The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Jun. 25, 2024

Filed:

Sep. 28, 2021
Applicant:

Sonrai Security Inc., New York, NY (US);

Inventors:

Ben A. Wuest, Fredericton, CA;

Willam A. Bird, Fredericton, CA;

Brad J. Peters, Fredericton, CA;

Dasharath P. Chavda, Fredericton, CA;

Gregory A. Davis, Fredericton, CA;

Assignee:

Sonrai Security Inc., New York, NY (US);

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
H04L 9/40 (2022.01); G06F 21/45 (2013.01); G06F 21/62 (2013.01);
U.S. Cl.
CPC ...
H04L 63/102 (2013.01); G06F 21/45 (2013.01); G06F 21/62 (2013.01); H04L 63/0823 (2013.01); H04L 63/0876 (2013.01); H04L 63/101 (2013.01); H04L 63/108 (2013.01);
Abstract

A network-accessible service provides an enterprise with a view of identity and data activity in the enterprise's cloud accounts. The service enables distinct cloud provider management models to be normalized with centralized analytics and views across large numbers of cloud accounts. Using a domain-specific query language, the system enables rapid interrogation of a complete and centralized data model of all data and identity relationships. The data model also supports a cloud 'least privilege and access' framework. Least privilege is a set of minimum permissions that are associated to a given identity; least access is a minimal set of persons that need to have access to given piece data. The framework maps an identity to one or more actions collected in cloud audit logs, and dynamically-build a compete view of an identity's effective permissions. The resulting least privilege and access policies are then applied natively to a given cloud environment to manage access.


Find Patent Forward Citations

Loading…