, or a comparable full-stack alternative) alongside focused tools like Plerion is appropriate. For organizations that already have cloud vulnerability management and runtime detection covered by existing tools and specifically need attack path analysis and IAM risk improvement, Plerion's focused scope may align better with the immediate requirement without the overhead of a full CNAPP platform adoption.

Which Organizations Each Is Better Suited For

The fit between these platforms and specific organizational profiles is determined primarily by cloud environment composition, security program maturity, and the breadth of cloud security capabilities needed.

AWS-native organizations with complex IAM environments

Plerion's AWS IAM depth makes it the stronger choice for AWS-native organizations whose primary attack surface risk is complex IAM permission chains, overly permissive roles, and identity-based lateral movement paths. If your cloud security team's primary concern is 'which IAM misconfigurations create realistic paths to sensitive data in our AWS accounts,' Plerion's graph model will provide more accurate and actionable attack path findings than Orca for AWS-specific IAM analysis.

Multi-cloud organizations with balanced AWS, Azure, and GCP workloads

Orca's balanced multi-cloud coverage makes it the stronger choice for organizations with significant workloads across all three major cloud providers. Orca's CSPM check coverage is more mature across Azure and GCP than Plerion's, and its SideScanning approach provides equivalent workload visibility regardless of cloud provider.

Organizations consolidating cloud security tooling into fewer platforms

Orca's broader CNAPP capabilities (DSPM, CDR, Kubernetes security, vulnerability management) make it a better platform consolidation vehicle than Plerion's more focused offering. Organizations that are replacing multiple point tools (a CSPM tool, a separate vulnerability scanner, a separate CIEM tool) with a unified platform will find Orca's breadth more conducive to consolidation.

Budget-constrained organizations seeking attack path analysis at lower cost

Plerion's more competitive pricing for comparable CSPM and attack path analysis capabilities, compared to Orca or Wiz enterprise pricing, makes it a realistic option for organizations where CNAPP budget is constrained and the primary requirement is attack path analysis and IAM risk rather than full CNAPP breadth.

Evaluation Criteria Checklist

Use the following checklist when structuring a proof-of-concept evaluation of Plerion and Orca Security against your specific cloud environment.

Connect and time to first findings

Measure time from account connection to first complete inventory of findings. Both platforms should complete initial scanning of a mid-size AWS account (500 to 2,000 resources) within hours of connection.

IAM policy analysis accuracy

Test IAM findings against known-misconfigured IAM roles in your environment. Verify that roles with restrictive permission boundaries are not flagged as fully permissive, and that policy conditions are accurately modeled. This test specifically differentiates Plerion from platforms with simpler IAM analysis.

Attack path relevance

Review the top 10 attack paths identified for your environment and assess whether each path represents a realistic exploitation scenario for your specific workload and data configuration. High-quality attack path analysis should surface paths relevant to your actual sensitive data locations and IAM trust relationships.

False positive rate in findings

Identify a sample of 50 findings from the initial scan and validate each against your actual environment configuration. Measure the false positive rate. A high false positive rate (above 15 percent) indicates that the platform's rule logic does not accurately model your cloud provider's service behavior and will create ongoing alert fatigue.

Remediation workflow integration

Create a remediation ticket in your ITSM system from a sample finding. Verify that the ticket contains sufficient technical detail for the responsible team to remediate without additional investigation, including the affected resource identifier, the specific misconfiguration, the remediation action required, and the attack path context that justifies prioritization.

Multi-cloud coverage for your specific services

For each cloud provider in your environment, identify the five cloud services with the most resources and verify that both platforms provide meaningful CSPM checks for those specific services. Coverage gaps in services that are central to your environment are more significant than gaps in services you do not use.

The bottom line

Orca Security is the stronger choice for organizations that need balanced multi-cloud CSPM coverage across AWS, Azure, and GCP, want a platform moving toward full CNAPP capabilities that can consolidate multiple point tools, or need mature integrations and market-validated support for compliance frameworks including PCI DSS, SOC 2, and HIPAA.

Plerion is the stronger choice for organizations that are primarily AWS-native and need more accurate attack path analysis based on effective IAM permissions rather than policy-document analysis alone, are budget-constrained relative to Orca or Wiz enterprise pricing, or have already addressed cloud vulnerability management and runtime detection through other tools and specifically need CSPM and attack path analysis depth for their AWS IAM environment.

For most organizations running a formal evaluation, a 30-day proof of concept against live cloud accounts is the most useful evaluation step. The specific attack paths each platform identifies in your actual AWS environment, and the false positive rate in IAM findings, will be more decisive than any feature comparison table in determining which platform produces actionable intelligence for your security team.

