Privilege escalation radius is the invisible blast zone that turns a single compromised account into a full breach. It measures how far and how fast an attacker can move once they’ve cracked an initial foothold. The bigger the radius, the faster normal bugs turn into critical failures. The smaller the radius, the harder it is for one mistake to multiply.
This isn’t just about admin rights. It’s about identity boundaries, lateral movement paths, and the silent permissions that sprawl across modern systems. Each integration, each microservice, and each legacy account you forgot to disable is part of the radius. The privilege escalation radius is the real attack surface—measuring not how someone gets in, but how much they can do after they’re inside.
Attack chains thrive on weak segmentation. A staging environment with production database keys. A shared service account with sweeping read-write privileges. A CI/CD pipeline token that never expires. Each one expands the radius until your security perimeter no longer matters.