US 12,217,079 B2
Detecting security exceptions across multiple compute environments
Daniel Hershko Shemesh, Givat-Shmuel (IL); Yarin Miran, Rishon Lezion (IL); Roy Reznik, Tel Aviv (IL); Ami Luttwak, Binyamina (IL); Yinon Costica, Tel Aviv (IL); Raaz Herzberg, Tel Aviv (IL); Yaniv Joseph Oliver, Tel Aviv (IL); Osher Hazan, Mazkeret Batia (IL); and Niv Roit Ben David, Tel Aviv (IL)
Assigned to Wiz, Inc., New York, NY (US)
Filed by Wiz, Inc., New York, NY (US)
Filed on Dec. 29, 2023, as Appl. No. 18/400,705.
Application 18/400,705 is a continuation in part of application No. 17/664,508, filed on May 23, 2022.
Prior Publication US 2024/0168792 A1, May 23, 2024
This patent is subject to a terminal disclaimer.
Int. Cl. G06F 9/455 (2018.01); G06F 21/53 (2013.01); G06F 21/60 (2013.01)
CPC G06F 9/45558 (2013.01) [G06F 2009/4557 (2013.01); G06F 2009/45587 (2013.01)] 13 Claims
OG exemplary drawing
 
1. A method for applying cybersecurity policies across multiple computing environments, comprising:
generating an inspectable disk from a disk of a first workload deployed in a first computing environment, the computing environment including a cybersecurity policy applicable to a cybersecurity object;
detecting the cybersecurity object on the inspectable disk;
generating a policy exception based on the cybersecurity object and the first workload;
generating a representation of the cybersecurity object and the first workload in a security database, wherein the security database includes a representation of the first computing environment and a representation of a second computing environment which is associated with the first computing environment;
detecting in the representation of the second computing environment a representation of a second workload associated with the representation of the first workload;
applying the policy exception to the second workload based on detecting that the second workload is associated with the first workload;
traversing a security graph to find a first node representing the first workload, wherein the security graph is the representation in the security database; and
traversing the security graph to find a second node representing the second workload.