Frequently asked questions

What is attack path analysis in cloud security?

Attack path analysis in cloud security is the process of modeling how an attacker who has established initial access to a cloud environment could combine multiple security weaknesses to reach a target, such as a sensitive database, a credentials store, or an administrative control plane. Rather than treating each misconfiguration as an independent finding, attack path analysis constructs a graph of all resources, their configurations, their network reachability, and their identity relationships, then runs graph traversal algorithms to identify sequences of steps that could be chained together by an attacker. For example, a CSPM tool might find 200 individual findings: exposed S3 buckets, overly permissive IAM roles, security group rules allowing broad ingress, and EC2 instances without patch management. Standard CSPM sorts these by severity. Attack path analysis identifies that three specific findings in combination create a path from a publicly accessible EC2 instance, through an overly permissive IAM role attached to it, to an S3 bucket containing customer PII, and would flag that specific combination as a high-priority attack path even if none of the three individual findings would have been ranked as critical in isolation. This context-aware prioritization is the primary value of attack path analysis over standard misconfiguration scanning: it reduces the alert volume that security teams must triage while increasing the proportion of alerts that represent realistic exploitation risk.

How does Orca's SideScanning work vs agent-based scanning?

Orca Security's SideScanning technology reads cloud workload data directly from cloud provider storage snapshots without deploying agents on the workloads themselves. When connected to a cloud account, Orca accesses the block storage snapshots of running instances (EBS snapshots in AWS, managed disk snapshots in Azure, persistent disk snapshots in GCP) and reads the file system, installed package inventory, configuration files, and running process state from those snapshots without the snapshot ever being mounted on a running workload that has network connectivity to the target environment. This approach has several security properties that distinguish it from agent-based scanning. Because SideScanning reads from snapshots rather than accessing live workloads, there is no agent process running on production systems that could be compromised and used as a foothold. The scanning activity does not affect the performance or availability of production workloads. There is no requirement to manage agent versions, agent authentication credentials, or agent communication channels across the workload fleet. The primary limitation of SideScanning compared to agent-based approaches is that it reads a point-in-time snapshot rather than real-time state, which means very recent changes to a workload's configuration between snapshot intervals will not be reflected until the next snapshot. It also cannot provide real-time runtime threat detection of active attacker behaviors on a running system, because it is not observing live process execution. Orca addresses the runtime detection gap through cloud provider CloudTrail, activity log, and API call monitoring rather than agent-based behavioral detection.

Is Plerion only for AWS environments?

Plerion supports AWS as its primary and most deeply integrated cloud environment, but also supports Microsoft Azure and Google Cloud Platform (GCP). Plerion's depth advantage over Orca Security is most pronounced in AWS-specific services and AWS IAM policy analysis, where its graph-based model ingests AWS resource relationships, IAM policy conditions, service control policies, and permission boundaries with a level of detail that reflects AWS-native design. Azure and GCP support in Plerion is present but as of 2025 is less deeply integrated than AWS, with fewer native service-specific checks and less granular IAM policy analysis for Azure RBAC and GCP IAM compared to the AWS coverage. Organizations that are primarily or entirely AWS-native will find Plerion's AWS depth to be a meaningful differentiator over Orca's more breadth-balanced multi-cloud coverage. Organizations with significant Azure or GCP workloads, or who require comparable depth across all three major cloud providers, should evaluate Orca's multi-cloud coverage against their specific Azure and GCP service usage before selecting Plerion over Orca based on attack path analysis depth alone.

How do Plerion and Orca compare to Wiz?

Wiz is the dominant vendor in the cloud security and CNAPP market by market share growth, having grown from 0 to more than 500 million dollars in annual revenue in its first four years through aggressive enterprise sales and a comprehensive platform that combines CSPM, vulnerability management, data security posture management (DSPM), and cloud detection and response (CDR) in a single agentless platform. Compared to Wiz, both Plerion and Orca are smaller vendors with more focused product offerings. Orca's platform is most comparable to Wiz in breadth, covering CSPM, vulnerability management, identity risk, data security, and container security in a single platform, with SideScanning as its technical differentiation from Wiz's agentless approach (which also reads cloud snapshots). The Orca versus Wiz comparison is competitive, with Orca maintaining SideScanning as a technical differentiator and competing on implementation simplicity and alert fidelity. Plerion is differentiated from Wiz primarily on attack path analysis depth in AWS environments, positioning as a complement to or replacement for Wiz's security graph for AWS-heavy organizations that want more granular attack path visualization. Plerion is priced competitively below Wiz, which makes it an option for organizations where Wiz's enterprise pricing exceeds budget constraints. Organizations evaluating cloud security platforms should include Wiz in their evaluation alongside Orca and Plerion, as Wiz's CNAPP breadth and market momentum are relevant factors in platform longevity and roadmap investment.

