Skip to main content
Nepheli
All research/ResearchMar 2026

Why Knowledge Graphs Are the Missing Layer in Cloud Security

Moving from flat inventories to relational intelligence — and why it matters for every cloud team.

Why Knowledge Graphs Are the Missing Layer in Cloud Security

Cloud security has made enormous progress in the last decade. We have vulnerability scanners, configuration auditors, runtime detection engines, and compliance frameworks covering every major regulation. Yet breaches keep happening — and they are getting more expensive. According to IBM's 2024 Cost of a Data Breach Report, 82 percent of data breaches involved data stored in cloud environments, with multi-environment breaches costing an average of $5 million and taking 283 days to identify and contain.

The pattern is almost always the same. The attacker did not exploit a single misconfiguration. They chained together a series of weaknesses that, individually, looked benign. Wiz's security research team calls these "toxic combinations" — individually low-risk issues like network exposure, unprotected data, and excessive permissions that chain into high-impact attack paths. Their 2025 Cloud Data Exposure Analysis found that 35 percent of cloud environments have instances that simultaneously expose sensitive data and contain high or critical vulnerabilities.

The limits of list-based security

Consider the typical cloud security posture management (CSPM) tool. It scans your environment, compares resource configurations against a library of rules, and produces a list of findings ranked by severity. A publicly accessible S3 bucket gets a "Critical" label. An IAM role with AdministratorAccess gets flagged. A security group allowing ingress on port 22 from 0.0.0.0/0 generates an alert.

Each of these findings is correct in isolation. But without understanding the relationships between them, the tool cannot answer the questions that actually matter: Can an attacker reach the database from the internet? What is the blast radius if this role is compromised? Gartner has projected that 99 percent of cloud security failures through 2025 would be the customer's fault — largely misconfigurations — yet flat-inventory tools cannot distinguish between a publicly accessible bucket containing static marketing assets and one that sits two hops from a production database holding customer PII.

The result is a flood of alerts with no hierarchy of actual risk — the alert fatigue crisis that costs the industry billions annually. According to research compiled by Exabeam, organizations average 43 misconfigurations per cloud account, and 61 percent of organizations reported major cloud security incidents in 2024 — a 154 percent year-over-year surge. The problem is not that we lack detection. The problem is that we lack context.

How knowledge graphs change the equation

Knowledge graphs address this gap by modelling infrastructure as a network of entities and relationships rather than a catalogue of assets. Every resource, permission, network path, data flow, and dependency is represented as a node or edge in a traversable graph. Security questions become graph queries.

"Show me every path from the internet to a database containing PII" is no longer a hypothetical — it is a query that returns results in seconds. Wiz demonstrated this approach with their Security Graph, which filters tens of thousands of vulnerabilities down to tens of critical attack paths per customer by understanding how misconfigurations chain together. Their 2025 analysis found that 54 percent of cloud environments have exposed VMs or serverless instances containing PII or payment data — but the critical insight is which of those exposures are actually reachable through network paths and permission chains.

This shift from enumeration to traversal is what transforms security tooling from a checklist into an intelligence system. Instead of asking "is this resource misconfigured?" you ask "what can an adversary do with this misconfiguration in the context of everything it connects to?"

Building a living map of your infrastructure

At Nepheli, we built Hermeez around this principle. The platform continuously ingests data from AWS, Azure, and GCP APIs, Kubernetes control planes, identity providers, CI/CD systems, and DNS records to construct a living knowledge graph of your entire infrastructure. The graph updates in real time as resources are created, modified, or destroyed.

Six specialized AI agents then traverse that graph to surface risks that flat scanners miss: transitive privilege escalation paths, blast-radius projections for any compromised resource, compliance violations that span multiple services and accounts, and cost anomalies tied to architectural redundancy. Each finding comes with full context — not just what is wrong, but why it matters, what it connects to, and how to fix it.

A growing market for a reason

The CSPM market is projected to grow from $5.25 billion in 2025 to $10.63 billion by 2030, according to Mordor Intelligence — a 15.2 percent CAGR that reflects the urgency organizations feel about cloud security posture. Gartner's Q4 2024 forecast projects broader cloud security spending reaching $22.6 billion by 2028.

But spending more on the same flat-inventory approach will not solve the underlying problem. Knowledge graphs are not a replacement for existing security tools. They are the connective tissue that makes every other tool more effective — the missing layer that transforms isolated signals into systemic understanding. The same graph that powers security analysis simultaneously enables continuous compliance, cost optimization, and MTTR reduction. When your security findings come with the full context of how resources relate to each other, you stop counting alerts and start eliminating attack paths.