白丝美女被狂躁免费视频网站,500av导航大全精品,yw.193.cnc爆乳尤物未满,97se亚洲综合色区,аⅴ天堂中文在线网官网

Systems and methods for passive key identification

專利號
US11888888B2
公開日期
2024-01-30
申請人
Orca Security LTD.(IL Tel Aviv)
發(fā)明人
Avi Shua
IPC分類
H04L9/08; H04L9/14; H04L67/1008; H04L9/40; H04L67/101; G06F9/455; G06F21/54; G06F21/55; G06F21/56; G06F21/78; G06F21/57; G06F9/50
技術領域
cloud,may,asset,scanning,or,system,workload,in,risk,storage
地域: Tel Aviv-Jaffa

摘要

A method is disclosed for accessing a primary account maintained in a cloud environment, receiving information defining a structure of the primary account, the structure including a plurality of assets, and deploying, inside the primary account or a secondary account for which trust is established with the primary account, at least one ephemeral scanner configured to scan at least one block storage volume and output metadata defining the at least one block storage volume, the output excluding raw data of the primary account. The method further comprises receiving a transmission of the metadata from the at least one ephemeral scanner, excluding raw data of the primary account, analyzing the metadata to identify cybersecurity vulnerabilities, correlating each of the cybersecurity vulnerabilities with one of the assets, and generating a report correlating the cybersecurity vulnerabilities with the assets. Systems and computer-readable media implementing the method are also disclosed.

說明書

PRIORITY

This is a continuation of International Application No. PCT/IB2022/052670, filed on Mar. 23, 2022, which claims the priority and benefit of U.S. Provisional Application No. 63/180,048 filed on Apr. 26, 2021, the contents of both of which are hereby incorporated by reference in their entireties.

TECHNICAL FIELD

Disclosed embodiments include new systems and methods for securing cloud infrastructure to help meet compliance mandates, without disrupting business operations in live environments.

BACKGROUND

Modern organizations typically depend on cloud infrastructure for data storage and processing. Data storage and processing nodes, among other things, power today's electronic infrastructure. In contrast to early network-centric days, an organization may have little in the way of “on-prem” (on-premises) systems and may run its entire business through systems having shared resources. Such an infrastructure may be the entire inventory of cloud assets for an organization, including running and stopped workloads of all types: virtual machines, containers, storage objects, load balancers, IAM (Identity and Access Management) configurations, and more. Organizations are searching for effective ways to scan their entire cloud estate to look for risks stemming from vulnerabilities, misconfigurations, malware, lateral movement risk, weak and leaked passwords, and improperly secured PII.

權利要求

1
The invention claimed is:1. A cybersecurity system for matching keys with compute resources, the method comprising:at least one hardware processor configured to:analyze a cloud environment to identify a plurality of keys to the compute resources in the cloud environment, wherein each key includes a credential for granting permission to access at least one of the compute resources, access a service provided by at least one of the compute resources, or access a function provided by at least one of the compute resources;perform a cryptographic analysis on the plurality of keys to identify a first set of fingerprints that uniquely identify each of the plurality of keys, the first set of fingerprints being non-identical to any key of the plurality of keys and non-functional for use as a key to access the compute resources, services provided by the compute resources, or functions provided by the compute resources;analyze trust configurations of the compute resources to identify a second set of fingerprints for each of the compute resources; andprevent generation of associated activity patterns misidentified as caused by malicious code or by an attacker to the system by identifying matching relationships between the plurality of keys and the compute resources without using any of the plurality of keys to access the compute resources, as a result of comparing the first set of fingerprints with the second set of fingerprints.2. The system of claim 1, wherein the plurality of keys are stored in at least one workload.3. The system of claim 1, wherein at least one of the plurality of keys includes at least one of a password, a script containing a password, a private component of a private-public key pair, a cloud key or an Secure Shell (SSH) key.4. The system of claim 1, wherein the at least one processor is further configured to test validity of at least one of the plurality of keys.5. The system of claim 1, wherein the at least one processor is further configured to analyze a multi-machine interaction in the cloud environment using the first set of fingerprints.6. The system of claim 5, wherein analyzing the multi-machine interaction includes comparing the first set of fingerprints with the second set of fingerprints.7. The system of claim 1, wherein the at least one processor is further configured to analyze a multi-machine interaction in the cloud environment using the plurality of keys.8. The system of claim 7, wherein analyzing the multi-machine interaction includes comparing a first key for accessing a first one of the compute resources and a second key for accessing a second one of the compute resources.9. A method for matching keys with compute resources, the method comprising:analyzing a cloud environment to identify a plurality of keys to the compute resources in the cloud environment, wherein each key includes a credential for granting permission to access at least one of the compute resources, access a service provided by at least one of the compute resources, or access a function provided by at least one of the compute resources;performing a cryptographic analysis on the plurality of keys to identify a first set of fingerprints that uniquely identify each of the plurality of keys, the first set of fingerprints being non-identical to any key of the plurality of keys and non-functional for use as a key to access the compute resources, services provided by the compute resources, or functions provided by the compute resources;analyzing trust configurations of the compute resources to identify a second set of fingerprints for each of the compute resources; andpreventing generation of associated activity patterns misidentified as caused by malicious code or by an attacker to the system by identifying matching relationships between the plurality of keys and the compute resources without using any of the plurality of keys to access the compute resources, as a result of comparing the first set of fingerprints with the second set of fingerprints.10. The method of claim 9, wherein the plurality of keys are stored in at least one workload.11. The method of claim 9, wherein at least one of the plurality of keys includes at least one of a password, a script containing a password, a private component of a private-public key pair, a cloud key, or an Secure Shell (SSH) key.12. The method of claim 9, further comprising testing validity of at least one of the plurality of keys.13. The method of claim 9, further comprising analyzing a multi-machine interaction in the cloud environment using the first set of fingerprints.14. The method of claim 13, wherein analyzing the multi-machine interaction includes comparing the first set of fingerprints with the second set of fingerprints.15. The method of claim 9, further comprising analyzing a multi-machine interaction in the cloud environment using the plurality of keys.16. A non-transitory computer-readable medium storing instructions that, when executed by at least one hardware processor, are configured to cause the at least one hardware processor to perform operations for matching keys with compute resources, the operations comprising:analyzing a cloud environment to identify a plurality of keys to the compute resources in the cloud environment, wherein each key includes a credential for granting permission to access at least one of the compute resources, access a service provided by at least one of the compute resources, or access a function provided by at least one of the compute resources;performing a cryptographic analysis on the plurality of keys to identify a first set of fingerprints that uniquely identify each of the plurality of keys, the first set of fingerprints being non-identical to any key of the plurality of keys and non-functional for use as a key to access the compute resources, services provided by the compute resources, or functions provided by the compute resources;analyzing trust configurations of the compute resources to identify a second set of fingerprints for each of the compute resources; andpreventing generation of associated activity patterns misidentified as caused by malicious code or by an attacker to the system by identifying matching relationships between the plurality of keys and the compute resources without using any of the plurality of keys to access the compute resources, as a result of comparing the first set of fingerprints with the second set of fingerprints.
微信群二維碼
意見反饋