The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Jun. 17, 2025

Filed:

Feb. 19, 2024
Applicant:

Normalyze, Inc., Los Altos, CA (US);

Inventors:

Ravishankar Ganesh Ithal, Los Altos, CA (US);

Yang Zhang, Fremont, CA (US);

Mummoorthy Murugesan, Gilroy, CA (US);

Assignee:

Normalyze, Inc., Los Altos, CA (US);

Attorneys:
Int. Cl.
CPC ...
H04L 9/40 (2022.01); G06F 9/451 (2018.01); G06F 16/21 (2019.01); G06F 16/245 (2019.01); G06F 16/355 (2025.01); G06F 16/95 (2019.01); G06F 21/57 (2013.01); G06F 21/62 (2013.01);
U.S. Cl.
CPC ...
H04L 63/1416 (2013.01); G06F 9/451 (2018.02); G06F 16/211 (2019.01); G06F 16/24569 (2019.01); G06F 16/355 (2019.01); G06F 16/95 (2019.01); G06F 21/577 (2013.01); G06F 21/6227 (2013.01); H04L 63/083 (2013.01); H04L 63/102 (2013.01); H04L 63/104 (2013.01); H04L 63/1433 (2013.01); H04L 63/18 (2013.01); H04L 63/205 (2013.01); G06F 2221/034 (2013.01); G06F 2221/2141 (2013.01);
Abstract

The technology disclosed relates to streamlined analysis of security posture of a cloud environment. In particular, the disclosed technology relates to accessing permissions data and access control data for pairs of compute resources and storage resources, tracing network communication paths between the pairs of the compute resources and the storage resources based on the permissions data and the access control data, accessing sensitivity classification data for objects in the storage resources, and qualifying a subset of the pairs of the compute resources and the storage resources as vulnerable to breach attack based on an evaluation of the permissions data, the access control data, and the sensitivity classification data against at least one risk criterion. A representation of propagation of the breach attack along the network communication paths is generated, the representation identifying relationships between the subset of the pairs of the compute resources and the storage resources.


Find Patent Forward Citations

Loading…