Home · Docs · Strategic Modules

Strategic Modules Guide

Last updated: 2026-04-29
Status: Stable


Purpose

Strategic Modules are optional capability add-ons beyond URIP's core risk aggregation. They require specific connectors to be configured and must be enabled per-tenant in Admin → Modules.


Module Status

Module Status Connectors Required
CSPM Production At least one cloud CSPM connector
DSPM Production (preview UI) BigID and/or Varonis
AI Security early-access Snyk, BigID (DSPM data)
ZTNA early-access Zscaler, Netskope, Entra ID, Okta
Attack Path early-access 3+ connectors providing asset + risk data
Risk Quantification early-access Any connector (uses existing risk data)

Preview means the UI and data model are complete and functional; advanced AI-driven features listed in those modules are roadmap items.


CSPM — Cloud Security Posture Management

URL: /cspm-dashboard.html

CSPM Dashboard

What it does

Evaluates your cloud accounts against CIS Benchmarks and URIP's built-in rule set using native cloud provider APIs. No cloud-side agent is deployed — URIP reads AWS Config, Azure Policy, and GCP Security Command Center.

Setup

  1. Configure at least one cloud connector: AWS CSPM, Azure CSPM, GCP CSPM, Wiz, Prisma Cloud, or Orca Security
  2. Go to Admin → Modules → enable CSPM
  3. Navigate to /cspm-dashboard.html

Pages

Page Purpose
/cspm-dashboard.html Summary KPIs by cloud provider, top failing controls
/cspm-findings.html Full finding list with filter by provider/service/severity
/cspm-control-detail.html Per-control detail with affected resources and remediation

Key metrics

  • Posture Score — percentage of controls passing per cloud provider
  • Critical Misconfigs — publicly exposed resources, admin APIs without auth
  • Drift Detection — controls that were passing but have since failed (config drift)

Common pitfall

CSPM findings are evaluated against the cloud provider's APIs, not your endpoint agent. A "Critical: S3 bucket public" finding from AWS CSPM and a "High: EC2 instance CVE" from Tenable are different finding types — both appear in the Risk Register but the CSPM detail view only shows posture findings.


DSPM — Data Security Posture Management

URL: /dspm-dashboard.html

What it does

Discovers and classifies sensitive data at rest — structured (databases via BigID) and unstructured (files and shares via Varonis).

Setup

Configure BigID for database scanning or Varonis for file share scanning (or both).

Key findings surfaced

  • PII overexposure — sensitive data accessible by more users than business need requires
  • Unencrypted sensitive data — credit card numbers or health records in unencrypted storage
  • Data sprawl — same sensitive dataset duplicated across multiple cloud buckets
  • Stale sensitive data — files not accessed in >1 year containing PII (retention risk)

Compliance linkage

DSPM findings automatically fail relevant compliance controls: - GDPR Article 32 (encryption safeguards) - HIPAA §164.312(a)(2)(iv) (encryption) - PCI DSS Requirement 3 (cardholder data protection) - India DPDP Section 8 (security safeguards)


AI Security Dashboard

URL: /ai-security-dashboard.html

What it does

Aggregates AI governance risk from existing connectors and maps findings to ISO 42001 and EU AI Act controls.

Data sources

  • Snyk SCA — vulnerabilities in ML framework dependencies (TensorFlow, PyTorch, scikit-learn)
  • BigID DSPM — sensitive data used for AI training
  • GitHub Advanced Security — secrets and vulnerabilities in ML repos
  • Compliance module — ISO 42001 and EU AI Act control evaluation

Key panels

  • AI System Inventory — AI systems registered in URIP's asset inventory
  • ML Supply Chain Risks — vulnerable ML package versions (from Snyk)
  • Training Data Governance — sensitive data classification for AI datasets (from BigID)
  • ISO 42001 Score — control compliance percentage
  • EU AI Act Risk Tier — your AI systems' risk tier classification

ZTNA — Zero Trust Network Access

URL: /ztna-dashboard.html

What it does

Provides Zero Trust posture visibility by aggregating device trust, identity trust, and network access anomalies from Zscaler, Netskope, Entra ID, and Okta.

Zero Trust pillars assessed

Pillar Data source What URIP checks
Device trust Intune / Jamf / CrowdStrike Device compliance before network access
Identity trust Entra ID / Okta MFA enforcement, risky sign-in detection
Network access Zscaler ZPA / Netskope ZTNA Least-privilege access policy violations
Application access Zscaler / Netskope Shadow SaaS and unsanctioned app access

Key metrics

  • Zero Trust Maturity Score — composite score across all four pillars
  • Non-Compliant Device Access — devices accessing resources despite failing MDM compliance
  • Anomalous Access Events — access from unusual locations, times, or patterns

Attack Path Analysis

URL: /attack-path.html

What it does

Visualises multi-hop attack paths from external exposure to your highest-value (T1) assets using graph analysis on the full asset and risk dataset.

How it works

  1. Graph built from all connected asset + network data (what connects to what)
  2. Risk scores overlaid on each node (CVEs on each asset)
  3. External-facing nodes identified (from EASM connector)
  4. Paths from external → T1 assets scored by exploitability at each hop
  5. Chains ranked by cumulative exploitability

Key output

  • Attack Path List — ranked list of attack chains from external exposure to crown-jewel assets
  • Path Detail — each hop visualised with CVE, EPSS, and remediation options
  • Blast Radius — if this path is exploited, which assets are affected downstream

Prerequisites

For meaningful attack paths, configure at least: - One EASM connector (external entry points) - One EDR connector (endpoint nodes) - One network connector (network topology)


Cyber Risk Quantification (FAIR)

URL: /risk-quantification.html

What it does

Converts your composite risk scores into financial terms using the FAIR (Factor Analysis of Information Risk) methodology. Enables board-level conversations about cyber risk investment.

Methodology

Annual Loss Expectancy (ALE) =
  Loss Event Frequency (LEF)        ← threat frequency from EPSS + KEV
  × Loss Magnitude (LM)             ← asset business value from T1–T4 tier
  × Control effectiveness gap       ← SafeBreach BAS results (if configured)

Inputs (tenant-configurable)

Input Where to configure
Asset business value by tier Admin → Scoring → Asset Value per Tier
Currency (USD/GBP/EUR/INR) Admin → Scoring → Currency
Loss categories (Revenue, Regulatory, Reputational) Admin → Scoring → Loss Categories

Output

  • ALE by Domain — expected annual loss per security domain in currency
  • Risk Investment Map — where to invest next security dollar for highest risk reduction
  • Top 10 Financially Significant Risks — risks sorted by their contribution to ALE

Honest caveat

FAIR calculation is a modelling framework, not actuarial truth. The outputs are directionally correct and useful for prioritisation decisions. They should not be presented to regulators as precise loss figures without actuarial calibration against real historical loss data for your industry sector.


Enabling Modules

Navigate to /admin-modules.html (super-admin required):

  1. Select the tenant
  2. Find the module in the list
  3. Toggle Enabled
  4. The module becomes available immediately for all users in that tenant

Module codes:

Module Code
Core (mandatory) CORE
Vulnerability Management VM
EDR EDR
CSPM CSPM
DSPM DSPM
AI Security AI_SECURITY
ZTNA ZTNA
Attack Path ATTACK_PATH
Risk Quantification RISK_QUANT

See Also