The traditional defender tools have focused on the approach of listing the assets in your cluster. However, the attackers follow the graphs to access the clusters.
The correct security hygiene involves using graphs to gain proactive visibility to the cluster access for always staying one-step ahead of the attacker. Learn more in this video with Reuven Harrison, Tufin CTO and Co-founder.