What is the difference between CSPM and CNAPP?

Cloud security posture management (CSPM) is a specific security discipline focused on identifying and remediating misconfigurations and compliance violations in cloud infrastructure configurations. A CSPM tool continuously scans cloud account configurations, network policies, IAM roles, and storage permissions against security benchmarks (CIS AWS Foundations, NIST 800-53, PCI DSS) and flags deviations for remediation. Cloud-native application protection platform (CNAPP) is the broader category defined by Gartner that combines multiple cloud security capabilities into a unified platform. A CNAPP typically includes CSPM, cloud workload protection (vulnerability scanning of cloud instances and containers), cloud infrastructure entitlement management (CIEM, which manages identity and access risk), data security posture management (DSPM, which discovers and classifies sensitive data in cloud storage), and increasingly cloud detection and response (CDR, which detects active attacker behaviors in cloud environments). Both Orca Security and Plerion are positioned in the CNAPP category rather than pure CSPM, because both go beyond misconfiguration detection to include vulnerability assessment of workloads, identity risk analysis, and attack path modeling. Orca's CNAPP breadth is broader than Plerion's current platform scope. Organizations buying a point CSPM tool will find both platforms over-specified; organizations building a comprehensive cloud security program will appreciate the additional capabilities beyond pure misconfiguration detection that both platforms provide.

How do these tools handle runtime threat detection vs. posture?

Posture management (detecting misconfigurations in cloud resource configurations) and runtime threat detection (detecting active attacker behaviors in running cloud environments) are distinct capabilities that CNAPP platforms address in different ways, with different architectural implications. Orca Security handles runtime threat detection through cloud provider native log sources: AWS CloudTrail, Azure Activity Logs, GCP Cloud Audit Logs, and Kubernetes audit logs. Orca ingests these log sources and applies behavioral detection rules to identify suspicious API call patterns (such as IAM role assumption from new locations, mass data exfiltration API calls, or cryptominer deployment patterns) without requiring agent-based behavioral monitoring on workloads. This approach captures cloud control plane threats effectively but is less effective at detecting host-level threats that do not produce cloud API calls (malware executing on an instance, credential theft from memory). Plerion's runtime detection capabilities are focused on cloud control plane monitoring similar to Orca's approach, with AWS CloudTrail analysis as the primary runtime threat detection data source. Neither platform provides the depth of runtime threat detection available from agent-based platforms like Falco-based tools (Sysdig) or eBPF-based EDR solutions. Organizations that need deep runtime threat detection at the workload level alongside CSPM and attack path analysis should evaluate whether a single CNAPP platform can satisfy both requirements or whether a CNAPP tool for posture and identity risk plus a separate runtime detection tool provides better coverage depth for both use cases.

Sources & references

  1. Orca Security Platform Documentation
  2. Plerion Product Documentation
  3. Gartner Innovation Insight for CNAPP 2024
  4. CISA Cloud Security Technical Reference Architecture
  5. AWS Well-Architected Security Pillar

Free resources

25
Free download

Critical CVE Reference Card 2025–2026

25 actively exploited vulnerabilities with CVSS scores, exploit status, and patch availability. Print it, pin it, share it with your SOC team.

No spam. Unsubscribe anytime.

Free download

Ransomware Incident Response Playbook

Step-by-step 24-hour IR checklist covering detection, containment, eradication, and recovery. Built for SOC teams, IR leads, and CISOs.

No spam. Unsubscribe anytime.

Free newsletter

Get threat intel before your inbox does.

50,000+ security professionals read Decryption Digest for early warnings on zero-days, ransomware, and nation-state campaigns. Free, weekly, no spam.

Unsubscribe anytime. We never sell your data.

Eric Bang
Author

Founder & Cybersecurity Evangelist, Decryption Digest

Cybersecurity professional with expertise in threat intelligence, vulnerability research, and enterprise security. Covers zero-days, ransomware, and nation-state operations for 50,000+ security professionals weekly.

Free Brief

The Mythos Brief is free.

AI that finds 27-year-old zero-days. What it means for your security program.

Joins Decryption Digest. Unsubscribe anytime.

Daily Briefing

Get briefings like this every morning

Actionable threat intelligence for working practitioners. Free. No spam. Trusted by 50,000+ SOC analysts, CISOs, and security engineers.

Unsubscribe anytime.

Mythos Brief

Anthropic's AI finds zero-days your scanners miss.