Attackers aren’t hacking in anymore—they’re logging in. And the investigation architecture most SOCs rely on was never built to follow them across the surfaces they traverse.
The Numbers That Should Alarm Every SOC Leader
The Global Incident Response Report 2026 from Palo Alto Networks Unit 42 identified two critical patterns:
- Identity weaknesses played a material role in nearly 90% of all investigations
- Two or more attack surfaces were involved in 87% of intrusions
Taken together, these describe an attacker playbook that legacy SIEM and SOAR architectures were never engineered to counter.
Threat actors are bypassing exploit chains in favor of stolen credentials, hijacked sessions, and over-scoped privileges—then hopping across endpoints, cloud infrastructure, SaaS applications, and identity planes in a single intrusion.
To a traditional security stack, each hop looks like a discrete, low-severity event. In reality, it’s one coordinated attack.
The Front Door Is Wide Open
For years, defenders focused on patching vulnerabilities to keep adversaries out. But as Unit 42’s data makes clear, attackers are pragmatic: 65% of initial access in 2025 was identity-driven. Phishing (22%) and vulnerability exploitation (22%) tied as the leading vectors, but the identity-based techniques create the connective tissue behind them: including;
- credential theft,
- session hijacking,
- MFA bypass, and
- OAuth misuse
Once inside, the crisis compounds. Unit 42’s analysis of more than 680,000 identities across cloud accounts found that 99% had excessive permissions, some unused for 60 or more days. That means an attacker who compromises a single identity often inherits far more privilege than they need. They escalate through over-scoped roles and unretired legacy grants, move laterally by testing stolen credentials across systems, and persist by stealing session tokens and misusing OAuth grants that bypass interactive authentication—including MFA.
The report describes this as “authenticated access changing the dynamics of an intrusion.” To a legacy security tool, this lateral movement looks exactly like routine automation. And that’s the problem.
The 87% Multi-Surface Problem
If an attacker compromises an endpoint and stays on that endpoint, traditional EDR is highly effective. But modern intrusions don’t stay in one lane.
The Unit 42 data reveals that 87% of incidents spanned two or more attack surfaces, and 67% spanned three or more. Forty-three percent touched four or more surfaces, with some cases reaching as many as eight. Identity was involved in nearly 90% of all incidents, and browser-based activity appeared in 48%—reflecting how often attacks intersect with routine workflows like email, web access, and SaaS usage.
This multi-surface reality creates a specific, measurable investigation bottleneck. The report notes that in 87% of incidents, Unit 42 investigators reviewed evidence from two or more distinct data sources to establish what happened—with complex cases drawing on as many as ten. That fragmentation “consistently slowed detection, allowing adversaries to begin lateral movement before defenders could see the full picture.”
The core finding: In more than 90% of breaches, preventable gaps—limited visibility, inconsistently applied controls, or excessive identity trust—materially enabled the intrusion. The issue isn’t attacker sophistication. It’s fragmented defense.
The Shrinking Window: 72 Minutes to Exfiltration
Attack velocity is accelerating, and the fastest operators are pulling away from the pack. The quickest 25% of intrusions reached exfiltration in just 72 minutes in 2025—down from 285 minutes in 2024, a nearly 4x acceleration. The share of incidents that reached exfiltration in under one hour rose from 19% to 22%.
AI is a significant driver. The report documents how threat actors have moved from experimentation to routine operational use of AI-assisted tooling—automating reconnaissance, scripting deployment, parallelizing initial access attempts, and even running concurrent ransom negotiations with AI-generated messaging. The result is a compressed attack lifecycle where, as Unit 42 puts it, “what happens in the first minutes after initial access can determine whether an incident becomes a breach.”
For SOC teams still relying on manual investigation workflows—querying one tool at a time, waiting on data lake ingestion latency, and hand-correlating signals across consoles—this timeline is existentially challenging. You can’t stitch together a cross-surface attack narrative in 72 minutes when your investigation tools require an hour just to pull and normalize the telemetry.
Why Legacy SOC Architecture Can’t Keep Up
The Unit 42 report diagnoses three systemic contributing factors that enable attacker success. Each one maps directly to an architectural limitation in traditional SIEM/SOAR investigation workflows:
- Visibility gaps. Critical telemetry often exists but remains trapped in disparate systems, preventing defenders from correlating identity shifts with endpoint behavior or SaaS activity. The report notes that visibility gaps—particularly across SaaS, cloud identity, and automation layers—were a primary driver of attacker success in 2025. The traditional approach of centralizing everything into a data lake before analysis introduces ingestion latency and normalization overhead that attackers exploit.
