Oversight (NADZOR)
Identity is the new perimeter. NADZOR watches it continuously.
Most breaches involve compromised identities. Stolen credentials. Excessive permissions. Dormant accounts with lingering access. Service accounts with god-mode privileges nobody remembers creating.
Traditional IAM tools manage identity provisioning. They don't continuously validate that access policies match actual enforcement. They don't map identity-based attack paths. They don't detect when an account's behavior suddenly changes.
SPNT's oversight module (NADZOR) fills that gap — continuous identity security monitoring that writes directly to the substrate.
What NADZOR monitors
- Privilege escalation paths. Which accounts could escalate to admin? Through what chain of permissions? NADZOR maps these paths across your identity providers and cloud platforms.
- Dormant accounts. Accounts that haven't authenticated in 90 days but still have active permissions. Each one is a risk waiting for a credential spray attack.
- Excessive permissions. Accounts with more access than their actual usage patterns require. NADZOR compares granted permissions to observed behavior.
- Service account hygiene. Non-human identities with excessive scope, missing rotation, or unclear ownership. The accounts attackers love to find.
- Cross-platform access correlation. A single human identity often has accounts in Entra ID, AWS IAM, GitHub, Okta, and more. NADZOR correlates these to show the true blast radius of a compromised identity.
Identity attack path analysis
NADZOR doesn't just list identity issues. It maps attack paths: starting from a low-privilege account, what chain of permissions and group memberships would let an attacker reach a crown jewel system?
Attack paths are written to the substrate as findings. They flow through prioritization, governance mapping, and investigation like any other finding — but with the added context of the specific permission chain involved.
Integration with telemetry
NADZOR reads identity-platform telemetry from the Operational Telemetry Layer — Entra ID, Okta, AWS CloudTrail, GitHub audit logs. When it detects a policy violation (an account accessing a resource it shouldn't, a privilege escalation that shouldn't have succeeded), the finding includes the specific telemetry events that prove it happened.
See identity oversight in action
A demonstration showing privilege escalation path mapping, dormant account detection, and identity-based attack path analysis.