Management and reporting can become daunting tasks when application, infrastructure, and cloud security are looked at holistically in a security program. Hierarchical organizations can run into trouble trying to assess security data and posture across unique vectors of interest—be they business units, product lines, shared microservices, asset or operations owners, or technology types. And business hierarchies are not only complex, but changing. Assets, responsibilities, teams, units, and levels will shuffle across an organization's lifetime, while security policies may stay largely consistent; all of this necessitating a security posture & vulnerability management solution flexible enough for security teams to easily configure, reconfigure, and manage within changing structures.