- Environmental complexity. Security baselines are rarely applied universally. Environmental drift from legacy systems, M&A activity, and technology adoption creates inconsistencies that attackers use as the path of least resistance. Over 90% of breaches were enabled by misconfigurations or coverage gaps, not novel exploits. When investigation tools can only query what’s been pre-indexed in a centralized platform, the gaps in that index become blind spots in the investigation.
- Excessive identity trust. Permissions accumulate faster than governance can track them. Attackers escalate through unretired legacy roles and over-provisioned service accounts without deploying novel tooling. When identity data lives in fragmented systems—Active Directory here, Okta there, cloud-native IAM elsewhere—investigators lose end-to-end visibility into how a single compromised identity expanded into broad access.
These aren’t point failures. They’re architectural ones. And they demand an architectural response.
How Command Zero Is Engineered for This Reality
Command Zero was built from the ground up for the investigation challenge the Unit 42 report describes: multi-surface, identity-driven intrusions that span fragmented tooling and demand speed. Three architectural decisions are directly responsive to the failure modes documented in the report.
Federated Data: Investigate Where the Data Lives
The report’s finding that 87% of investigations required evidence from two or more distinct sources—and complex cases required as many as ten—describes a problem that centralized data lakes are fundamentally ill-suited to solve. Ingestion delays, normalization overhead, and schema mismatches mean that by the time all the relevant telemetry is queryable in a single pane, the attacker has already moved.
Command Zero takes a federated approach: it queries your existing security tools in place, correlating signals across EDR, SIEM, identity providers, cloud platforms, and SaaS applications without requiring you to centralize everything first. When a Tier-2 analyst needs to trace how a compromised identity pivoted from an endpoint to a cloud workload to a SaaS application, they ask the question and Command Zero retrieves the answer from each source in parallel. No data lake latency. No gaps from tools that weren’t indexed.
Questions Before Tokens: Human-Guided, AI-Accelerated Investigation
The report emphasizes that most breaches are enabled by “preventable gaps”—not attacker novelty. The critical capability gap isn’t generating more alerts. It’s the ability to quickly answer investigative questions across fragmented data: Where else did this identity authenticate in the last 48 hours? What permissions does this service account actually hold? Did this OAuth token grant propagate downstream?
Command Zero’s question-and-answer methodology puts the analyst’s investigative instinct at the center. Rather than replacing human judgment with a black-box agent that triages alerts autonomously, Command Zero empowers the analyst to ask natural-language investigation questions and get structured, cross-platform answers in seconds. The AI handles the query orchestration, tool integration, and data correlation. The analyst retains full visibility into what was queried, what was returned, and how the conclusions were derived.
This “glass box” transparency matters operationally: when the Unit 42 report calls for response that follows “an auditable sequence,” it’s describing exactly the kind of explainable, reviewable investigation workflow that Command Zero produces by design.
Cross-Surface Investigation at Machine Speed
When the fastest attackers are exfiltrating data in 72 minutes and traversing three or more attack surfaces in 67% of intrusions, investigation workflows must operate at a speed and breadth that manual processes cannot achieve.
Command Zero collapses the multi-tool, multi-tab investigation workflow into a single conversational interface. An analyst investigating a suspicious identity event doesn’t need to separately query Active Directory, then Okta, then CrowdStrike, then AWS CloudTrail, then Salesforce audit logs. They describe the investigation question, and Command Zero orchestrates the cross-platform query, synthesizes the results, and surfaces the attack narrative—with full provenance for every data point.
The result: investigations that previously required hours of manual correlation across multiple consoles can be conducted in minutes. That’s not a workflow improvement. It’s the difference between detecting an active intrusion and performing post-breach forensics.
What This Means for Security Leaders
The Unit 42 report concludes with a statement that should resonate with every SOC leader: “Security is solvable.” The overwhelming majority of breaches are enabled by known, preventable gaps. But closing those gaps requires more than better controls at the perimeter—it requires fundamentally rethinking how the SOC investigates threats that cross surfaces, exploit identities, and move at machine speed.
The report’s own recommendations align closely with Command Zero’s architecture: ingest all relevant security data, use AI-driven capabilities to correlate signals across identity, endpoint, cloud, and network layers, and enable real-time response with automation. The difference is that Command Zero delivers these capabilities through a federated investigation model that doesn’t require ripping out your existing stack or waiting for a multi-year data consolidation project.
Attackers have adapted their playbook. Identity is the new perimeter, multi-surface movement is the norm, and speed is the differentiator. The SOC’s investigation architecture needs to adapt, too.







